Imam Riadi
Universitas Ahmad Dahlan, Yogyakarta, Indonesia

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Mobile Forensic for Body Shaming Investigation Using Association of Chief Police Officers Framework Yana Safitri; Imam Riadi; Sunardi Sunardi
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol 22 No 3 (2023)
Publisher : LPPM Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v22i3.2987

Abstract

Body shaming is the act of making fun of or embarrassing someone because of their appearance, including the shape or form of their body. Body shaming can occur directly or indirectly. MOBILEdit Forensic Express and Forensic ToolKit (FTK) Imager are used to perform testing of evidence gathered through Chat, User ID, Data Deletion, and Groups based on digital data obtained on IMO Messenger tokens on Android smartphones. This study aimed to collect evidence of conversations in body shaming cases using the Association of Chiefs of Police (ACPO) framework with MOBILedit Forensic Express and FTK Imager as a tool for testing. Based on the research findings, MOBILedit Forensic Express got an extraction yield of 0.75%. In contrast, using the FTK Imager got an extraction yield of 0.25%. The ACPO framework can be used to investigate cases of body shaming using mobile forensics tools so that the extraction results can be found. The results of this study contributed to forensic mobile knowledge in cases of body shaming or cyberbullying ACPO framework as well as for the investigators.
OWASP Framework-based Network Forensics to Analyze the SQLi Attacks on Web Servers Imam Riadi; Abdul Fadlil; Muhammad Amirul Mu'min
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol 22 No 3 (2023)
Publisher : LPPM Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v22i3.3018

Abstract

One of dangerous vulnerabilities that attack the web is SQLi. With this vulnerability, someone can obtain user data information, then change and delete that data. The solution to this attack problem is that the design website must improve security by paying attention to input validation and installing a firewall. This study's objective is to use network forensic tools to examine the designlink website's security against SQLi attacks, namely Whois, SSL Scan, Nmap, OWASP Zap, and SQL Map. OWASP is the framework that is employed; it is utilized for web security testing. According to the research findings, there are 14 vulnerabilities in the design website, with five medium level, seven low level, and two informational level. When using SQL commands with the SQL Map tool to get username and password information on its web server design. The OWASP framework may be used to verify the security of websites against SQLi attacks using network forensic tools, according to the study's findings. So that information about the vulnerabilities found on the website can be provided. The results of this study contribute to forensic network knowledge against SQLi attacks using the OWASP framework as well as for parties involved in website security.
Optimizing Inventory with Frequent Pattern Growth Algorithm for Small and Medium Enterprises Imam Riadi; Herman Herman; Fitriah Fitriah; Suprihatin Suprihatin
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol 23 No 1 (2023)
Publisher : LPPM Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v23i1.3363

Abstract

The success of a business heavily relies on its ability to compete and adapt to the ever-changing market dynamics, especially in the fiercely competitive retail sector. Amidst intensifying competition, retail business owners must strategically manage product placement and inventory to enhance customer service and meet consumer demand, considering the challenges of finding items. Poor inventory management often results in stock shortages or excess. To address this, adopting suitable inventory management techniques is crucial, including techniques from data mining, such as association rule mining. This research employed the FP-Growth algorithm to identify patterns in product placement and purchases, utilizing a dataset from clothing store sales. Analyzing 140 transactions revealed 24 association rules, comprising rules with 2-itemsets and frequently appearing 3-itemset rules. The highest support value in the final association rules with 2-itemsets was 10% with a confidence level of 56%, and the highest support value in the 3-itemsets was 67% with the same confidence level. Additionally, three rules had a confidence level of 100%. Thus, the association rules generated by the FP-Growth frequent itemset algorithm can serve as valuable decision support for sales of goods in small and medium-sized retail businesses.