Claim Missing Document
Check
Articles

Found 11 Documents
Search

Digital Evidence Acquisition System on IAAS Cloud Computing Model using Live Forensic Method Sudyana, Didik; Lizarti, Nora
Scientific Journal of Informatics Vol 6, No 1 (2019): Mei 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i1.18424

Abstract

Cloud Computing is a technological development that has been warmly discussed in recent years and has seen significant increases in usage, especially on the IAAS Cloud Computing model. The high rate of development of IAAS Cloud Computing model is in line with the high number of crimes involving IAAS Cloud Computing model on server virtualization. When a computer crime occurs and a digital forensic investigation will be carried out to uncover the case, it raises issues related to the acquisition of digital evidence. Because the acquisition model in general, it is done only to one operating system, while in virtualization there is more than one operating system, so the acquisition technique in general cannot be used because it takes only one operating system involved crime, and cannot acquire the whole data server related privacy data in other virtual operating systems. Therefore, research to make the acquisition system of server virtualization is needed. The focus in this research is to make system acquisition in server virtualization Proxmox using the live forensic method to produce a system that can acquire virtualization without disrupting the overall data server and in accordance with the principle of digital forensics. The resulting acquisition system can be a reference for investigators to investigate the IAAS Cloud Computing model on Proxmox virtualization and facilitate the investigator's work in the use of the system because the investigator simply chooses which virtual operating system to acquire, after which the system will work on its own the acquisition.
Digital Forensics Investigation on Proxmox Server Virtualization Using SNI 27037:2014 Sudyana, Didik; Putra, Reza Tanujiwa; Soni, Soni
Sinkron : Jurnal dan Penelitian Teknik Informatika Vol 3 No 2 (2019): SinkrOn Volume 3 Number 2, April 2019
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (525.773 KB) | DOI: 10.33395/sinkron.v3i2.10029

Abstract

Server virtualization technology has experienced significant development so that more and more industries are adopting this technology. By using server virtualization, the industry can make savings in purchasing new servers and maintenance because virtualization allows one server to run with multiple operating systems at once. The high level of use of virtualization raises a gap for the occurrence of computer crimes involving virtualization. When computer crimes occur on virtualization, it is necessary to conduct digital forensic investigations to find useful clues in solving crime cases. Therefore, in this study a digital forensic investigation was conducted on Proxmox server virtualization by acquiring the entire storage virtualization media and carrying out checks on the results of the acquisition. Based on the investigation carried out, the acquisition technique by acquiring the entire storage media on Proxmox cannot be used because the structure of the evidence files and folders cannot be read perfectly
Digital Evidence Acquisition System on IAAS Cloud Computing Model using Live Forensic Method Sudyana, Didik; Lizarti, Nora
Scientific Journal of Informatics Vol 6, No 1 (2019): May 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i1.18424

Abstract

Cloud Computing is a technological development that has been warmly discussed in recent years and has seen significant increases in usage, especially on the IAAS Cloud Computing model. The high rate of development of IAAS Cloud Computing model is in line with the high number of crimes involving IAAS Cloud Computing model on server virtualization. When a computer crime occurs and a digital forensic investigation will be carried out to uncover the case, it raises issues related to the acquisition of digital evidence. Because the acquisition model in general, it is done only to one operating system, while in virtualization there is more than one operating system, so the acquisition technique in general cannot be used because it takes only one operating system involved crime, and cannot acquire the whole data server related privacy data in other virtual operating systems. Therefore, research to make the acquisition system of server virtualization is needed. The focus in this research is to make system acquisition in server virtualization Proxmox using the live forensic method to produce a system that can acquire virtualization without disrupting the overall data server and in accordance with the principle of digital forensics. The resulting acquisition system can be a reference for investigators to investigate the IAAS Cloud Computing model on Proxmox virtualization and facilitate the investigator's work in the use of the system because the investigator simply chooses which virtual operating system to acquire, after which the system will work on its own the acquisition.
Virtualization Technology for Optimizing Server Resource Usage Edwar Ali; Didik Sudyana
International Conference on Engineering and Technology Development (ICETD) 2014: 3rd ICETD 2014
Publisher : Bandar Lampung University (UBL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (778.077 KB)

Abstract

Data and information needs for large organizations rely heavily on information technology infrastructure support. One of the necessary supporting components is the availability of a sufficient number of servers to increase data center. The huge costs required to increase the number of server units. Virtualization technology can be the perfect solution to resolve these problems. However, due to the high cost of a license, causing an open source-based virtualization used as the main option, namely Proxmox. The application virtualization based Proxmox, can maximize the use of resources, because the function of 3 units of physical servers can be enabled simultaneously on 1 physical server unit. The presence of live migration feature of Proxmox, allowing to move a virtual machine from one physical server to another physical server when maintenance underway. This change can take place without stopping services running on virtual machine.
Forensic Investigation Framework on Server Side of Private Cloud Computing Didik Sudyana; Nora Lizarti; Erlin Erlin
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 10, No. 3 December 2019
Publisher : Institute for Research and Community Services, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (384.353 KB) | DOI: 10.24843/LKJITI.2019.v10.i03.p06

