Claim Missing Document
Check
Articles

Digital Evidence Identification on Google Drive in Android Device Using NIST Mobile Forensic Method Yudhana, Anton; Umar, Rusydi; Ahmadi, Ahwan
Scientific Journal of Informatics Vol 6, No 1 (2019): Mei 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i1.17767

Abstract

The use of cloud storage media is very popular nowadays, especially with the Google Drive cloud storage media on smartphones. The increasing number of users of google drive storage media does not rule out the possibility of being used as a medium for storing illegal data, such as places to store negative content and so on. On a smartphone with an Android operating system that has a Google Drive application installed, digital evidence can be extracted by acquiring and analyzing the system files. This study implemented a mobile forensic method based on guidelines issued by the National Institute of Standards of Technology (NIST). The results of this study are presented in the form of data recovery in the deleted Google Drive storage media, which results in the form of headers of the data type in the form of deleting account names, deleted file types, and timestamp of deleted files. Digital evidence obtained with 59 Axiom Magnet software found in the Entry227 file, with 46 files, if the percentage is a success rate of 77%.
REVIEW TENTANG VIRTUALISASI Umar, Rusydi
Jurnal Informatika Vol 7, No 2: Juli 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.425 KB)

Abstract

Virtualisasi adalah cara untuk membuat komputer fisik bertindak bahwa seolah-olah komputer tersebut menjadi dua atau lebih komputer logika, dimana masing-masing komputer logika (nonfisik) mempunyai arsitektur dasar yang sama dengan komputer fisik. Virtualsasi digunakan untuk meningkatkan tingkat utilisasi dari komputer, karena sebagaimana kita ketahui, hampir semua komputer dalam keadaan nganggur (idle). Penggunaan kapasitas cpu berada dibawah 10% bahkan pada komputer server, kecuali pada cpu intensive applications. Paper ini akan membahas tentang mesin virtual (virtual machine), cluster, dan virtual cluster.
ANALYSIS SECURITY OF SIA BASED DSS05 ON COBIT 5 USING CAPABILITY MATURITY MODEL INTEGRATION (CMMI) Handoyo, Eko; Umar, rusydi; Riadi, Imam
Scientific Journal of Informatics Vol 6, No 2 (2019): November 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i2.17387

Abstract

A secure academic information system is part of the college. The security of academic information systems is very important to maintain information optimally and safely. Along with the development of technology, academic information systems are often misused by some irresponsible parties that can cause threats. To prevent these things from happening, it is necessary to know the extent to which the security of the academic information system of universities is conducted by evaluating. So the research was conducted to determine the Maturity Level on the governance of the security of University Ahmad Dahlan academic information system by using the COBIT 5 framework on the DSS05 domain. The DSS05 domain on COBIT 5 is a good framework to be used in implementing and evaluating related to the security of academic information systems. Whereas to find out the achievement of evaluation of academic information system security level, CMMI method is needed. The combination of the COBIT 5 framework on the DSS05 domain using the CMMI method in academic information system security is able to provide a level of achievement in the form of a Maturity Level value. The results of the COBIT 5 framework analysis of the DSS05 domain use the CMMI method to get a Maturity level of 4,458 so that it determines the achievement of the evaluation of academic information systems at the tertiary level is Managed and Measurable. This level, universities are increasingly open to technological developments. Universities have applied the quantification concept in each process, and are always monitored and controlled for performance in the security of academic information systems.
ANALISIS PERBANDINGAN DETECTION TRAFFIC ANOMALY DENGAN METODE NAIVE BAYES DAN SUPPORT VECTOR MACHINE (SVM) Riadi, Imam; Umar, Rusydi; Aini, Fadhilah Dhinur
ILKOM Jurnal Ilmiah Vol 11, No 1 (2019)
Publisher : Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (770.776 KB) | DOI: 10.33096/ilkom.v11i1.361.17-24

Abstract

Intrusion Detection System (IDS) is a software or hardware that can be used to detect any abnormal activity in the network. Situations often arise from various network access in the form of information or data that can cause problems. Detection is a system for detecting activities that are disturbing data access in information. IDS has two methods of doing detection, namely Rule Based (Signature Based) and Behavior-Based. Anomaly traffic can detect an increase in the number of user access and at any time there will be an attack from another party on the network. This study uses 2 algorithm methods are Naïve Bayes and Support Vector Machine (SVM). Naïve Bayes results through the Distributions and Radviz graph data samples have a probability value of 0.1 and the highest probability value is 0.8. Support Vector Machine (SVM) produces a graph that has greater accuracy.
Clustering Majors for New Students at Vocational High School Muhammadiyah 3 Yogyakarta Using Fuzzy C-Means Az-Zahra, Rifqi Rahmatika; Umar, Rusydi; Fadlil, Abdul
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 3, August 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (283.811 KB) | DOI: 10.22219/kinetik.v3i4.642

