Al Jum'ah, Muhammad Na'im
Unknown Affiliation

Published : 9 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 9 Documents
Search

PENERAPAN METODE COMPOSITE LOGIC UNTUK PERANCANGAN FRAMEWORK PENGUMPULAN BUKTI DIGITAL PADA MEDIA SOSIAL Al Jumah, Muhammad Naim; Sugiantoro, Bambang; Prayudi, Yudi
ILKOM Jurnal Ilmiah Vol 11, No 2 (2019)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (615.256 KB) | DOI: 10.33096/ilkom.v11i2.442.135-142

Abstract

Social media has become a major part of society. But most of the time social media is used as a way people commit the crime. Due to numerous crimes that use social media, it is essential to design a framework to gather digital evidence on social media. This study develops the design of Framework by implementing Composite Logic Model.  A logic Composite model can be used to determine the role model of any variable or pattern that need to collaborate. Composite Logic Model will produce a role model that has a role to produce patterns so that it can produce the same goal. A method of Composite Logic will collaborate with the Digital Forensics Investigation framework to produce a Digital Evidence Collection Framework on Social Media. Based on data and facts, this study has been producing a new framework of gathering digital evidence on social media. The framework has four main stages in the process of collecting digital evidence on social media including pre-process, collection, analysis, and report.
PENERAPAN METODE COMPOSITE LOGIC UNTUK PERANCANGAN FRAMEWORK PENGUMPULAN BUKTI DIGITAL PADA MEDIA SOSIAL Muhammad Naim Al Jumah; Bambang Sugiantoro; Yudi Prayudi
ILKOM Jurnal Ilmiah Vol 11, No 2 (2019)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v11i2.442.135-142

Abstract

Social media has become a major part of society. But most of the time social media is used as a way people commit the crime. Due to numerous crimes that use social media, it is essential to design a framework to gather digital evidence on social media. This study develops the design of Framework by implementing Composite Logic Model.  A logic Composite model can be used to determine the role model of any variable or pattern that need to collaborate. Composite Logic Model will produce a role model that has a role to produce patterns so that it can produce the same goal. A method of Composite Logic will collaborate with the Digital Forensics Investigation framework to produce a Digital Evidence Collection Framework on Social Media. Based on data and facts, this study has been producing a new framework of gathering digital evidence on social media. The framework has four main stages in the process of collecting digital evidence on social media including pre-process, collection, analysis, and report.
ANALISA KEAMANAN DAN HUKUM UNTUK PELINDUNGAN DATA PRIVASI Muhammad Na’im Al Jum’ah
Cyber Security dan Forensik Digital Vol. 1 No. 2 (2018): Edisi November 2018
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (244.582 KB) | DOI: 10.14421/csecurity.2018.1.2.1370

Abstract

Teknologi informasi telah merubah pola hidup masyarakat secara global dan menyebabkan perubahan sosial budaya, ekonomi, dan kerangka hukum yang berlangsung dengan signifikan. Meskipun penetrasi internet di masyarakat masih sangat kurang bila dibandingkan dengan jumlah total penduduk Indonesia, kini sistem informasi dan komunikasi elektronik telah diimplementasikan pada hampir semua sektor kehidupan dalam masyarakat. Penyalagunaan data juga menjadi perhatian khusus. Banyak pelanggaran data yang terjadi karena implementasi yang buruk atau tidak adanya kontrol keamanan baik di perusahaan swasta maupun di organisasi pemerintahan. Paper ini akan membahas tentang bagaimana pengawasan data privasi  dan peraturan hukum mengenai perlindungan data pribadi. Dari hasil analisa tehadap pengawasan data pribadi bahwa ada dua pihak yang mampu dan punya peluang melakukan pengawasan massal, yaitu pihak swasta dan pemerintah. Pihak swasta bisa berasal dari penyedia layanan dan konten online, penyedia layanan internet atau pemilik infrastruktur internet sedangkan tugas negara adalah melindungi serta menjamin hak warganya. Namun pihak pemerintah sering menggunakan keamanan sebagai dalih untuk mendasari tindakan-tindakan yang melanggar hak atas privasi.  Indonesia telah memiliki beberapa undang-undang yang mengatur tentang keamanan data privasi duantaranya adalah Undang-undang Nomor 7 Tahun 1971 tentang Ketentuan Pokok Kearsipan, Undang-undang Nomor 8 Tahun 1997 tentang Dokumen Perusahaan, Undang-undang Nomor 7 Tahun 1992 jo Undang-undang Nomor 10 Tahun 1998 tentang Perbankan, Undang-undang Nomor 36 Tahun 1999 tentang Telekomunikasi, Undang-undang Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik
Implementasi Steganografi Metode Least Significant Bit (LSB) untuk Menyembunyikan File Pesan dalam Gambar Muhammad Naim Al Jumah; Sarimuddin Sarimuddin
Jurnal Informatika dan Rekayasa Perangkat Lunak Vol 6, No 1 (2024): Maret
Publisher : Universitas Wahid Hasyim