Abstract

Cloud Computing is one of the technologies that continue to develop and progress in rapid adoption rates due to the various benefits and conveniences offered. Cloud Computing has four types of adoption models, one of which is a Private model and is widely adopted by users because it is safer and customizable. The high level of cloud computing adoption is an opportunity for criminals to use cloud computing in committing their crimes and requires handling digital forensics. However, each cloud model has different characteristics, so the investigative method used is also different. Then there is no specific guidance for investigating cloud computing. So it is necessary to analyse the investigation of private cloud computing that used OwnCloud from the server-side and develop the novel investigation framework based on SNI 27037: 2014. An analysis of investigations is performed to develop the novel investigation framework and to find out what evidence can be found based on the novel framework. The results of the research conducted can be a reference for investigators to conduct forensic investigations in cloud computing on the server-side and the novel investigation framework will become a reference to be used as a guide to the investigation on private cloud computing in the server-side.
Workshop Peningkatan Kemampuan Dasar Desain Jaringan Dan Cisco Router Siswa/i SMKS Ibnu Taimiyah M Khairul Anam; Aniq Noviciatie Ulfah; Nora Lizarti; Didik Sudyana; Dewi Sari Wahyuni
J-PEMAS - Jurnal Pengabdian Masyarakat Vol. 1 No. 1 (2020): Jurnal Pengabdian Masyarakat J_PEMAS
Publisher : STMIK Amik Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (473.312 KB)

Abstract

Desain jaringan merupakan sebuah fondasi dasar bagi siswa-siswa SMKS Ibnu Taimiyah yang mengambil jurusan Teknik Komputer dan Jaringan. Akan tetapi masih banyaknya siswa SMKS Ibnu Taimiyah yang mengalami kendala di lapangan ketika dihadapkan dengan masalah membangun sebuah jaringan komputer. Sehingga ketika proses desain jaringan tidak dilakukan dan terencana dengan baik, maka seluruh proses membangun jaringan tersebut tidak akan baik. Selain itu pada saat ini kebutuhan akan teknisi jaringan yang paham akan Cisco Router sangatlah tinggi. Namun banyak siswa SMKS Ibnu Taimiyah yang tidak tahu apa itu Cisco Router. Sehingga diperlukan sebuah workshop untuk siswa tentang desain jaringan dan Cisco Router. Workshop ini dilaksanakan dengan tujuan untuk memberikan para siswa pengetahuan dan keterampilan yang diperlukan untuk melakukan desain jaringan yang baik dan memahami tentang teknologi Cisco Router
Pelatihan Secure Computer User Untuk Meningkatkan Kesadaran Siswa Terhadap Keamanan Data dan Informasi Aniq Noviciatie Ulfah; Nora Lizarti; M. Khairul Anam; Didik Sudyana; Hadi Asnal
J-PEMAS - Jurnal Pengabdian Masyarakat Vol. 2 No. 1 (2021): Jurnal Pengabdian Masyarakat J_PEMAS
Publisher : STMIK Amik Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Meningkatnya jumlah kejahatan cyber yang terjadi dan makin berkembangnya teknik-teknik dan tools-tools serta produk perangkat lunak yang dikembangkan untuk mengotomatisasi tindakan kejahatancyber (virus, malware, trojan, dll) mengindikasikan bahwa perlu adanya tindakan optimal dari user dalam menjaga keamanan komputer dan informasi dari para pengguna teknologi. Sosialisasi terhadap bahaya kejahatan cyber dan pentingnya menjaga keamanan data dan informasi harus dilakukan terhadap seluruh kalangan pengguna teknologi sedini mungkin. Dari pertimbangan tersebut, maka timbul sebuah gagasan untuk memberikan pelatihan computer secure user kepada siswa siswi SMK Negeri 1 Bangkinang Kota. Tujuan dari program pelatihan computer secure user ini adalah untuk memberikan para siswa siswi pengetahuan dan keterampilan yang diperlukan untuk melindungi aset informasinya dengan membenamkan siswa ke lingkungan interaktif di mana mereka akan memperoleh pemahaman mendasar tentang berbagai ancaman keamanan komputer dan jaringan.
Analisis Kesadaran Mahasiswa UMRI Terkait Penggunaan Teknologi & Media Sosial Terhadap Bahaya Cybercrime Soni Soni; Afdhil Hafid; Didik Sudyana
JURNAL FASILKOM (teknologi inFormASi dan ILmu KOMputer) Vol 9 No 3 (2019): Jurnal Fasilkom
Publisher : Fakultas Ilmu Komputer, Unversitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (327.539 KB) | DOI: 10.37859/jf.v9i3.1664