Abstract

The development of the era demands quality human resources. For that need to be equipped with the knowledge and skills to be ready to compete in the world of work. Vocational High School has many skills programs. Examples of skills programs in Vocational High School are Computer Network Engineering, Audio and Video Engineering, Mechanical Engineering, Building, Drawing Techniques, Motorcycle Engineering, Installation and Power Engineering, systems that can assist in the decision-making process of prospective students. The grouping system will be created using the Fuzzy C-Means method. Grouping majors using fuzzy c-means algorithm is expected to help prospective students choose majors from the many majors that exist. This is done so that prospective students do not experience difficulties in learning activities, can develop optimally and is expected to work in accordance with the expertise that has been owned, so that ultimately can improve the quality of output and outcome of vocational education. The results obtained in this study in the form of data grouped based on 3 clusters, so that prospective students can choose the majors in accordance with the selected cluster.
ANALISIS FORENSIK DIGITAL PADA FROZEN SOLID STATE DRIVE DENGAN METODE NATIONAL INSTITUTE OF JUSTICE (NIJ) Riadi, Imam; Umar, Rusydi; Nasrulloh, Imam Mahfudl
Elinvo (Electronics, Informatics, and Vocational Education) Vol 3, No 1 (2018): May 2018
Publisher : Department of Electronic and Informatic Engineering Education, Faculty of Engineering, UNY

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21831/elinvo.v3i1.19308

Abstract

Kejahatan komputer memiliki bukti digital dari tindak kejahatan dan perlu dilakukan analisa. Perkembangan teknologi komputer yang demikian pesat telah membawa perubahan pada bidang perangkat keras. Pada perangkat keras saat ini terdapat Solid State Drive (SSD) sebagai media penyimpanan utama komputer, karena teknologi SSD memiliki kecepatan akses data yang cepat. Penggunaan software pembeku drive pada komputer sering dilakukan oleh teknisi komputer, karena dapat menghemat biaya perawatan. Software tersebut digunakan untuk melindungi komputer dari perubahan yang tidak dikehendaki, sistem komputer yang tanam software tersebut menjadikan perubahan yang terjadi pada sistem komputer tidak disimpan pada media penyimpanan setelah komputer dimatikan. Ketika hal ini terjadi apa yang harus dilakukan oleh penyidik forensik digital. Penelitian ini membahas perbandingan terkait tool Forensik yang digunakan untuk proses eksaminasi dan analisa. Pengambilan salinan bukti digital dilakukan dengan metode forensik statik, sedangkan tahapan penelitian dan analisa mengadaptasi dan mengimplementasikan metode forensik dari National Institute of Justice (NIJ) untuk mendapatkan bukti digital. Software pembeku drive seperti Shadow Defender terbukti berpengaruh terhadap praktik eksaminasi forensik digital terhadap didapatkannya bukti-bukti digital, dengan kondisi tersebut prosentase keberhasilannya merestorasi file hanya 28,7% sehingga dapat menjadi hambatan dalam proses forensik digital.
ANALISIS LIVE FORENSICS UNTUK PERBANDINGAN KEMANANAN EMAIL PADA SISTEM OPERASI PROPRIETARY Faiz, Muhammad Nur; Umar, Rusydi; Yudhana, Anton
ILKOM Jurnal Ilmiah Vol 8, No 3 (2016)
Publisher : Program Studi Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1108.42 KB)

Abstract

Email menjadi salah satu media untuk berkomunikasi dan bisa menyimpan bukti kejahatan, saat ini telah banyak kejahatan yang terjadi melalui media ini. Digital forensics merupakan salah satu ilmu untuk menemukan barang bukti termasuk email sebagai bukti digital.  Analisis digital forensik terbagi menjadi dua, yaitu tradisional / dead dan live forensics. Analisis forensics tekni digital tradisional menyangkut data yang disimpan secara permanen di perangkat, sedangkan analisis live forensics yaitu analisis menyangkut data sementara yang disimpan dalam peralatan atau transit di jaringan. jurnal ini mengusulkan analisis forensics live di sistem operasi terbaru yaitu Windows 10. Studi kasus berfokus pada kemanan beberapa email seperti Gmail, Yahoo dan Outlook dan beberapa browser secara umum seperti Google Chrome, Mozilla Firefox, dan Microsoft Edge. Hasil Eksperimen penelitian ini yaitu masing-masing penyedia email menambahkan fitur tersendiri demi keamanan user.
Acquisition of Email Service Based Android Using NIST Umar, Rusydi; Riadi, Imam; Muthohirin, Bashor Fauzan
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 3, No 3, August 2018
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1004.832 KB) | DOI: 10.22219/kinetik.v3i4.637

