Claim Missing Document
Check
Articles

Found 10 Documents
Search

Perbandingan Hasil Forensics Jaringan Terhadap Serangan E-mail Spamming dan Spoofing Fitriyani Tella; Imam Riadi; Sunardi .
Jurnal Ilmiah FIFO Vol 12, No 2 (2020)
Publisher : Fakultas Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22441/fifo.2020.v12i2.001

Abstract

Abstract In the era of technology, email has become one of the important things in the means of communication. Email is a medium for communication and also a place to store crime. One common crime is email spamming and spoofing. Spam is junk mail or unwanted messages, this spam email will be sent to someone's inbox and is useless to the recipient. Spam is sent on the network to increase network traffic. Email spoofing is a way to hide the origin of messages used by spammers. Email spoofing can change the email sender's information ie in the "From" field. Email spoofing comes from the sender which will make the email look like the real sender. The technique used to determine the comparison of email spoofing and spamming attacks using a method is the Network Forensics Development Life Cycle (NFDLC). Network forensics is performed to find out the IP address of the spamming and spoofing e-mail attacks. This research will also produce an email forgery pattern in the header, place and date of the perpetrators of the crime attacks.Keyword: articles, english, Abstracts Abstrak Pada Era teknologi sekarang email telah menjadi salah satu hal yang penting dalam sarana komunikasi. Email merupakan salah satu media untuk berkomunikasi dan juga menjadi tempat untuk menyimpan kejahatan. Salah satu kejahatan yang sering terjadi adalah email spamming dan spoofing.  Spam adalah junk mail atau pesan yang tidak diinginkan, spam email ini akan dikirimkan kepada inbox mail seseorang dan tidak berguna untuk penerima. Spam dikirim pada jaringan untuk meningkatkan lalu lintas jaringan. Email spoofing adalah cara untuk menyembunyikan asal usul pesan yang digunakan oleh spammer. Email spoofing dapat mengubah informasi pengirim email yaitu pada bidang “From”. Email spoofing berasal dari pengirim yang akan menjadikan email tampak seperti pengirim sebenarnya. Teknik yang dilakukan untuk mengetahui perbandingan dari serangan email spoofing dan spamming yaitu menggunakan metode adalah Network Forensics Development Life Cycle (NFDLC). Dilakukan forensik jaringan guna mengetahui ip address dari serangan email spamming dan spoofing tersebut. Penelitian ini juga akan menghasilkan pola pemalsuan email pada header,  tempat dan tanggal dari pelaku melakukan serangan kejahatan. Keyword: Forensik Jaringan, E-mail Spamming, E-mail Spoofing 
Spamming Forensic Analysis Using Network Forensics Development Life Cycle Method Imam Riadi; Sunardi Sunardi; Fitriyani Tella Fitri
INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi Vol 6 No 1 (2022): February 2022
Publisher : Universitas Nusantara PGRI Kediri

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (556.838 KB) | DOI: 10.29407/intensif.v6i1.16830

Abstract

E-mail is electronic mail used to send files, pictures, and others easily and quickly. However, as time goes by, there is a lot of misuse of e-mail, causing inconvenience to the recipient. One of them is spam e-mail sent to many people without prior permission from the intended owner. Hackers can forge e-mail headers anonymously for malicious purposes. The research object is to simulate sending spamming e-mails to 1 victim with a total of 40 spamming e-mails. The research follows the flow of the Network Forensics Development Life Cycle (NFDLC) method with the stages of initiation, acquisition, implementation, operation, and disposition. Simulation of sending e-mail using easy e-mail spammer tools and testing of e-mail using Wireshark tools. The test results show that 40 e-mails were successfully received or entered into the victim's inbox, and the test was successfully carried out by getting results based on predetermined parameters. The parameter is the IP address of the sender or spammer found is 72.125.68.109, the victim's IP address is 192.168.1.12.
Pengembangan Sistem Inventory Alat Tulis Kantor (ATK) Berbasis Web Rusydi Umar; Novita Ranti Muntiari; Ermin E; Iqbal Bustomi; Fitriyani Tella
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i1.190

Abstract

Developments in the technological era are increasingly developing and people's needs vary with the desire to accelerate a job in a systematic and more effective and efficient manner. The problems faced by PT. XYZ in supplies of office equipment are still poorly organized and there is no reporting on the use of office stationery (ATK) and inhibitors of employee productivity because there is no precise inventory information and delays in making reports. Facilitates the company in the process of inventory input Application of the method in this research is to use the classic life cycle (CLC) method, known as the process design, which is carried out sequentially, with the research stages beginning with analysis, design, coding and testing.From the several stages that have been carried out in this researcher can produce reports stock of goods and office stationery information updated to users or visitors.
Pengembangan Sistem Inventory Alat Tulis Kantor (ATK) Berbasis Web Rusydi Umar; Novita Ranti Muntiari; Ermin E; Iqbal Bustomi; Fitriyani Tella
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1175.712 KB) | DOI: 10.30645/j-sakti.v4i1.190

