Claim Missing Document
Check
Articles

Found 2 Documents
Search

ANALISIS FORENSIK DIGITAL PADA KASUS CYBERBULLYING DENGAN METODE NATIONAL INSTITUTE OF STANDARD AND TECHNOLOGY SP 800-86 Dasmen, Rahmat Novrianda; Muhammad Reihan Pratama; Yasir, Husni; Budiman, Ariff
JURNAL ILMIAH INFORMATIKA Vol 12 No 01 (2024): Jurnal Ilmiah Informatika (JIF)
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v12i01.8344

Abstract

Rapidly developing technology is in line with criminal acts that have increased dramatically, one of the criminal acts that often occur in the digital world is cyberbullying, until the evidence of the event is successfully removed so that it is necessary to search and recover digital data that has been removed to be used as digital evidence, this process is commonly known as digital forensics. Investigation of digital evidence is carried out by applying one of the methods, namely the National Institute of Standard and Technology SP 800-86 (NIST SP 800-86) through stages starting from collecting evidence, analyzing, searching for data, and recovering found data, to validating files with digital flashdisk evidence sources using Autopsy forensic tools. The results of this study show that the use of Autopsy is able to analyze and restore digital evidence previously stored on a flashdisk with a 100% success rate, the data that was successfully recovered consisted of 4 files with the PNG extension and 1 file with the MP4 extension according to the designed case scenario.
Implementation of Hardening for Optimization of Wireless Local Area Network Security Rahmat Novrianda Dasmen; Muhammad Reihan Pratama
PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic Vol. 13 No. 1 (2025): Maret 2025
Publisher : LPPM Universitas Islam 45 Bekasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33558/piksel.v13i1.9957

Abstract

Computer networks use two main methods for data transmission, namely wired and wireless networks or what is known as a Wireless Local Area Network (WLAN). In WLAN networks, the security standard usually used is the WiFi Protected Access 2 Pre-Shared Key or WPA2-PSK protocol, which utilizes SSID and password. Despite using security mechanisms such as WPA2-PSK, criminal activities such as intrusion into the network still occur. Therefore, it is necessary to improve the network security system to ensure that the WLAN network is more secure and can minimize potential risks to users. This study aims to improve and optimize the WLAN network security system through vulnerability scanning using the Nessus tool to test the level of security on the WLAN network and the application of hardening methods to strengthen and disguise vulnerabilities on the WLAN network, which includes various security techniques such as applying raw firewalls and firewall filters, limiting ports and services used and disabling services that are not needed to minimize vulnerabilities, disabling the Mikrotik neighbor discovery protocol service on the router, and implementing port knocking as an additional layer of security. The results of the study show that applying vulnerability scanning techniques and hardening methods can help minimize the level of risk of vulnerabilities found and make the resilience of the WLAN network more optimal so as to avoid potential intrusions and threats of attacks.