Rizdqi Akbar Ramadhan
Program Studi Teknik Informatika, Fakultas Teknik, Universitas Islam Riau

Published : 6 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 6 Documents
Search

Analisis Digital Forensik Rekaman Kamera CCTV Menggunakan Metode NIST (National Institute of Standards Technology) Desti Mualfah; Rizdqi Akbar Ramadhan
IT Journal Research and Development Vol. 5 No. 2 (2021)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2021.vol5(2).5731

Abstract

Conventional crimes recorded on CCTV (Closed Circuit Television) cameras are increasing, every criminal who is proven to have committed a certain crime will be punished in accordance with statutory regulations. The problem is how a case recorded on a CCTV camera can be used as digital evidence. Digital evidence is closely related to ensuring data security, privacy and integrity while following the stages of the digital forensic identification process. The identification stage using the NIST (National Institute of Standard Technolog) method is used for investigations in finding information related to metadata on CCTV camera footage so that it can provide structured information, describe and process information obtained from digital forensic investigation sources that can be implemented into the Chain of Custody document which aims to be used as legal digital evidence in court
Implementasi Metode National Institute of Justice (NIJ) Pada Fitur TRIM SOLID STATE DRIVE (SSD) Dengan Objek Eksperimental Sistem Operasi Windows, Linux dan Macintosh Rizdqi Akbar Ramadhan; Desti Mualfah
IT Journal Research and Development Vol. 5 No. 2 (2021)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2021.vol5(2).5750

Abstract

Solid State Drive (SSD) is the latest solution to speed up data processing from various multiplatform desktop computers. The TRIM features on SSDs has contribute for eliminating garbage data which is permanently deleted by users, where this method has the benefit of extending the service life of SSD devices. Contradiction of implement this method is obstacle potential for forensic investigators to recover deleted data in term of cyber crime in the case of evidence in the form of computers with SSD storage. The experimental object in this study is based on the perspective of mainstream operating systems, namely Windows, Linux and Macintosh installed on the SSD where each operating system simulates the deletion of stored data with a comparison of TRIM enable and TRIM disabled configurations. National Institute of Justice (NIJ) Digital Forensic method implemented in this case, because this method serves as a reference in the practice of Digital Forensics in this study. The SLEUTH KIT Autopsy software is a Digital Forensic tool being used in the perspective of investigators in the acquisition and analysis of SSD evidence in the case simulation of this study. Novelti obtained from the research content is that the operating system which is the object of experimentation is the latest release of Windows, Linux and Macintosh operating systems which certainly has great potential in terms of exploration, especially Digital Forensics. Windows has the greatest chance of recovery results among the other 2 operating systems in this study.
Digital Forensic Investigation for Non-Volatile Memory Architecture by Hybrid Evaluation Based on ISO/IEC 27037:2012 and NIST SP800-86 Framework Rizdqi Akbar Ramadhan; Panji Rachmat Setiawan; Dedy Hariyadi
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.8968

Abstract

In the implementation of Digital Forensics, one of the derivatives of practice is the handling of Digital Evidence. Handling Digital Evidence requires important steps and procedures. Digital evidence is a source of artifacts in handling a digital-based crime case, one of which comes from digital storage. In this research, the author will design a framework for Digital Forensic investigations by simulating digital evidence in the form of a non-volatile architecture. The reference commonly used by researchers in previous articles is the National Institute of Justice (NIST). The framework is a reference and steps in the practice of acquiring digital evidence. The purpose of designing this framework is as a legal procedure that is specifically implemented in the practice of acquiring non-volatile digital evidence. In the design, the author conducted a literature study on the NIST SP 800-86 and ISO 27037:2012 standards and then combined them in a hybrid terminology. The output of this research is to combine the two standards to become framework as reference for handling and investigating Digital Forensic science.
Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital Desti Mualfah; Rizdqi Akbar Ramadhan
Digital Zone: Jurnal Teknologi Informasi dan Komunikasi Vol. 11 No. 2 (2020): Digital Zone: Jurnal Teknologi Informasi dan Komunikasi
Publisher : Publisher: Fakultas Ilmu Komputer, Institution: Universitas Lancang Kuning

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31849/digitalzone.v11i2.5174

