Claim Missing Document
Check
Articles

Found 7 Documents
Search

Model Alur Kerja Penanganan Bukti Digital Untuk Data Multimedia Dirman Dirman; Yudi Prayudi; Erika Ramadhani
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 8 No 3 (2021): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v8i3.987

Abstract

Multimedia crime through digital platforms and transmission is a severe and detrimental condition. Nowadays, digital multimedia cases have received much attention, especially in handling multimedia evidence that can be used as an instrument to determine scientific truth in court. In addition, multimedia digital evidence is straightforward to modify using applications that can be used freely so that the authenticity of digital data can be damaged or lost. The challenge faced by investigators in handling multimedia digital evidence is the variable demands for the investigation's validity, handling, documentation, and reporting processes. Like handling procedures in general, digital multimedia case investigations require a workflow so that the investigation stages can be well controlled. This study examines the framework, standard operating procedures, and workflows for handling digital evidence. The results of the mapping and study are used as a workflow model for handling digital evidence for multimedia data by using the design thinking method with the Business Process Model and Notation (BPMN) approach in getting the relationship between actors, digital evidence, and workflows.
Sistem desain: implementasi tandatangan digital untuk otentikasi dokumen keuangan menggunakan metode modifiedECDSA Ivan Firmansyah; Erika Ramadhani
AUTOMATA Vol. 1 No. 1 (2020)
Publisher : AUTOMATA

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Tulisan ini membahas tentang desain sistem untuk mengimplementasi tandatangan digital pada dokumen keuangan sebagai otentikasi dokumen menggunakan Bahasa pemrograman Java. Tandatangan digital adalah salah satu layanan keamanan pada bidang kriptografi yang memiliki fungsi untuk mengamankan dokumen dari serangan man in the middle attack atau serangan dari pihak ketiga. Tulisan ini dibuat karena dokumen keuangan merupakan sebuah dokumen yang sangat vital yang perlu dijaga keasliannya. Saat ini pertukaran informasi melalui jalur internet sangat aktif digunakan. Disisi lain, komunikasi yang dilakukan menggunakan jalur internet juga sangat rentan terhadap kejahatan siber. Sehingga untuk mengamankan sebuah dokumen keuangan sekaligus menjaga keaslian datanya dilakukanlah implementasi tandatangan digital dengan menggunakan metode modified-ECDSA. Hasil dari penelitian yang dilakukan berupa prototipe dan rancangan sistem tandatangan digital berupa aplikasi desktop
Studi Komparasi Metode Disk Overwrite dan Factory Reset sebagai Teknik Anti Forensik di Perangkat Android Beni Ike Hendra Kuswara; Ahmad Raf'ie Pratama; Erika Ramadhani
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 9 No 2 (2022): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v9i2.1955

Abstract

This study aims to compare the effectiveness and efficiency of the disk overwrite method and the default factory reset feature as an anti-forensic technique on Android devices. The data collection process in this study was carried out by an experimental process on Android 10 devices, which had gone through each anti-forensic technique process in turn before attempting to recover deleted data using the Photorec software. From the experimental results, it was found that the recovery process yielded nearly identical results between the use of the disk overwrite method, be it 1-pass, 3-pass, 7-pass, or 35-pass, and the default factory reset method, although in terms of operating times there was a stark difference between the five. In other words, the use of the disk overwrite method as an anti-forensic technique in normal cases does not provide any added value compared to the default Android factory reset feature. The results of this study can be used as a guide and reference by new digital forensics practitioners before processing electronic evidence in the form of Android devices. In addition, the results of this study can serve as empirical evidence of the effectiveness and efficiency of the default factory reset feature on Android devices in maintaining user privacy when the device changes ownership.
Metode Live Forensik Untuk Investigasi Serangan Formjacking Pada Website Ecommerce Nova Setiawan; Ahmad R Pratama; Erika Ramadhani
JUSTINDO (Jurnal Sistem dan Teknologi Informasi Indonesia) Vol 7, No 1 (2022): JUSTINDO
Publisher : Universitas Muhammadiyah Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32528/justindo.v7i1.5356

Abstract

Pertumbuhan usaha online yang tinggi dan bergesernya sikap konsumen menginginkan transaksi serba cepat, fleksibel dan ekonomis menyebabkan pertumbuhan e-commerce kian meningkat. Hal ini mengindikasikan semakin ketatnya persaingan pada penjualan berbasis e-commerce dalam merebut pasar offline atau konfensional. Pertumbukan e-commerce diikuti pula dengan pertubuhan kerentanan yang mengancam pengguna dalam melakukan transaksi pembelian pada platform website e-commerce. Kerentanan tersebut ada pada pencurian data digital berupa detail kartu kredit pengguna ecommerce. Terdapat kode jahat yang mampu mencuri atau menduplikasi dan mengirimkan data pembayaran ke server yang dimiliki pelaku. Kode jahat tersebut disisipkan dalam javascript yang tidak bisa dilihat secara langsung oleh user. Peneliti memakai skenario untuk dapat melakukan teknik investigasi live forensik sehingga volatile didalam RAM (Random Access Memory) masih mencatat data transaksi saat itu dan dapat dilakukan akuisisi. Live forensik mengacu pada metode NIJ (National Institute of Justice) dengan 5 tahap dalam melakukan investigasi forensik, yaitu identification, collection, examination, analysis, serta reporting. Browser yang ada dalam skenario live forensik ini ada 4 yaitu operaMini, Google Chrome, Microsoft Edge, dan Mozilla Firefox yang kemudian dilakukan anlisis untuk melihat letak jejak digital dalam website eccomerce tersebut.  Data yang dihasilkan dari proses akuisisi pada penelitian ini dilakukan dengan memakai tools forensik AccessData FTK Imager 4.5.0 (x64). Diharapkan metode ini akan menghasilkan wbukti digital yang dapat digunakan dalam proses penegak hukum untuk mengungkapkan kejahatan digital berupa formjacking pada website ecommerce.
Identifikasi Source Image Menggunakan Pendekatan Forensic Similarity pada Image Forensik Ahmad Ridha Kelrey; Yudi Prayudi; Erika Ramadhani
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 9 No 3 (2022): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v9i3.2483

