Claim Missing Document
Check
Articles

Found 23 Documents
Search

ANALISIS LIVE FORENSICS UNTUK PERBANDINGAN KEMANANAN EMAIL PADA SISTEM OPERASI PROPRIETARY Faiz, Muhammad Nur; Umar, Rusydi; Yudhana, Anton
ILKOM Jurnal Ilmiah Vol 8, No 3 (2016)
Publisher : Program Studi Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1108.42 KB)

Abstract

Email menjadi salah satu media untuk berkomunikasi dan bisa menyimpan bukti kejahatan, saat ini telah banyak kejahatan yang terjadi melalui media ini. Digital forensics merupakan salah satu ilmu untuk menemukan barang bukti termasuk email sebagai bukti digital.  Analisis digital forensik terbagi menjadi dua, yaitu tradisional / dead dan live forensics. Analisis forensics tekni digital tradisional menyangkut data yang disimpan secara permanen di perangkat, sedangkan analisis live forensics yaitu analisis menyangkut data sementara yang disimpan dalam peralatan atau transit di jaringan. jurnal ini mengusulkan analisis forensics live di sistem operasi terbaru yaitu Windows 10. Studi kasus berfokus pada kemanan beberapa email seperti Gmail, Yahoo dan Outlook dan beberapa browser secara umum seperti Google Chrome, Mozilla Firefox, dan Microsoft Edge. Hasil Eksperimen penelitian ini yaitu masing-masing penyedia email menambahkan fitur tersendiri demi keamanan user.
Comparison of Acquisition Software for Digital Forensics Purposes Faiz, Muhammad Nur; Prabowo, Wahyu Adi
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 1, February 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (409.756 KB) | DOI: 10.22219/kinetik.v4i1.687

Abstract

Digital Forensics, a term that is increasingly popular with internet needs and increasing cybercrime activity. Cybercrime is a criminal activity with digital media as a tool for committing crimes. The process for uncovering cybercrime is called digital forensics. The initial stage in digital forensics is an acquisition. The acquisition phase is very important because it will affect the level of difficulty and ease in investigating cybercrime. Software acquisition will affect the abandoned artefacts and even overwrite important evidence by the software, therefore investigators must use the best software for the acquisition stage. This study shows the difference in software for the acquisition of the best Random Access Memory (RAM) such as processing time, memory usage, registry key, DLL. This research presents five acquisition software such as FTK Imager, Belkasoft RAM Capturer, Memoryze, DumpIt, Magnet RAM Capturer. Results of this study showed that FTK Imager left about 10 times more artefacts than DumpIt and Memoryze. Magnet RAM Capture the most artefacts, 4 times more than Belkasot RAM Capturer. Software acquisition with many artefacts, namely Capture RAM Magnet and FTK Imager, while for the fastest time is DumpIt and Capture RAM Magnet for software that takes a long time.
Review Tools Web Browser Forensics untuk Mendukung Pencarian Bukti Digital Sidiq, Muhammad Fajar; Faiz, Muhammad Nur
JEPIN (Jurnal Edukasi dan Penelitian Informatika) Vol 5, No 1 (2019): Volume 5 No 1
Publisher : Program Studi Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (200.154 KB) | DOI: 10.26418/jp.v5i1.31430

Abstract

Perkembangan penggunaan internet yang semakin banyak setiap tahunnya mengakibatkan penggunaan web browser juga meningkat. Hal ini berdampak pada kejahatan dengan menggunakan web browser juga meningkat seperti penyalahgunaan email, hoax, hate speech, penipuan dan lainnya. Penelitian ini menunjukkan pentingnya mengenali aktivitas penggunaan web browser dari sisi korban dan pelaku. Penggunaan web browser ini akan menentukan pola atau alur kejahatan pada suatu insiden kejahatan. Hal ini akan membantu penyidik dalam menganalisis bukti digital secara cepat dan dapat mengungkap jenis kejahatan yang terjadi secara baik. Bukti digital yang dianalisis seperti akun, kata kunci pencarian, kunjungan web, dan lainnya. Penelitian ini memberikan penjelasan lokasi penyimpanan bukti digital, format waktu yang digunakan dan 10 tools yang digunakan penyidik dalam mengungkap kejahatan dengan media web browser seperti Google Chrome, Mozilla Firefox, Internet Explorer, Safari dan Opera.
Experimental Analysis of Web Browser Sessions Using Live Forensics Method Rusydi Umar; Anton Yudhana; Muhammad Nur Faiz
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (352.436 KB) | DOI: 10.11591/ijece.v8i5.pp2951-2958