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36499/jinrpl.v6i1.10143

Abstract

Ease of image manipulation is not something difficult. Images become a more effective communication medium for society. The development of software for image manipulation, increasing crime such as phishing and bullying in cyberspace. The Least Significant Bit method is a steganography method that can be used to encrypt or hide messages in images. Hiding information in various media files such as images is done to maintain the confidentiality of the messages sent. This research implements the Least Significant Bit (LSB) method to hide a message file in an image. This research carries out encryption and description of the message to be sent by inserting a file into the image. This research will also carry out a testing process for the stego image. From the results of tests that have been carried out by carrying out three processes of sending stego image files via copying files with a flash disk, email and sending via WhatsApp with a document model, the results obtained are that stego image files can still be extracted data to get messages that have been encrypted in the image, However, when the stego image file is sent via WhatsApp using the image sending method, the stego image cannot be extracted. This happens because there has been a change in the extension of the file downloaded from WhatsApp. This is also influenced by data changes in the form of file compression from the WhatsApp application. Where every file sent via the WhatsApp application will experience file compression so that data changes will occur
A Implementasi Model Digital Forensik Procces Untuk Sosial Media Investigation Dengan Tools Hunchly Al Jum'ah, Muhammad Na'im; Wijaya, Hamid; Ismail, Rima Ruktiari
Cyber Security dan Forensik Digital Vol. 6 No. 2 (2023): Edisi Bulan November tahun 2023
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2023.6.2.4265

Abstract

Perkembangan teknologi yang semakin pesat dapat menjadi dampak posistif dan dapat negatif. Dampak positifnya adalah proses penyebaran informasi yang semakin cepat, namun dampak negatifnya adalah banyaknya informasi hoax dan hate space yang terjadi di media sosial akibat tidak adanya filter dan pengecekan keabsahan informasi. Hal ini juga mengakibatkan banyaknya tindak kejahatan yang terjadi di media sosial. Salah satu pemecahan masalah dengan banyaknya kasus yang terjadi akibat penyalahgunaan media sosial adalah dengan melakukan proses invesitgasi forensic pada social media. Proses investigasi forensik ini dilakukan dengan metode live investigation menggunakan metode digital forensik proses yang terdiri dari proses Collection, Examination, Analysis dan Reporting. Proses pengumpulan barang bukti dengan menggunakan tools hunchly sehingga dapat dilakukan proses investigasi secara langsung. Hasil dari penelitian ini adalah dengan memanfaatkan metode digital forensik proses dan penggunaan tools hunchly untuk melakukan teknik live investigation untuk melakukan pengumpulan bukti digital dari akun-akun media sosial yang melakukan tindak kejahatan di media sosial sehingga dapat di proses sesuai dengan peraturan hukum yang telah berlaku Kata kunci: Bukti Digital, Media Sosial, Digital Forensik, Hunchly ------------------------------------------------------------------- The increasingly rapid development of technology can have both positive and negatif impacts. The positive impact is that the process of disseminating information is getting faster, but the negatif impact is the large amount of hoax information and hate space that occurs on social media due to the absence of filters and checking the validity of the information. This also results in many crimes occurring on social media. One solution to the problem with the many cases that occur due to misuse of social media is to carry out a forensic investigation process on social media. This forensic investigation process is carried out using the live investigation method using a digital forensic process method consisting of Collection, Examination, Analysis and Reporting processes. The process of collecting evidence uses powerful tools so that the investigation process can be carried out directly. The results of this research are by utilizing digital forensic process methods and using hunchly tools to carry out live investigation techniques to collect digital evidence from social media accounts that commit crimes on social media so that it can be processed in accordance with applicable legal regulations. Keywords: Sosial Media, Digital Forensics, Hunchly
PERANCANGAN SMART TRASH BIN MENGGUNAKAN LOGIKA FUZZY BERBASIS ARDUINO DI SDN 5 MAWASANGKA, BUTON TENGAH Nurjannah, Nurjannah; Muchtar, Mutmainnah; Sarimuddin, Sarimuddin; Sya'ban, Kharis; Karim, Rahmat; Al Jum'ah, Muhammad Na'im
Jurnal Informatika dan Teknik Elektro Terapan Vol 12, No 3 (2024)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v12i3.4358

