Towards The Data Security And Digital Evidence Based Solution In Bangladesh Perspective

Authors

  • Shekh Abdullah-Al-Musa Ahmed
  • Nik Zulkarnaen Khidzir
  • Tan Tse Guan

Keywords:

Data Security, Digital Evidence Collections, Autopsy, Java, Java Security

Abstract

Data is anything in a form suitable for use with a computer. Data is often distinguished from programs. A program is a set of instructions that detail a task for the computer to perform. In this sense, data is thus everything that is not program code. Generally and in science, data is a gathered body of facts. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers data. Data security also protects data from corruption. However in this article would show a method for encryption text data by java program. It will encrypt is such a way that data could not read in plain text. Whereas Forensic science is a combine science. Scientific Evidence is a part of forensic science. By using the forensic science collecting information and present it on the court. So the meaning of evidence of science representing the understanding of collection information by establishes science. For example to create a DNA profile, following the establish protocol to make a DNA profile. So by testing it thousand times it will give the same result. This is the establish rule of science. When applying this rule in the court then it will call scientific Evidence. In Bangladesh most of the time it is seen that judiciary process is depends on confession based. Justice in the lower court does not depend on Digital forensic rather depend on Confession based. The definition of document is given in Section 3 at Evidence Act, 1872 and it is amended by ICT Act 2006 by Section 87 ,it is said that creating document by electronic is also a document .So any picture or video or audio are electronic document is a document .However for digital evidence based solution in this project using autopsy forensic tools, which will run on Kali Linux Forensic mode. It will generate a report paper and calculates MD5 hash values and confirms the integrity of the data before closing the files. Not all computer offence we can called cybercrime , but if a person created forged certificate or steal computer file , may called it as a Digital Crime .In real space , there are some physical force such as robbery , theft etc. But in Digital crime, there is no physical force, but doing the crime by technology.

Downloads

Download data is not yet available.

Downloads

Published

30-06-2019

How to Cite

Shekh Abdullah-Al-Musa Ahmed, Nik Zulkarnaen Khidzir, & Tan Tse Guan. (2019). Towards The Data Security And Digital Evidence Based Solution In Bangladesh Perspective. Zulfaqar Journal of Defence Science, Engineering & Technology, 2(1). Retrieved from https://zulfaqarjdset.upnm.edu.my/index.php/zjdset/article/view/11

Issue

Section

Articles