Ahmad Ridha Kelrey
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

PENGARUH ETHICAL HACKING BAGI KEAMANAN DATA PERUSAHAAN Ahmad Ridha Kelrey; Aan Muzaki
Cyber Security dan Forensik Digital Vol. 2 No. 2 (2019): Edisi November 2019
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (248.455 KB) | DOI: 10.14421/csecurity.2019.2.2.1625

Abstract

Melindungi aset digital merupakan perhatian yang penting bagi perusahaan, karena serangan siber memengaruhi kinerja bisnis dan reputasi sebuah perusahaan. Tiga konsep dasar keamanan yang penting untuk informasi di internet adalah kerahasiaan (confidentiality), integritas (integrity), dan ketersediaan (availability). Konsep yang berkaitan dengan orang-orang yang menggunakan informasi itu adalah authentication, authorization, dan nonrepudiation. Keamanan informasi menjadi suatu hal yang mahal pada saat ini, sehingga ethical hacking diperlukan untuk menjamin sebuah sistem informasi perusahaan tersebut cukup handal. Dengan begitu  dapat menjaga reputasi perusahaan tersebuat di mata pelangannya.
Identifikasi Source Image Menggunakan Pendekatan Forensic Similarity pada Image Forensik Ahmad Ridha Kelrey; Yudi Prayudi; Erika Ramadhani
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 9 No 3 (2022): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v9i3.2483

Abstract

With the development of digital technology, digital images can be obtained anytime and anywhere through cameras and cell phones. People can get images easily and can also manipulate the sources of information in the content and can even manipulate images. So it is necessary to verify the source of the image which is the main job in the field of image forensics. Camera source identification is the process of determining which camera device was used to take the image. Forensic Similarity approach based on Convolutional Neural Network determines if two image patches are taken by different cameras or from the same camera. This approach differs from typical camera identification in that it does not specify the exact camera used to capture any of the patches. The strength of this approach is the ability to compare cameras that were not used to train the system. This allows investigators to learn important information about images taken with any camera, and is not limited by the set of camera models in the investigator database. Although camera model information, date and time, and other information can be found in the EXIF ​​or in the JPEG header, it is generally impossible to assume the information is correct because image metadata can be easily modified. The source camera identification process uses identification on the image to find out the camera source obtained from the image. By using a forensic similarity approach, it can support information in metadata so that it can guarantee the authenticity of the information obtained.