Abstract

Smart Trash Bin is a technological innovation that integrates sensors and automation systems to enhance waste management efficiency. This study aims to design and implement a Smart Trash Bin using fuzzy logic based on Arduino at SDN 5 Mawasangka, Buton Tengah. In this research, the system utilizes ultrasonic sensors to detect the trash level inside the bin, servo motors to control the automatic lid of the trash bin, and DFPlayer Mini along with a speaker to provide audio notifications to users. Fuzzy logic method is employed to regulate the system's decisions in managing the trash bin operations based on environmental conditions. The study involves the stages of design, fabrication, and system testing in the elementary school environment. The test results indicate that the designed Smart Trash Bin can effectively manage waste with adequate accuracy. It is expected that the implementation of this Smart Trash Bin can help raise awareness of environmental cleanliness within the school and surrounding community
A Comparative Analysis of Forensic Similarity and Scale Invariant Feature Transform (SIFT) for Forensic Image Identification Al Jum'ah, Muhammad Na'im; Wijaya, Hamid; Pomalingo, Suwito
ILKOM Jurnal Ilmiah Vol 16, No 3 (2024)
Publisher : Prodi Teknik Informatika FIK Universitas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v16i3.2357.371-381

Abstract

The image manipulation process has contributed to the widespread dissemination of false information. image forensics can help law enforcement agencies in addressing the spread of false news or information issues through visual media. Forensic image identification can be conducted using various methods, including Scale Invariant Feature Transform (SIFT) and Forensic Similarity. This study compared two methods, SIFT and Forensic Similarity, for forensic image identification. The test results showed the SIFT method identified image forensics by detecting image similarity through calculation of the key point values of each image. The process of searching the key point values was performed to extract information from the image. A high key point value indicated a large amount of information obtained from the image extraction results. On the other hand, the Forensic Similarity method also performed image forensic detection by examining whether image patches shared the same forensic traces. The advantage of the Forensic Similarity method over the SIFT method was that Forensic Similarity was more detailed because it involved many processes. Thus, Forensic Similarity was able to find similarities between two image patch objects. Additionally, the results obtained from the Forensic Similarity method were more detailed in detecting image similarity by considering the key point matching value and Cosine Similarity. Several previous studies have already implemented the SIFT and Forensic Similarity methods for image forensics, but there was no research that directly compared these two methods. This is the strength of this research. However, this study only used three data samples from three different devices for data collection. Future research can use a larger sample size to observe the comparison results
PERANCANGAN SMART TRASH BIN MENGGUNAKAN LOGIKA FUZZY BERBASIS ARDUINO DI SDN 5 MAWASANGKA, BUTON TENGAH Nurjannah, Nurjannah; Muchtar, Mutmainnah; Sarimuddin, Sarimuddin; Sya'ban, Kharis; Karim, Rahmat; Al Jum'ah, Muhammad Na'im
Jurnal Informatika dan Teknik Elektro Terapan Vol. 12 No. 3 (2024)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v12i3.4358