Abstract

Developments in the technological era are increasingly developing and people's needs vary with the desire to accelerate a job in a systematic and more effective and efficient manner. The problems faced by PT. XYZ in supplies of office equipment are still poorly organized and there is no reporting on the use of office stationery (ATK) and inhibitors of employee productivity because there is no precise inventory information and delays in making reports. Facilitates the company in the process of inventory input Application of the method in this research is to use the classic life cycle (CLC) method, known as the process design, which is carried out sequentially, with the research stages beginning with analysis, design, coding and testing.From the several stages that have been carried out in this researcher can produce reports stock of goods and office stationery information updated to users or visitors.
Aplikasi Deteksi Penyakit Tanaman Buah Naga Berbasis Android Dengan Metode Inferensi Forward Chaining Muhammad Rizki Setyawan; Muh Fadli Hasa; Teguh Hidayat Iskandar Alam; Fitriyani Tella
Insect (Informatics and Security): Jurnal Teknik Informatika Vol. 7 No. 1 (2021): Oktober 2021
Publisher : Universitas Muhammadiyah Sorong

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33506/insect.v7i1.1814

Abstract

Buah naga termasuk buah yang unik, karena buah ini dihasilkan dari tanaman kaktus. Buah ini memiliki rasa yang lezat dan memberikan banyak manfaat manfaat bagi tubuh manusia. Dalam menanam buah naga, ada beberapa hal yang perlu diperhatikan agar pohon dapat tumbuh dengan baik, yaitu masalah penyakit. Penyakit merupakan salah satu masalah utama yang meresahkan petani karena dapat mengurangi kualitas dari buah naga dan harga. Untuk mengatasi itu dibutuhkan yang namanya aplikasi sistem pakar untuk mendeteksi penyakit yang menyerang dan membantu memberikan solusi yang tepat, benar, akurat. Dalam penelitian ini menggunakan metode penalaran yaitu Forward Chaining, di mana untuk mencari kesimpulan di mulai dari gejala-gejala yang ada kemudian dicocokkan dengan rule atau aturan yang ada untuk didapatkan solusinya. Hasil penelitian ini adalah penerapan metode forward chaining pada sistem pakar dapat mendeteksi penyakit yang menyerang tanaman buah naga berdasarkan input gejala, dan memberikan solusi penanganan untuk penyakit yang menyerang tanaman buah naga.
Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology Imam Riadi; Sunardi; Fitriyani Tella Nani
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 7 No. 2 (2022): Mei 2022
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (832.523 KB) | DOI: 10.14421/jiska.2022.7.2.83-90

Abstract

Nowadays developments in information technology are growing rapidly, especially in email. Email became one that almost the whole world had. Email is one of the results of developments in information and communication. Email is widely used to exchange information by sending and receiving data, such as document files, pictures, letters, and others. So much for the crimes that often occur in emails. Email crimes that often occur among them are email spoofing. Email spoofing is a forgery that occurs in the header of the email. So, the email is sent as if it were a valid email. Email spoofing is often used in spamming activities. Crimes committed by cybercrime must leave evidence such as IP Address, sender's email, and time of sending the email. This research will do forensics on email spoofing. The research uses the Live Forensics method, where the computer is used in a powered-on state. The research also uses the NIST (National Institute of Standards Technology) research flow. The email that will be analyzed is in the email header section using 3 tools, namely tracer email analyzer, email dossier, and mail header analysis. This analysis will compare and check the accuracy of the email headers using these tools. Emails suspected of email spoofing will be proven using tools. Based on the 'form' received' and 'Message-ID' headers. Based on the results, the tool that meets the value after the analysis is tracer email analysis.
Pelatihan Microsoft Word pada Panti Asuhan Al-Amin Muhammadiyah (Putri) Kota Sorong Fitriyani Tella; Muhammad Rizki Setyawan; Ermin Ermin; Dewi Astria Faroek; Asih Ahistasari; Nurfitri Nurfitri
Jurnal Pengabdian Dharma Laksana Vol 5, No 2 (2023): JPDL (Jurnal Pengabdian Dharma Laksana)
Publisher : LPPM Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32493/j.pdl.v5i2.25693

Abstract

Aplikasi Microsoft Word telah diterapkan hampir di setiap bidang pekerjaan. Begitupula pada bidang pendidikan mulai dari sekolah dasar hingga sekolah menengah atas, dimana siswa menggunakan aplikasi Microsoft Word untuk membantu dalam menyelesaikan tugas-tugas yang diberikan oleh guru. Situasi Panti Asuhan Al-Amin Muhammadiyah saat ini sudah memiliki beberapa komputer yang dapat digunakan anak-anak untuk  tugas sekolah. Namun, komputer tersebut dalam keadaan rusak dan tidak dapat digunakan oleh anak-anak. Sedangkan untuk pengurus panti asuhan, jika diminta untuk mengajari anak-anak aplikasi Microsoft Word merasa sedikit kesulitan mengingat jumlah anak panti yang banyak. Oleh karena dilakukan kegiatan pengabdian berupa pelatihan aplikasi Microsoft Word kepada anak-anak panti asuhan untuk menambah soft skill yang mereka punya serta mempermudah anak-anak dalam menyelesaikan tugas yang diberikan oleh guru. Hasil dari kegiatan ini, anak-anak panti asuhan dapat membuat sebuah surat dan mampu menggunakan aplikasi Microsoft Word untuk menyelesaikan tugas sekolah serta menambah keterampilan soft skill mereka
Forensic Analysis Of Dana Applications Using The ACPO Framework E Ermin; Muhammad Rizki Setyawan; Fitriyani Tella
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 8, No 1 (2023): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v8i1.535

