Vol 2, Issue 1 (2019)

International Journal of Defence Science, Engineering & Technology

Towards the Data Security and Digital Evidence based Solution in Bangladesh Perspective

Shekh Abdullah-Al-Musa Ahmed, Nik Zulkarnaen Khidzir, Tan Tse Guan



Data is anything in a form suitable for use with a computer. Data is often distinguished from programs. A program is a set of instructions that detail a task for the computer to perform. In this sense, data is thus everything that is not program code. Generally and in science, data is a gathered body of facts. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers data. Data security also protects data from corruption. However in this article would show a method for encryption text data by java program. It will encrypt is such a way that data could not read in plain text. Whereas Forensic science is a combine science. Scientific Evidence is a part of forensic science. By using the forensic science collecting information and present it on the court. So the meaning of evidence of science representing the understanding of collection information by establishes science. For example to create a DNA profile, following the establish protocol to make a DNA profile. So by testing it thousand times it will give the same result. This is the establish rule of science. When applying this rule in the court then it will call scientific Evidence. In Bangladesh most of the time it is seen that judiciary process is depends on confession based. Justice in the lower court does not depend on Digital forensic rather depend on Confession based. The definition of document is given in Section 3 at Evidence Act, 1872 and it is amended by ICT Act 2006 by Section 87 ,it is said that creating document by electronic is also a document .So any picture or video or audio are electronic document is a document .However for digital evidence based solution in this project using autopsy forensic tools, which will run on Kali Linux Forensic mode. It will generate a report paper and calculates MD5 hash values and confirms the integrity of the data before closing the files. Not all computer offence we can called cybercrime , but if a person created forged certificate or steal computer file , may called it as a Digital Crime .In real space , there are some physical force such as robbery , theft etc. But in Digital crime, there is no physical force, but doing the crime by technology.



An Implementation Study of Smart Library using Beacon Bluetooth Low Energy (BLE)

Syarifah Bahiyah Rahayu, Nur Diyana Kamarudin, Afiqah Mohammad Azahari, Arniyati Ahmad, Mohd Hazali Mohamed Halip



An average number of books for a normal library is around 10,000. Finding books in a library is a cumbersome process and time consuming especially in a huge library. Besides, the cost to embed RFID tag on each book is too expensive. To overcome the problem, this paper proposed a solution for finding location of library books. The solution is using i) a smartphone application to navigate location of book, and ii) LED Blinker with Beacon Bluetooth Low Energy (BLE) technology on bookshelf. The case study for this research is Library of Jeneral Tun Ibrahim at Universiti Pertahanan Nasional Malaysia (UPNM) Library. This study also produces a new framework for finding books in libraries. The framework is a proof of concept that can be applied in the smart library system to assists library patrons in finding locations of books.