Abstract

Smart Trash Bin is a technological innovation that integrates sensors and automation systems to enhance waste management efficiency. This study aims to design and implement a Smart Trash Bin using fuzzy logic based on Arduino at SDN 5 Mawasangka, Buton Tengah. In this research, the system utilizes ultrasonic sensors to detect the trash level inside the bin, servo motors to control the automatic lid of the trash bin, and DFPlayer Mini along with a speaker to provide audio notifications to users. Fuzzy logic method is employed to regulate the system's decisions in managing the trash bin operations based on environmental conditions. The study involves the stages of design, fabrication, and system testing in the elementary school environment. The test results indicate that the designed Smart Trash Bin can effectively manage waste with adequate accuracy. It is expected that the implementation of this Smart Trash Bin can help raise awareness of environmental cleanliness within the school and surrounding community
Analisis Pengaruh Kompresi File Pada Media Sosial Terhadap Ketahanan Image Steganografi Pada Metode Least Significant Bit (LSB) Al Jum'ah, Muhammad Na'im; Arifin, Arifin
Cyber Security dan Forensik Digital Vol. 8 No. 2 (2025): Edisi November 2025
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2025.8.2.5310

Abstract

Media sosial saat ini menjadi platform utama untuk pertukaran informasi di kalangan masyarakat luas. Platform seperti Facebook, Instagram, dan Twitter memungkinkan pengguna untuk berbagi gambar dengan audiens yang sangat besar. Namun, penggunaan media sosial ini juga menimbulkan kekhawatiran terkait privasi dan keamanan data, karena informasi yang dibagikan di platform ini rentan terhadap ancaman kejahatan. Metode Least Significant Bit (LSB) merupakan salah satu teknik steganografi yang paling sederhana dan paling banyak digunakan dalam penyembunyian data. Tujuan dari penelitian ini adalah untuk mengembangkan dan mengimplementasikan metode steganografi LSB yang lebih aman dan tahan terhadap serangan dan gangguan. Metode Least Significant Bit (LSB) merupakan salah satu teknik steganografi yang efektif untuk menyembunyikan pesan dalam media digital, termasuk gambar. Namun efektivitas metode ini dapat dianalisis berdasarkan beberapa parameter, seperti kapasitas penyimpanan, keterlihatan, dan ketahanan terhadap kompresi atau manipulasi gambar, khususnya pada platform media sosial seperti Telegram, Instagram, dan Facebook. Hasil pengujian yang dilakukan menunjukkan, file pesan yang telah disembunyikan dalam gambar tidak dapat ditemukan lagi akibat perubahan ekstensi dari file gambar yang telah di kirim serta penerapan metode kompresi lossy pada masing-masing platform media sosial juga mempengaruhi file stego yang ada. Kata kunci: Digital Forensik, Sosial Media, Gambar, Steganografi, Least Significant Bit -------------------------------------------------------------------------------------------------- Analysis Of The Effect Of File Compression On Social Media On Image Steganography Resilience In The Least Significant Bit (LSB) Method Social media is currently a major platform for information exchange among the wider community. Platforms such as Facebook, Instagram, and Twitter allow users to share images with a very large audience. However, the use of social media also raises concerns regarding privacy and data security, because information shared on these platforms is vulnerable to threats of crime. The Least Significant Bit (LSB) method is one of the simplest and most widely used steganography techniques in data hiding. The purpose of this study is to develop and implement a LSB steganography method that is more secure and resistant to attacks and interference. The Least Significant Bit (LSB) method is one of the effective steganography techniques for hiding messages in digital media, including images. However, the effectiveness of this method can be analyzed based on several parameters, such as storage capacity, visibility, and resistance to compression or image manipulation, especially on social media platforms such as Telegram, Instagram, and Facebook. Test results show that message files that have been hidden in images can no longer be found due to changes in the extension of the image file that has been sent. The application of lossy compression methods on each social media platform also affects the existing stego file.. Keywords: Digital Forensics, Social Media, Image, Steganography, Least Significant Bit