Abstract

With the development of digital technology, digital images can be obtained anytime and anywhere through cameras and cell phones. People can get images easily and can also manipulate the sources of information in the content and can even manipulate images. So it is necessary to verify the source of the image which is the main job in the field of image forensics. Camera source identification is the process of determining which camera device was used to take the image. Forensic Similarity approach based on Convolutional Neural Network determines if two image patches are taken by different cameras or from the same camera. This approach differs from typical camera identification in that it does not specify the exact camera used to capture any of the patches. The strength of this approach is the ability to compare cameras that were not used to train the system. This allows investigators to learn important information about images taken with any camera, and is not limited by the set of camera models in the investigator database. Although camera model information, date and time, and other information can be found in the EXIF ​​or in the JPEG header, it is generally impossible to assume the information is correct because image metadata can be easily modified. The source camera identification process uses identification on the image to find out the camera source obtained from the image. By using a forensic similarity approach, it can support information in metadata so that it can guarantee the authenticity of the information obtained.
Forensik Cloud Untuk Google Drive : Literature Review Syafiq Irfan Isnaindar; Erika Ramadhani
AUTOMATA Vol. 3 No. 2 (2022)
Publisher : AUTOMATA

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstract— Seiring dengan perkembangan zaman, media penyimpanan di sekitar kita terus berkembang mengikuti perkembangan teknologi dan tren yang ada di masyarakat. Jika pada zaman dahulu kita memerlukan penyimpanan berwujud fisik seperti harddisk, CD maupun disket, kini penyimpanan melalui media cloud menjadi yang populer di masyarakat. Pengguna cukup memerlukan jaringan internet guna mengakses dan menyimpan file mereka pada cloud storage. Namun, menyimpan file pada cloud storage menimbulkan resiko kejahatan seperti pencurian data mengingat file yang disimpan dalam jaringan cloud sehingga perlu dilakukan tindakan digital forensik untuk mencegah kejahatan pada cloud storage dan menyusun tindakan pencegahan di masa mendatang. Pada jurnal ini digunakan metode literature review dengan menganalisis jurnal yang telah didapatkan kemudian dipilih kembali sehingga didapatkan kesimpulan berdasarkan hasil literasi pada jurnal yang didapat sebelumnya. Adapun hasil dari literature review ini adalah pembahasan dan kesimpulan dari proses melakukan forensik cloud yang diambil dari jurnal peneliti yang telah melakukan percobaan forensik cloud, jurnal yang digunakan merupakan jurnal berbahasa Indonesia dan berbahasa inggris.
Simulated Phishing Attack and Forensic Analysis Using the D4I Framework: A Case Study on Kredivo Muhammad Yusuf Halim; Toto Raharjo; Rosi Rahmadi Syahputra; Erika Ramadhani
Journal of Technology and Informatics (JoTI) Vol. 7 No. 2 (2025): Volume 7 Number 2 October 2025 (In Press)
Publisher : Universitas Dinamika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37802/joti.v7i2.1086

Abstract

Phishing is a form of cyberattack where attackers deceive users into revealing sensitive information such as credentials or financial data, often through fake communication channels or websites. This threat is particularly critical in the financial technology (fintech) sector, where services rely heavily on digital transactions and user trust. This study presents a simulated phishing case targeting Kredivo users to evaluate the effectiveness of the Digital Forensics framework for Reviewing and Investigating cyber-attacks (D4I) in digital forensic analysis. The Cyber Kill Chain (CKC) model was employed to trace attacker behavior across seven phases, from weaponization to actions on objectives. Forensic data was acquired using MOBILedit Forensic Express from two smartphones, namely an iPhone 11 (iOS 15.8.1) and a Vivo Y21 (Android 8.1.0), which served as simulated evidence devices. Using the D4I framework, the investigation successfully identified and correlated key digital artifacts such as phishing links, OTP transmissions, and unauthorized access logs. These findings were organized into a visual chain of artifacts to reconstruct the full attack lifecycle. The results demonstrate that the D4I framework is effective in guiding structured forensic investigations and understanding attack patterns, supporting the enhancement of fintech security strategies.