Abstract

In today's digital era almost every aspect of life requires the internet, one way to access the internet is through a web browser. For security reasons, one developed is private mode. Unfortunately, some users using this feature do it for cybercrime. The use of this feature is to minimize the discovery of digital evidence. The standard investigative techniques of NIST need to be developed to uncover an ever-varied cybercrime. Live Forensics is an investigative development model for obtaining evidence of computer usage. This research provides a solution in forensic investigation effectively and efficiently by using live forensics. This paper proposes a framework for web browser analysis. Live Forensics allows investigators to obtain data from RAM that contains computer usage sessions. 
Implementasi Sistem Informasi Arsip Desa Widarapayung Wetan Cilacap Untuk Peningkatan Pelayanan Pemerintah Ratih Hafsarah Maharrani; Prih Diantono Abda’u; Muhammad Nur Faiz; Agus Susanto; Hety Dwi Astuti; Oman Somantri; Santi Purwaningrum
Jurnal Abdimas PHB : Jurnal Pengabdian Masyarakat Progresif Humanis Brainstorming Vol 5, No 1 (2022): Jurnal Abdimas PHB : Jurnal Pengabdian Masyarakat Progresif Humanis Brainstormin
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/japhb.v5i1.3099

Abstract

Kondisi pengelolaan arsip di Desa Widarapayung Wetan Cilacap saat ini masih dilakukan secara konvensional, sedangkan kecepatan dan ketepatan dalam pencarian data arsip surat sangat berpengaruh kepada kualitas layanan. Dokumentasi surat masuk dan surat keluar saat ini masih secara konvensional dan berbentuk catatan yang ditulis pada buku besar berakibat sering terjadinya kesalahan dalam peyimpanan data kearsipan dan pencarian surat. Berdasarkan kesepakatan, untuk mengatasi permasalahan maka diberikanlah solusi dengan membangun sebuah aplikasi sistem informasi arsip yang dimplementasikan di desa Widarapayung Wetan Cilacap dengan harapan masalah dapat teratasi dan adanya peningkatan pelayanan. Tahapan kegiatan yang dilakukan yakni dengan melakukan assessment permasalahan, perencanaan kegiatan, pembangunan sistem, ujicoba sistem, implementasi dan evaluasi sistem, serta tahapan akhir adalah pelatihan user dan pendampingan. Berdasarkan hasil pembangunan sistem yang telah dibuat Desa Widarapayung Wetan Cilacap saat ini sudah dapat berupaya untuk meningkatkan pelayanan khususnya dalam pengelolaan arsip yang sudah dapat diakukan secara digital.
Online Presence System Development Website-Based using Prototype Methods Muhammad Nur Faiz; Nur Wahyu Rahadi; Nur Wachid Adi Prasetya
TEKNOLOGI DITERAPKAN DAN JURNAL SAINS KOMPUTER Vol 4 No 1 (2021): June
Publisher : Unusa Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33086/atcsj.v4i1.2096

Abstract

In the current era of the Covid-19 pandemic, almost all activities use technology, such as the lecture process. Almost all of the lecturing processes in high education are carried out online because it is to reduce the risk of contracting covid-19. The manual presences system by filling out forms or signatures is no longer effective because it has to be done offline. The online presence system is a system that is needed to find out about lectures, the discipline of teaching and students. The method used in the development of this system is Prototype. This method has the advantage of paying close attention to user needs and a faster time for software development. The results of this study are a system for online presence in the era of the Covid-19 pandemic in real-time with photo evidence. Teaching can validate and change the presence of students. In addition, the admin can easily recap the number of teaching and students presences for reporting. Teaching also finds it helpful to take the results of student presences for reporting the completeness of the assessment data and the head of the study program can see the presences summary report online. This system has been tested for functionality with an average result of 83.5% so that it can be said to be successfully built according to user needs
Impact of Feature Selection Methods on Machine Learning-based for Detecting DDoS Attacks : Literature Review Muhammad Nur Faiz; Oman Somantri; Abdul Rohman Supriyono; Arif Wirawan Muhammad
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 5, No 2 (2022): Issues January 2022
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31289/jite.v5i2.6112

