Claim Missing Document
Check
Articles

Found 3 Documents
Search

Identifikasi Bukti Digital pada Akuisisi Perangkat Mobile dari Aplikasi Pesan Instan “WhatsApp” Ayubi Wirara; Bangkit Hardiawan; Muhammad Salman
Teknoin Vol. 26 No. 1 (2020)
Publisher : Faculty of Industrial Technology Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20885/teknoin.vol26.iss1.art7

Abstract

Aplikasi pesan instan menjadi salah satu alasan utama untuk seorang pengguna menggunakan internet. Saat ini WhatsApp menjadi aplikasi pesan instan dengan pengguna terbesar di indonesia karena beragam fitur yang telah didukung. Hal ini tentu saja membuat WhatsApp bukan hanya digunakan untuk bertukar informasi biasa tapi juga informasi terkait kasus kejahatan. Sehingga bukti digital aplikasi pesan instan WhatsApp pada smartphone menjadi potensial dalam berbagai kasus kriminal dan proses persidangan. Pada penelitian ini dilakukan analisis terhadap bukti digital whatsapp yang dapat diperoleh dalam proses akuisisi perangkat smartphone. Target perangkat yang diakuisisi pada penelitian ini adalah smartphone berbasis android dan iOS. Hasil ekstraksi didapatkan beberapa bukti digital aplikasi WhatsApp yang berhasil didapatkan meskipun perangkat tidak dilakukan proses root/jailbreak terlebih dahulu.
Ransomware Attacks Threat Modeling Using Bayesian Network: Pemodelan Ancaman Serangan Ransomware Menggunakan Bayesian Network Sulistiadi; Muhammad Salman
Digital Zone: Jurnal Teknologi Informasi dan Komunikasi Vol. 14 No. 1 (2023): Digital Zone: Jurnal Teknologi Informasi dan Komunikasi
Publisher : Publisher: Fakultas Ilmu Komputer, Institution: Universitas Lancang Kuning

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31849/digitalzone.v14i1.13788

Abstract

Ransomware is a dangerous malware that blocks access to data through encryption, and it exploits device vulnerabilities to perform chain attacks from one system to another. This study results in modeling the threat of ransomware attacks using Bayesian Network. The structure of the model is created using device vulnerabilities that can be exploited. As the basis for calculating the probability of the model, the EPSS vulnerability score is used. The risk exposure rating is calculated through the joint probability distribution formulation based on attack scenarios. Our model shows that ransomware attacks are most likely to exploit the chain of vulnerabilities CVE-2021-26855, CVE-2021-26857, CVE-2021-27065, CVE-2021-36942, and CVE-2017-0144 which has a probability value of 0.046534. In addition, the use of the EPSS also makes the risk assessment more factual, accurate, and effective. The threat modeling method can help in identifying ransomware attacks through a chain of vulnerabilities, making risk assessment more precise.
Design of Risk Management in SPBE Infrastructure Based on PAN-RB Ministerial Regulation Number 5 of 2020 (Case Study: XYZ Institution) Rochmawati Rochamwati; Muhammad Salman
Jurnal Teknologi Informasi dan Pendidikan Vol 16 No 2 (2023): Jurnal Teknologi Informasi dan Pendidikan
Publisher : Universitas Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24036/jtip.v16i2.724

Abstract

The arrival of the Industrial Revolution 4.0 not only spurred the acceleration of digitalization in industry and manufacturing, but also brought a broader influence to various sectors, including the government sector. One of the Government's efforts to support digital transformation is the issuance of Presidential Regulation Number 95 of 2018 concerning Electronic-Based Government Systems (SPBE). However, the application of SPBE in Central Agencies and Regional Governments can create a number of risks that will affect the achievement of SPBE objectives. Therefore, the Ministry of State Apparatus Empowerment and Bureaucratic Reform (PAN-RB) issued a PAN-RB Ministerial Regulation Number 5 of 2020 which contains SPBE Risk Management Guidelines that need to be implemented by SPBE organizers in managing SPBE risk in their respective agencies, including XYZ Work Unit. The XYZ Work Unit is one of the work units in the ABC Agency which is responsible for carrying out tasks and functions in the IT field. An SPBE risk assessment has been carried out on the SPBE Infrastructure in the XYZ Work Unit. From this research, 47 negative SPBE risks were obtained, of which 26 SPBE risks were above the SPBE Risk Appetite threshold so that recommendations for handling SPBE risk were then prepared based on the PAN-RB Ministerial Regulation Guidelines Number 5 of 2020.