Claim Missing Document
Check
Articles

Found 3 Documents
Search

Framework Design for the Retrieval of Instant Messaging in Social Media as Electronic Evidence Linda Rosselina; Yohan Suryanto; Tofan Hermawan; Fahdiaz Alief
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 7, No 1: EECSI 2020
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v7.2064

Abstract

The rapid growth of social media features not only brings many advantages but also causes problems. Mainly related to digital evidence when cybercrime occurs. One of the social media features that are currently popular is the unsend message feature in instant messaging applications such as Instagram, Whatsapp, Facebook Messenger, Skype, Viber, and Telegram. In the case of cybercrime, the perpetrator can delete the messages and erase digital evidence, making it difficult to trace. Those artifact messages might be useful for law enforcement or forensic investigators to be used as digital evidence in court. Therefore, an effective and efficient framework is needed in the mobile forensic investigation process to guarantee the integrity of the data obtained. This paper will discuss the review of several international standards on mobile forensics, namely NIST SP 800-101, ISO/ IEC, and SWGDE. This paper also proposes a framework design to retrieve unsend data artifacts on social media according to official and widely used international mobile forensic standards.
Maturity Level Analysis of Digital Evidence Handling on Integrated Criminal Justice System based on NIST SP800-53 Revision 5 Using NIST Maturity Chandra Tirta Aditya Gunawan; Yohan Suryanto
Budapest International Research and Critics Institute-Journal (BIRCI-Journal) Vol 5, No 2 (2022): Budapest International Research and Critics Institute May
Publisher : Budapest International Research and Critics University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33258/birci.v5i2.4861

Abstract

The challenge of handling digital evidence in an integrated justice system is that it is vulnerable, easy to change, and destroyed, so it needs to be protected from security threats when stored, processed, and transmitted by each interconnected law enforcer. This study aims planning evaluation as a part to enhance security control by analyzing the maturity level of XYZ's organization as a law enforcement in handling digital evidence in an integrated criminal justice system. So far, there has been no research that measures the level of maturity in the handling of potential digital evidence. This study uses the NIST SP800-53 Rev 5 security control standard and measures the maturity level using NIST Maturity. The result of the research is that the current organizational maturity level is 2.1 (range 0-5). The XYZ organization, in general, has had a pattern in dealing with digital potential in terms of information security and privacy, but it has not been established so it is still vulnerable, inconsistent, and reactive. Organizations need to improve control of information security and privacy optimally so that the security of digital evidence can be guaranteed. These results can be part of the evaluation process of the organization's planning to improve security controls.
Implementing the Chaotic Permutation Multicircular Cryptography Technique using Asymmetric Key Aria Lesmana; Ruki Harwahyu; Yohan Suryanto
ULTIMATICS Vol 14 No 2 (2022): Ultimatics : Jurnal Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ti.v14i2.2837

Abstract

In digital computing, cryptographic methods considers performance in both speed and security. This study aims to explore and improve a permutation-based symmetric chaotic cryptography technique called Chaotic Permutation Multicircular (CPMC). In this study, a method is proposed to implement asymmetric key system from CPMC technique by generating a reverser key for reverting the permutation result of CPMC encryption back to its original arrangement using the same function as encryption. The reverser key alongside the CPMC key act as encryption and decryption key pair. The pair key generation and cryptographic function utilizes the encryption function of CPMC technique dubbed CPMC Shrinking algorithm. Asymmetric implementation can simplify CPMC technique by also using CPMC Shrinking algorithm for decryption, therefore enabling it as a single function for encryption and decryption. The asymmetric single function cryptography test show improvement in speed from faster cryptographic speed in decryption compared to initial implementation by average of 75.87%