Abstract

Email is one of the results of the development of information and communication technology. Email is widely used to exchange information by sending and receiving data, such as document files, images, correspondence and others. With the development of technology and information causing crimes in communicating also growing, the perpetrators of cyber crime commonly referred to as cybercrime. Any crime committed by cybercrime will surely leave the evidence, in this study will make the acquisition of android-based email using the method of national institute of standards and technology (NIST). The results obtained IP address of the senders email header as digital evidence.
Sistem Pendukung Keputusan dengan Metode AHP untuk Penilaian Kompetensi Soft Skill Karyawan Umar, Rusydi; Fadlil, Abdul; Yuminah, Yuminah
Khazanah Informatika Vol. 4 No. 1 Juni 2018
Publisher : Universitas Muhammadiyah Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v4i1.5978

Abstract

Karyawan dalam perusahaan merupakan sumber daya utama yang dituntut untuk mampu memberikan pelayanan terbaik dan kinerja yang optimal. Soft skill karyawan adalah keterampilan individu karyawan yang dapat menunjang hubungan individu karyawan dengan karyawan lain, meningkatkan kinerja dan membuka prospek karirnya. Penilaian kinerja karyawan yang dilaksanakan oleh perusahaan umumnya hanya untuk penilaian prestasi kerja yakni bagaimana pekerjaan dapat dikerjakan dengan baik, mencapai target yang ditetapkan dan meraih tujuan akhir yang diinginkan (hard skill). Penilaian terkait kemampuan soft skill karyawan belum banyak dilakukan. Ada beberapa kriteria yang diterapkan beberapa perusahaan dalam melakukan penilaian kompetensi soft skill, tetapi kriterianya masih berbeda-beda. Penelitian ini membahas penilaian kompetensi soft skill karyawan dengan menerapkan empat kriteria. Keempat kriteria ini adalah kemampuan komunikasi, kemampuan bekerjasama, kejujuran dan kemampuan interpersonal. Analisis data menerapkan metode Analytical Hierarchical Process (AHP), yang memungkinkan perhitungan matematis dengan berbagai kriteria. Hasil penelitian menunjukan nilai rasio konsistensi 0.053 yang berarti kurang dari nilai rasio konsistensi yang digunakan dalam metode AHP yaitu 0.1, sehingga hasil perhitungan tersebut valid, dan dapat digunakan. Penelitian ini menghasilkan penilaian prioritas kompetensi soft skill yang dibutuhkan perusahaan sebagai berikut: Komunikasi 48%, Kerjasama 27%, Kejujuran 16 % dan interpersonal 10%. Hasil penelitian ini membuktikan bahwa metode AHP dapat digunakan pada penilaian kompetensi soft skill karyawan.
Perancangan Sistem Informasi Menggunakan Enterprise Architecture Planning (Studi Kasus Pada Kecamatan di Kota Samarinda) Yudhana, Anton; Umar, Rusydi; Alameka, Faza
Khazanah Informatika Vol. 4 No. 2 Desember 2018
Publisher : Universitas Muhammadiyah Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v4i2.7039

Abstract

Perencanaan sistem informasi di kecamatan seringnya mengalami ketidakselarasan dengan bisnis dan IT yang ada. Agar dapat menyelaraskan informasi dan mesinergikan bisnis dan IT di kecamatan yang ada di kota Samarinda, maka diperlukan suatu perencanaan sistem informasi. Dalam hal ini metode yang digunakan untuk menggambarkan kondisi organisasi saat ini dan merancang arsitektur enterprise adalah Enterprise Architecture Planning (EAP). Metode ini digunakan untuk menggambarkan dan merancang enterprise architecture yang baik untuk mencapai strategi binis kecamatan tersebut. Penelitian ini menghasilkan 5 kandidat entitas bisnis dan 8 kandidat aplikasi yang menjadi acuan pengembangan sistem informasi pada kecamatan di kota Samarinda.