Abstract

Cybersecurity attacks are becoming increasingly sophisticated and increasing with the development of technology so that they present threats to both the private and public sectors, especially Denial of Service (DoS) attacks and their variants which are often known as Distributed Denial of Service (DDoS). One way to minimize this attack is by using traditional mitigation solutions such as human-assisted network traffic analysis techniques but experiencing some limitations and performance problems. To overcome these limitations, Machine Learning (ML) has become one of the main techniques to enrich, complement and enhance the traditional security experience. The way ML works are based on the process of data collection, training and output. ML is influenced by several factors, one of which is feature engineering. In this study, we focus on the literature review of several recent studies which show that the feature selection process greatly impacts the level of accuracy of this ML. Datasets such as KDD, UNSW-NB15 and others also affect the level of accuracy of ML. Based on this literature review, this study can observe several feature engineering strategies with relevant impacts that can be chosen to improve ML solutions on DDoS attacks.
SISTEM INFORMASI PEMBAYARAN UANG SEKOLAH DENGAN MODEL MVC DAN MENGGUNAKAN NOTIFIKASI SMS GATEWAY Dwi Cita Septia Candra; Lutfi Syarifullah; Muhammad Nur Faiz
Jurnal Sistem Informasi dan Informatika (Simika) Vol 4 No 2 (2021): Jurnal Sistem Informasi dan Informatika (Simika)
Publisher : Program Studi Sistem Informasi, Universitas Banten Jaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47080/simika.v4i2.1313

Abstract

The Tuition Payment Information System was designed because at this time the payment of tuition at SMP Islam Cilacap still uses the general ledger, causing inaccuracies in payment data by employees (administrative). The purpose of this research is to help solve problems in the processing of tuition payment data, making payment data reports, searching payment data, knowing payment data information, and knowing the school money payment report. The system is designed using MVC (Model-View-Controller) architecture and SMS Gateway notifications as well as system development methods using System Development Life Cycle (SDLC) with Waterfall model. In addition, the system design uses PHP and HTML programming languages, database management is MySQL and uses the Laravel framework. Based on the results of the system test and the results of the questionnaire by 10 respondents that 14% stated enough, 44% stated well and 42% stated very well calculated by the calculation of the Likert scale of 86% entered the excellent qualification which means successful. So it can be concluded that this system can solve existing problems by facilitating the processing of payment data, assisting in the creation of school money payment reports, helping in speeding up the search for payment data, knowing the payment information of tuition without having to come to school, and knowing the payment data report quickly without having to go through a long recap process.
Sistem Pengendalian Persediaan Barang Berbasis Website dengan Metode Economic Order Quantity dan Reorder Point Muhammad Nur Faiz; Seppy Ayu Rachmawati; Lutfi Syafirullah
Jurnal Ilmu Komputer Vol 14 No 2 (2021): Jurnal Ilmu Komputer
Publisher : Informatics Department, Faculty of Mathematics and Natural Sciences, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JIK.2021.v14.i02.p06

Abstract

Inventory of goods is one of the important factors in developing a business. This inventory affects operational costs. Excess inventory will also lead to greater storage and maintenance costs. Meanwhile, a lack of inventory will cause stock out. Website Inventory information system with the Economic Order Quantity (EOQ) and ReOrder Point (ROP) method can be an alternative to overcome this problem. This information system was developed using the SDLC (System Development Life Cycle) development method. The programming language used is PHP Hypertext Preprocessor, MySQL as database, and Xampp as a web server. EOQ method can determine the level of inventory required by the company. Meanwhile, the ROP to determine the time an item is in the warehouse must be added to the inventory before it runs out. This research results that the determination of the quantity of purchase inventory using the EOQ method and the ROP method is more efficient and the inventory becomes more optimal so that the store can get maximum profit. The results of the system functionality test show that this system works very well
Implementasi Metode Waterfall dalam Sistem Informasi Knowledge Management untuk Digital Marketing Nur Chasanah; Prih Diantono Abda’u; Muhammad Nur Faiz
Infotekmesin Vol 12 No 1 (2021): Infotekmesin: Januari 2021
Publisher : P3M Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/infotekmesin.v12i1.363

Abstract

The development of digital technology directs organizations to be able to cultivate knowledge as an asset that can help its business activities. Knowledge management is considered necessary to be implemented in organizations involving many stakeholders. The implementation of annual management needs to be implemented by involving the utilization. This research was conducted to implement knowledge management in organizations that involve many knowledge assets in the business process, especially related to digital marketing activities. The purpose of this research is to identify organizational knowledge and produce knowledge sharing media systems. This research uses waterfall method in the development of its system so that the result of this research is a knowledge management information system that facilitates knowledge sharing activities that have been identified and can facilitate users in finding data, information and knowledge that is useful in fostering innovations related to digital marketing in the organization.