Abstract

The DANA application is a digital wallet platform designed to make all transactions easier, faster and safer, both online and offline. However, apart from the benefits provided, digital wallet applications can also cause harm to their users, namely negative use which can lead to cybercrime cases. Digital forensics is a branch of forensic science that focuses on investigating and finding digital evidence in cybercrime cases. This study aims to conduct a forensic analysis of the DANA application to identify artifacts that have the potential to be used as digital evidence of cybercrime by using the ACPO framework with the assistance of forensic tools such as the Belkasoft Evidence Center and MobilEdit Forensic Express Pro. Based on the research that has been done, it can be concluded that the use of the ACPO Framework to find out the artifacts obtained can be used properly and forensic analysis of the results obtained using two forensic tools, namely the Belkasoft Evidence Center failed to find artifacts that can be used as digital evidence, while the MobilEdit Forensic tool Express Pro only managed to find artifacts in the form of user photos and screenshots of transactions made..
Forensic Analysis Of Dana Applications Using The ACPO Framework E Ermin; Muhammad Rizki Setyawan; Fitriyani Tella
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 8, No 1 (2023): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v8i1.535

Abstract

The DANA application is a digital wallet platform designed to make all transactions easier, faster and safer, both online and offline. However, apart from the benefits provided, digital wallet applications can also cause harm to their users, namely negative use which can lead to cybercrime cases. Digital forensics is a branch of forensic science that focuses on investigating and finding digital evidence in cybercrime cases. This study aims to conduct a forensic analysis of the DANA application to identify artifacts that have the potential to be used as digital evidence of cybercrime by using the ACPO framework with the assistance of forensic tools such as the Belkasoft Evidence Center and MobilEdit Forensic Express Pro. Based on the research that has been done, it can be concluded that the use of the ACPO Framework to find out the artifacts obtained can be used properly and forensic analysis of the results obtained using two forensic tools, namely the Belkasoft Evidence Center failed to find artifacts that can be used as digital evidence, while the MobilEdit Forensic tool Express Pro only managed to find artifacts in the form of user photos and screenshots of transactions made..
Rancang Bangun Sistem Informasi Manajemen Arsip Stnk Berbasis Web Pada Kantor Samsat Aimas Kabupaten Sorong Fitriyani Tella; Rendra Soekarta; Hasri Putri Wattiheluw
Insect (Informatics and Security): Jurnal Teknik Informatika Vol. 9 No. 1 (2023): Oktober 2023
Publisher : Universitas Muhammadiyah Sorong

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33506/insect.v9i1.2870

Abstract

Kantor Samsat Aimas Kabupaten Sorong adalah salah satu kantor pemerintah yang melaksanakan pelayanan publik bertujuan untuk menambah sumber pendapatan asli daerah (PAD). Namun dalam pengolahan arsip, penyimpanan file Stnk masih dilakukan secara manual dengan metode memasukkan data di buku jurnal, pencarian letak arsip yang memakan waktu sangat lama karena letak arsip masih belum terstruktur dan tumpukan dokumen yang belum tertata. Tujuan dari penelitian ini yaitu membuat sistem informasi mananjemen arsip stnk berbasis website diharapkan dapat mempermudah petugas baur Stnk dalam melaksanakan tugas serta tanggung jawabnya dalam memberikan pelayanan kepada masyarakat. Metode yang digunakan dalam membangun sistem informasi manajemen arsip Stnk menggunakan metode Extreme Programming (XP) dan menggunakan bahasa pemrograman php serta menggunakan mysql sebagai tempat penyimpanan data. Hasil dari sistem yang diuji menggunakan metode blackbox dan usabilty testing. Berdasarkan hasil penelitian berupa pengujian sistem yang menggunakan blackbox testing, bahwa semua komponen halaman yang telah dibangun pada sistem informasi manajemen arsip STNK berhasil dan berfungsi dengan baik, serta dapat digunakan untuk user. Hasil perhitungan kuisioner diperoleh dari 10 responden dan dirata-ratakan pada aspek kegunaan berdasarkan pembagian  nilai total setiap aspek yang diukur dengan jumlah pernyataan, tes ini memperoleh skor 90%.Pemaparan ini menunjukkan bahwa website ini cocok digunakan oleh petugas baur Stnk dalam memproses repositori Stnk