Chairul Muriman
Universitas Indonesia

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Use Of Digital Forensic Technology To Reveal The Identity Of Social Engineering Crimes Bara Pratama Mahaputra*; Chairul Muriman; Surya Nita
Riwayat: Educational Journal of History and Humanities Vol 7, No 3 (2024): July, Educational and Social Issue
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24815/jr.v7i3.39700

Abstract

The threat of social engineering attacks is highly evident in Indonesia. This is reflected in the IDADX report, which shows a significant increase in phishing attack complaints in Indonesia during the first quarter of 2023, with 26,675 reports, up from 6,106 reports in the fourth quarter of 2022. The highest number of attacks occurred in February with 15,050 cases. This also resulted in Indonesia being the 8th country with the highest number of data breach cases globally, with 820,000 cases in the second quarter of 2022, according to Surfshark. The purpose of this research is to analyze the utilization of digital forensic technology in collecting digital evidence to reveal the identities of social engineering crime perpetrators. The writing of this article uses a qualitative analysis method supported by digital forensic theory. The results of the discussion indicate that forensics focuses on the identification, collection, analysis, and preservation of digital evidence that can be used in legal proceedings. Digital forensics leverages computer technology and digital devices to uncover and secure information relevant to a crime. In social engineering crimes, which involve psychological manipulation to obtain information or certain access from victims, digital forensics plays a crucial role in identifying, collecting, analyzing, and preserving digital evidence that can reveal the identities of the perpetrators and their methods. Digital forensic technology is used to analyze emails, text messages, activity logs, and other digital traces left by the perpetrators.
Interventive Policing In Natural Disaster Mitigation Through Integrated Technology Application Management In Pulang Pisau District Kurniawan Hartono*; Chairul Muriman; Suryadi Suryadi
Riwayat: Educational Journal of History and Humanities Vol 7, No 3 (2024): July, Educational and Social Issue
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24815/jr.v7i3.39699

Abstract

lectronic Natural disasters in Indonesia from 2014-2023 have caused numerous casualties and infrastructure damage. Disaster mitigation and planning efforts need to be enhanced to reduce future damages. Although information technology such as the Lancang Kuning application, INA-Buoy, INA-CBT, PUMMA, LIPI-WISELAND, LEWS, and FEWS have been utilized for disaster mitigation, there are still weaknesses such as the vulnerability of sensor infrastructure and high operational costs. The role of the Indonesian National Police (Polri) in disaster management is crucial, including protecting lives and property, evacuation, and maintaining security in affected areas. The writing of this article uses a qualitative analysis method supported by institutional theory. The discussion results show that interventive policing is a proactive approach to law enforcement focusing on preventing crimes and disturbances through direct intervention before problems develop into more serious situations. In natural disaster mitigation in Pulang Pisau Regency, this approach involves the use of data and technology to predict and respond early to potential threats. Integrated technology application management becomes an important strategy, utilizing information and communication technology to enhance effectiveness in data collection, early warning, evacuation, and post-disaster recovery.