Claim Missing Document
Check
Articles

Found 33 Documents
Search

Forensic Web Analysis on The Latest Version of Whatsapp Browser Utomo, Dicky Satrio Ikhsan; Prayudi , Yudi; Ramadhani, Erika
Journal of Computer Networks, Architecture and High Performance Computing Vol. 5 No. 1 (2023): Article Research Volume 5 Issue 1, January 2023
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v5i1.2286

Abstract

With the rapid growth of technology and the increasing number of smartphone users, social media applications have proliferated. Among them, WhatsApp has emerged as the most widely used application, with over a quarter of the world's population using it since 2009. To meet the increasing customer demands, WhatsApp has introduced a browser version, which has undergone continuous updates and improvements. The latest version of WhatsApp exhibits significant differences in features and settings compared to its predecessors, particularly in conversations, images, video recordings, and other aspects. Consequently, this research focuses on analyzing artifacts that can aid in forensic investigations. The study aims to extract artifacts related to conversation sessions, as well as media data such as audio files, contact numbers, photos, videos, and more. To achieve these objectives, various forensic tools will be employed to assist in the artifact search within the WhatsApp browser. The research adopts the NIST framework and utilizes forensic techniques like Autopsy and FTK Imager to read encrypted backup database files. These files contain valuable information such as deleted conversations, phone logs, photos, videos, and other data of interest. Analyzing the artifacts from the WhatsApp browser version contributes to forensic activities, providing valuable insights into the evidence that can be obtained from conversations and media files. By leveraging forensic tools and techniques, forensic practitioners can effectively retrieve and analyze data from the encrypted backup database files. In summary, this research explores the artifacts within the WhatsApp browser version, sheds light on its distinct features, and presents a forensic approach utilizing the NIST framework and forensic tools like Autopsy and FTK Imager to examine encrypted backup database files containing crucial deleted data, conversations, and media files.
Potential of marine algae polysaccharides as bioactive agents in dental polymers: Potensi polisakarida alga laut sebagai agen bioaktif dalam polimer kedokteran gigi Ramadhani, Erika; Damayanti, Yusnita; Zakiyah, Shohwah; Indriani, Lenni
Makassar Dental Journal Vol. 14 No. 3 (2025): Volume 14 Issue 3 December 2025
Publisher : Makassar Dental Journal PDGI Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35856/mdj.v14i3.1337

Abstract

The use of natural biomaterials in dentistry has grown significantly in recent decades due to increasing demand for bioactive, bio-compatible, and environmentally friendly materials. Marine algae-derived polysaccharides—such as alginate, fucoidan, carra-geenan, ulvan, and agarose—have emerged as promising candidates due to their antibacterial, anti-inflammatory, antioxidant, and bioadhesive properties. This article reviews the potential of algal polysaccharides as foundational materials for bioactive po-lymers in dentistry. Their applications include regenerative scaffolds, local drug delivery systems, root canal filling materials, and membrane guided tissue regeneration. Studies show these polysaccharides are safe, biocompatible, and support tissue rege-neration and therapeutic outcomes in oral care. However, further in vivo and clinical research, along with standardized methods for extraction and chemical modification, are necessary to ensure consistent quality and clinical effectiveness.
Enhancing Digital Forensics with Cyber Kill Chain and 5W1H: A Case Study on Phishing Attacks Erika Ramadhani; Toto Raharjo
IJoICT (International Journal on Information and Communication Technology) Vol. 11 No. 1 (2025): Vol. 11 No. 1 Jun 2025
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/ijoict.v11i1.8966

Abstract

This research has combined the Cyber Kill Chain (CKC) model and the 5W1 H for detection and control of cybercrime such as phishing for the automation of digital forensic investigation. The most vital challenge in digital forensics is its evidence handling complexity, the lack of a standard because of diversified kinds of tools, and the non-availability of automated tools that systematically present information. Therefore, it provides a web-based framework to automate the investigation by referring to the attack stages of the CKC and identifies the contextual allegories of the incident like who, what, when, where, why, and how through the rule of 5W1H. It includes the problem identification method, collecting and classifying the digital artifacts according to CKC stages, in-depth analysis with the 5W1H framework, and visualization of investigation results for further understanding. A case study of a phishing attack on the Kredivo application was used to evaluate the effectiveness of this approach, where the CKC stages from reconnaissance to actions on objectives were implemented to analyze artifacts such as activity logs and phishing data. The results show that the integration of CKC and 5W1H improves analysis accuracy, generates comprehensive visualizations of artifacts, and strengthens response to attacks. It is expected that this finding would mean a highly significant change in the productivity of forensic investigations by making it easier for analysts and preparing proper documentation education for the court.