Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Cyber Security dan Forensik Digital (CSFD)

PAZIIM DIGITAL EVIDENCE ANALYSIS APPLICATION ON ANDROID SMARTPHONES WITH A LOGICAL ACQUISITION APPROACH Dedy Hariyadi; Hendro Wijayanto; Indah Daila Sari
Cyber Security dan Forensik Digital Vol. 2 No. 2 (2019): Edisi November 2019
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (986.834 KB) | DOI: 10.14421/csecurity.2019.2.2.1603

Abstract

The use of social media in Indonesia has increased very rapidly in 2018 compared to the previous year. This makes a lot of social media made by the children of the nation appear, one of which is Paziim. Socializing on the internet is very easy to leak personal data. There are three aspects that can be utilized on online social networks (OSN) in the disclosure of private data to the public, namely the strength of the relationship (strong or weak), the type of relationship and the characteristics of one's habits. Mobile forensics is needed to analyze digital evidence on social media applications installed on Android smartphones. Indonesia through the National Standardization Agency (BSN) also issued standards related to digital forensics. Standards which are derived from ISO / IEC regulate Security Techniques - Guidelines for the Identification, Collection, Acquisition and Preservation of Digital Evidence. This standardization is known as SNI ISO / IEC 27037: 2014. From the results of cell phone forensic analysis on the Paziim application, the results found the username, coordinates, device models, and operators used by users in SQLite Web_Data and OneSignal.xml files
DEMILITARIZED ZONE AND PORT KNOCKING METHODS FOR COMPUTER NETWORK SECURITY Andik Saputro; Nanang Saputro; Hendro Wijayanto
Cyber Security dan Forensik Digital Vol. 3 No. 2 (2020): Edisi November 2020
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2020.3.2.2150

Abstract

Currently, the way of network communication has changed a lot. All aspects become very dependent on online services. Employees can work from home, and students of all ages take online classes. The more the public depends on staying connected to the network, the greater potential network attacks to occur. In a computer network, if it is not protected, it will data or file loss, damage to the server system, not being optimal in serving users or even losing valuable institutional assets. The attacks most often used in networks are Port Scanning and DDoS (Distributed Denial Of Service). In this study, the DeMilitarized Zone and Port Knocking methods are combined to secure computer networks. DeMilitarized Zone technique implementation is used to access local servers, so that they can be accessed from outside with Port Knocking technique. To open the access port that is filtered in the router configuration on the server network security system. DeMilitarized Zone and Port Knocking can be implemented on local and long distance networks where if an attacker wants to exploit or attack the main server, the first to be attacked is the firewall server (router). Port Knocking can also be implemented on local and long distance networks with a combined ping request time limit which makes it safer, so that if an attacker wants to access the router, and doesn't know the rules from the remote, what happens is a rejection of port access.
CYBER SECURITY BEHAVIOR MODEL ON HEALTH INFORMATION SYSTEM USERS DURING COVID-19 PANDEMIC Penggalih Mahardika Herlambang; Sylvia Anjani; Hendro Wijayanto; Murni Murni
Cyber Security dan Forensik Digital Vol. 3 No. 2 (2020): Edisi November 2020
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2020.3.2.2152

Abstract

The use of the Health Information System raises the risk of data leakage which is mostly caused by internal health facilities. For this reason, an instrument is needed that can measure the behavior of users who are at risk for the health information system used to minimize the potential for these leaks. Develop and test the validity and reliability of the questionnaire based Human Aspect of Information Security Questionaire (HAIS-Q), Risky Security Behavior Scale (RScB), and the tendency of Internet users in Indonesia. Based on the research 4 aspects that affect the security of Health Information System, namely the use of electronic devices, access to healthinformation systems, internet behavior, and unusual events in health facilities. The questionnaire developed consisted of 27 question items was valid (r count> r table) and reliable (Alfa Chronbach value of 0.777). The developed questionnaire design can be applied to assess the risk of cyber attacks on Health Information Systemsin health facilities. Further research is needed to implement the design of the questionnaire.