Rizdqi Akbar Ramadhan
Program Studi Teknik Informatika, Fakultas Teknik, Universitas Islam Riau

Published : 5 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 5 Documents
Search

Analisis Digital Forensik Rekaman Kamera CCTV Menggunakan Metode NIST (National Institute of Standards Technology) Desti Mualfah; Rizdqi Akbar Ramadhan
IT Journal Research and Development Vol. 5 No. 2 (2021)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2021.vol5(2).5731

Abstract

Conventional crimes recorded on CCTV (Closed Circuit Television) cameras are increasing, every criminal who is proven to have committed a certain crime will be punished in accordance with statutory regulations. The problem is how a case recorded on a CCTV camera can be used as digital evidence. Digital evidence is closely related to ensuring data security, privacy and integrity while following the stages of the digital forensic identification process. The identification stage using the NIST (National Institute of Standard Technolog) method is used for investigations in finding information related to metadata on CCTV camera footage so that it can provide structured information, describe and process information obtained from digital forensic investigation sources that can be implemented into the Chain of Custody document which aims to be used as legal digital evidence in court
Implementasi Metode National Institute of Justice (NIJ) Pada Fitur TRIM SOLID STATE DRIVE (SSD) Dengan Objek Eksperimental Sistem Operasi Windows, Linux dan Macintosh Rizdqi Akbar Ramadhan; Desti Mualfah
IT Journal Research and Development Vol. 5 No. 2 (2021)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2021.vol5(2).5750

Abstract

Solid State Drive (SSD) is the latest solution to speed up data processing from various multiplatform desktop computers. The TRIM features on SSDs has contribute for eliminating garbage data which is permanently deleted by users, where this method has the benefit of extending the service life of SSD devices. Contradiction of implement this method is obstacle potential for forensic investigators to recover deleted data in term of cyber crime in the case of evidence in the form of computers with SSD storage. The experimental object in this study is based on the perspective of mainstream operating systems, namely Windows, Linux and Macintosh installed on the SSD where each operating system simulates the deletion of stored data with a comparison of TRIM enable and TRIM disabled configurations. National Institute of Justice (NIJ) Digital Forensic method implemented in this case, because this method serves as a reference in the practice of Digital Forensics in this study. The SLEUTH KIT Autopsy software is a Digital Forensic tool being used in the perspective of investigators in the acquisition and analysis of SSD evidence in the case simulation of this study. Novelti obtained from the research content is that the operating system which is the object of experimentation is the latest release of Windows, Linux and Macintosh operating systems which certainly has great potential in terms of exploration, especially Digital Forensics. Windows has the greatest chance of recovery results among the other 2 operating systems in this study.
Digital Forensic Investigation for Non-Volatile Memory Architecture by Hybrid Evaluation Based on ISO/IEC 27037:2012 and NIST SP800-86 Framework Rizdqi Akbar Ramadhan; Panji Rachmat Setiawan; Dedy Hariyadi
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.8968

Abstract

In the implementation of Digital Forensics, one of the derivatives of practice is the handling of Digital Evidence. Handling Digital Evidence requires important steps and procedures. Digital evidence is a source of artifacts in handling a digital-based crime case, one of which comes from digital storage. In this research, the author will design a framework for Digital Forensic investigations by simulating digital evidence in the form of a non-volatile architecture. The reference commonly used by researchers in previous articles is the National Institute of Justice (NIST). The framework is a reference and steps in the practice of acquiring digital evidence. The purpose of designing this framework is as a legal procedure that is specifically implemented in the practice of acquiring non-volatile digital evidence. In the design, the author conducted a literature study on the NIST SP 800-86 and ISO 27037:2012 standards and then combined them in a hybrid terminology. The output of this research is to combine the two standards to become framework as reference for handling and investigating Digital Forensic science.
Sosialisasi Dan Rancangan Jaringan Pipa Air Bersih Di Desa Kampung Pinang Kecamatan Perhentian Raja Kabupaten Kampar roza mildawati; Yolly Adriati; Rizdqi Akbar Ramadhan; Riskon Ramadhan; Dhany Fauzan Azhimy
Dinamisia : Jurnal Pengabdian Kepada Masyarakat Vol. 7 No. 2 (2023): Dinamisia: Jurnal Pengabdian Kepada Masyarakat
Publisher : Universitas Lancang Kuning

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31849/dinamisia.v7i2.11446

Abstract

The need for clean water in Indonesia is still not distributed evenly. Clean water is not distributed evenly due to obstacles and problems. Based on observations in Kampung Pinang Village, Kampar Regency, there is already a clean water reservoir, but in the reservoir there is no clean water distribution system available to homes to meet community needs. To analyze the problems and efforts to complete this research, the researcher uses a literature study that is used to obtain clarity of concepts in research, namely by obtaining books, journals, and previous research, which contains the basics of theory and calculation formulas, and obtains data that support in completing this research, namely secondary data in the form of population data, village maps and other data obtained directly from parties related to this research. The planning of a clean water system network using EPANET 2.0 software in hamlet 1, Kampung Pianang village, Kampar Regency is carried out using the gravity method and using a pump where the water source comes from an existing reservoir. The projected population of Kampung Pinang until 2030 is 1385 people, so by analyzing water needs, it is found that the need for clean water in 2030 is 1.742 l/second. From the simulation results of the EPANET 2.0 software using the gravity method on the clean water network in the village of Kampung Pinang, the highest pressure value is 11.97 m at junction J4 and the lowest pressure is 3.80 m at junction J20. Meanwhile, all pressure values using a pump have met the requirements. The highest velocity (velocity) is 0.14 m/s on pipe P1 and pipe P2 and the lowest speed is 0.01 m/s on pipe P12. The highest energy loss (headloss) is 0.39 m/km in the P1 and P2 pipes and the lowest energy loss is 0.01 m/km in the P12 pipes.
Implementation of Live Forensic Method on Fusion Hard Disk Drive (HDD) and Solid State Drive (SSD) RAID 0 Configuration TRIM Features Desti Mualfah; Rizdqi Akbar Ramadhan; Muhammad Arrafi Arrasyid
JUITA: Jurnal Informatika JUITA Vol. 12 No. 1, May 2024
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/juita.v12i1.19508

Abstract

One of the solutions used for access speeds is to maximize non-volatile storage functions by a conventional Hard Disk Driver with Solid State Drive that has the TRIM architecture using the Redundant Array of Inexpensive Disks 0 configuration or the commonly known RAID 0. RAID 0 is a stripping technique that has the highest speed among other RAID configurations. However, this configuration has a disadvantage in that when there is damage to one of the storage disks all the data will be corrupted and lost. It's becoming one of the challenges in digital forensic investigation when it comes to computer crime. Furthermore, this research uses experimental practices using live forensic methods to perform analysis and examination against the merger of HDD and SSD configuration RAID 0 TRIM features. The expected is an overview of the characteristics of recovery capability to find out the authenticity integrity values of files that have been lost or permanently deleted on both TRIM SSD functions disable and enable. Furthermore, this research is expected to be a solution for the experimental and practical investigation of computer crime especially in Indonesia given the increasing development of technology that is directly compared with the rise in computer crime.