Analisis Investigasi Cyber Espionage Pada Facebook Menggunakan Digital Forensics Research Workshop (DFRWS)

نویسندگان

چکیده

Media sosial sangat bermanfaat untuk mendapatkan informasi atau data dengan mudah dan cepat seiring peningkatan jumlah pengguna smartphone terutama pada Android. Di sisi lain, mobile instant messangging aplications media membuat prospek adanya tindak kejahatan dunia maya Cybercrime khususnya cyber espionage yaitu tindakan mata-mata terhadap elektronik memanfaatkan jaringan internet. Penelitian ini diharapkan dapat membuka barang bukti digital pelaku yang ada di aplikasi Facebook berupa gambar teks mendukung identifikasi aktivitas menuju espionage. Kerangka kerja menjalankan forensics pengkajian menggunakan metode Digital Forensics Research Workshop (DFRWS) tahapan identification (identifikasi), Preservation (Pemeliharaan) Collection (Pengumpulan), Examination (Pemeriksaan), Analysis (Analisis), Presentation (Presentasi) . Tools digunakan adalah MobilEdit cara ektraksi analisis. Skenario dilakukan kasus facebook. Harapan dari penelitian menghasilkan Forensis Investigative analysis memakai DFRWS mampu mengungkap

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multidimensi Pada Data Warehouse Dengan Menggunakan Rumus Kombinasi

Multidimensional in data warehouse is a compulsion and become the most important for information delivery, without multidimensional data warehouse is incomplete. Multidimensional give the able to analyze business measurement in many different ways. Multidimensional is also synonymous with online analytical processing (OLAP).

متن کامل

Validasi data dengan menggunakan objek lookup pada borland delphi 7.0

s: Developing an application with some tables must concern the validation of input (scpecially in Table Child). In order to maximize the accuracy and input data validation. Its called lookup (took data from other dataset). There are 2 (two) ways to lookup data from Table Parent: 1) Using Objects (DBLookupComboBox & DBLookupListBox), or 2) Arranging The Properties Of Fields Data Type (shown by u...

متن کامل

Digital Forensics in a Cyber Warfare Context

The paper explores the application of digital forensics techniques to cyber warfare scenarios. A common accepted taxonomy for digital forensics (and antiforensics) activities, techniques, procedures and work flows does not yet exist but guidelines and even international standards have given the field a framework: this paper explores how digital forensics can be logically framed in the context o...

متن کامل

Digital Forensics and Cyber Crime Datamining

Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data mining. This paper propo...

متن کامل

Cyber Forensics and Admissibility of Digital Evidence

Cyber Forensics and Admissibility of Digital Evidence by Dr. Swati Mehta* Cite as: (2012) PL January S-23†Section 65-B of the Evidence Act deals with admissibility of electronic records as evidence in the court of law. The computer holding the original evidence does not need to be produced in court. A printout of the record or a copy on a CDROM, hard disk, floppy, etc. can be produced in the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Techno: Jurnal Fakultas Teknik Universitas Muhammadiyah Purwokerto

سال: 2022

ISSN: ['1410-8607', '2579-9096']

DOI: https://doi.org/10.30595/techno.v23i1.9064