Abstract

Kejahatan konvensial yang terekam kamera CCTV (Closed Circuit Televison) semakin banyak ditemukan di masyarakat, setiap pelaku kejahatan yang terbukti melakukan tindak pidana tertentu akan dihukum sesuai dengan peraturan perundang-undangan. Kamera CCTV memiliki peran penting dalam keamanan, banyak diantaranya hasil tangkapan rekaman kamera CCTV dijadikan sebagai alat bukti digital. Tantangannya adalah bagaimana teknik yang diperlukan untuk penanganan khusus investigasi digital forensik dalam mencari bukti ditgital rekaman kamera CCTV menggunakan metode live forensik, yaitu ketika barang bukti dalam keadan aktif berdasarkan pedoman SNI 27037:2014 sesuai acuan kerangka kerja Common Phases of Computer Forensics Investigation Models untuk di implementasikan ke dalam dokumen Chain of Custody. Hasil penelitian ini berupa hasil analisis video rekaman kamera CCTV tentang karakteristik bukti digital dan informasi metadata yang digunakan untuk memberikan penjelasan komprehensif secara terstruktur serta acuan pengelolaan informasi data yang didapat dari hasil investigasi digital forensik yang dapat dipertanggungjawabkan dalam persidangan. Kata kunci: Bukti Digital, Live Forensik, Metadata, Kamera CCTV, Chain of Custody. Abstract Conventional crimes that are recorded on CCTV (Closed Circuit Television) cameras are increasingly being found in society, every crime that commits certain crimes will be in accordance with statutory regulations. CCTV cameras have an important role in security, many of which are recorded by CCTV cameras used as digital evidence. The challenge is how the techniques required for special handling, digital forensics in searching for digital evidence of CCTV camera footage using the live forensic method, namely when the evidence is in an active state based on the latest SNI 27037: 2014 according to the framework reference Common Phases of Computer Forensics Investigation Models for in implement it into the Chain of Custody document. These results of this research are in the form of analysis of CCTV camera video recordings about the characteristics of digital evidence and metadata information used to provide a structured comprehensive explanation and reference data management information obtained from the results of digital forensic investigations that can be accounted for in court. Keywords: Digital Evidence, Live Forensic, Metadata, CCTV Camera, Chain of Custady.
Sosialisasi Dan Rancangan Jaringan Pipa Air Bersih Di Desa Kampung Pinang Kecamatan Perhentian Raja Kabupaten Kampar roza mildawati; Yolly Adriati; Rizdqi Akbar Ramadhan; Riskon Ramadhan; Dhany Fauzan Azhimy
Dinamisia : Jurnal Pengabdian Kepada Masyarakat Vol. 7 No. 2 (2023): Dinamisia: Jurnal Pengabdian Kepada Masyarakat
Publisher : Universitas Lancang Kuning

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31849/dinamisia.v7i2.11446

Abstract

The need for clean water in Indonesia is still not distributed evenly. Clean water is not distributed evenly due to obstacles and problems. Based on observations in Kampung Pinang Village, Kampar Regency, there is already a clean water reservoir, but in the reservoir there is no clean water distribution system available to homes to meet community needs. To analyze the problems and efforts to complete this research, the researcher uses a literature study that is used to obtain clarity of concepts in research, namely by obtaining books, journals, and previous research, which contains the basics of theory and calculation formulas, and obtains data that support in completing this research, namely secondary data in the form of population data, village maps and other data obtained directly from parties related to this research. The planning of a clean water system network using EPANET 2.0 software in hamlet 1, Kampung Pianang village, Kampar Regency is carried out using the gravity method and using a pump where the water source comes from an existing reservoir. The projected population of Kampung Pinang until 2030 is 1385 people, so by analyzing water needs, it is found that the need for clean water in 2030 is 1.742 l/second. From the simulation results of the EPANET 2.0 software using the gravity method on the clean water network in the village of Kampung Pinang, the highest pressure value is 11.97 m at junction J4 and the lowest pressure is 3.80 m at junction J20. Meanwhile, all pressure values using a pump have met the requirements. The highest velocity (velocity) is 0.14 m/s on pipe P1 and pipe P2 and the lowest speed is 0.01 m/s on pipe P12. The highest energy loss (headloss) is 0.39 m/km in the P1 and P2 pipes and the lowest energy loss is 0.01 m/km in the P12 pipes.
Network Forensic: Analysis of Client Attack and Quality of Service Measurement by ARP Poisoning using Network Forensic Generic Process (NFGP) Model Rizdqi Akbar Ramadhan; Agro Tambas Tira; M. Rizki Fadhilah
Sistemasi: Jurnal Sistem Informasi Vol 13, No 2 (2024): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v13i2.3804

Abstract

In computer network, communication from one computer to another computer can be intercepted, the way to intercept communication between network devices is with Address Resolution Protocol Poisoning attack. This attack can steal data such as usernames and passwords, modify traffic, and stop the traffic itself. This research implements the Network Forensic Generic Process model as a reference in Network Forensics practice. Apart from that, this research also measures quality of service to compare parameters before the attack and when the attack occurred. The tools used in this research are Wireshark, XArp, and Snort. This research succeeded in obtaining authentic information from the evidence obtained. The results of quality of service measurements showed that the quality of service parameters changed when the attack occurred. This research can be a reference in improving network security by better understanding the threats that may be encountered and providing valuable insight for future security prevention and response efforts.