Abstract

Abstract Students are one of the many users of technology and the internet. Based on data from the Association of Indonesian Internet Service Providers, it states that as many as 100% of student respondents stated using the internet every day. So that the potential for students to become victims of cyber crime continues to increase. This is because many internet users are not careful in using it. Cyber ​​crimes that often occur include identity theft, kidnapping, online fraud, burglary and so forth. During this time many users who write their personal identity on social media, not even a few who post about the location they visit. Then many students are fond of using free wifi. Cyber​​crime will not occur if there is vigilance and caution from its users. Students should be able to realize the negative effects of cyberspace. For this reason, an analysis is needed regarding the presence of social media users. In this research, analysis of student awareness in the informatics engineering study program, computer science faculty, Muhammadiyah University of Riau to find out how much the level of student awareness about the dangers of cybercrime is based on the social media and user awareness categories. From the results of the study, it was concluded that students of the Department of Informatics had a fairly good level of awareness. This is evidenced from the average results obtained in the social media category, 83.4% of students have a fairly good awareness while the average user awareness category of 72.7%. However, the university, faculty and study programs must still provide assistance, education or outreach to those who do not have a good level of vigilance because there are still a few percent who still do not have a good level of vigilance. Keywords: cybercrime, students, awareness, social media, internet Abstrak Mahasiswa merupakan salah satu pengguna teknologi dan internet yang cukup banyak. Berdasarkan data dari Asosiasi Penyedia Jasa Internet Indonesia, menyebutkan bahwa sebanyak 100% responden dari mahasiswa menyatakan menggunakan internet setiap harinya. Sehingga potensi mahasiswa menjadi korban kejahatan siber pun terus meningkat. Hal ini disebabkan karena banyak pengguna internet yang tidak berhati-hati dalam menggunakannya. Kejahatan cyber yang sering terjadi diantaranya adalah pencurian identitas, pembulian, penipuan online, perampokan dan lain sebagainya. Selama ini banyak pengguna yang menuliskan identitas pribadinya di media social, bahkan tidak sedikit yang memposting tentang lokasi yang mereka kunjungi. Kemudian banyak mahasiswa yang gemar menggunakan wifi gratis. Kejahatan cyber tidak akan terjadi jika ada kewaspadaan dan kehati-hati dari para penggunanya. Seharusnya para mahasiswa dapat menyadari dampak negatif dari dunia maya. Untuk itu perlu dilakukan analisis terkait kesadaarn pengguna media sosial. Dalam penelitian ini, analisis kesadaran mahasiswa di program studi teknik informatika, fakultas ilmu komputer, universitas muhammadiyah riau untuk mengetahui seberapa besar tingkat kesadaran mahasiswa tentang bahaya cybercrime didasarkan pada kategori media sosial dan kesadaran pengguna. Dari hasil penelitian, disimpulkan bahwa mahasiswa Jurusan Teknik Informatika memiliki tingkat kesadaran yang cukup baik. Hal ini dibuktikan dari hasil rata-rata yang diperoleh pada kategori media sosial, 83,4% mahasiswa mempunyai kesadaran yang cukup baik sedangkan pada kategori kesadaran pengguna rata-rata sebanyak 72,7%. Namun pihak universitas, fakultas dan juga program studi tetap harus memberikan pendampingan, edukasi ataupun sosialisasi bagi yang belum memiliki tingkat kewaspadaan yang baik karena masih ada beberapa persen masih masih belum mempunyai tingkat kewaspadaan yang baik. Kata kunci: cybercrime, mahasiswa, kesadaran, media social, internet
Etika Dan Profesionalisme Saksi Ahli Forensik Didik Sudyana; Soni Soni
Jurnal CoSciTech (Computer Science and Information Technology) Vol 1 No 1 (2020): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v1i1.1679

Abstract

Abstract The Indonesian court system recognizes several legal pieces of evidence in a trial. One of them is an expert statement from an expert witness. In presenting an expert witness in a trial, there must be a requirement that must be met by an expert witness in order to be called an expert witness. In addition, expert witnesses must also have ethics and professionalism in carrying out their duties as an expert witness. This paper will later discuss expert witnesses further, what are the conditions for becoming an expert witness, how the attitude of an expert witness in court, ethics and professionalism of expert witnesses, and then discuss one case example of how an expert witness violated his ethics and professionalism.
Analisis Investigasi Forensik Digital pada Layanan Private Cloud Computing Menggunakan SNI 27037:2014 Didik Sudyana; Irwan Hadi; Fietyata Yudha
Buletin Profesi Insinyur Vol 6, No 1 (2023): Buletin Profesi Insinyur (Januari-Juni)
Publisher : Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/bpi.v6i1.176

Abstract

Cloud computing telah memberikan banyak manfaat bagi pengguna. Terdapat beberapa jenis model adopsi cloud computing, salah satunya adalah model private yang memberikan perlindungan lebih terhadap privasi, dan telah banyak digunakan oleh pelaku industri. Tingginya angka penggunaan cloud computing memberikan peluang bagi para perilaku kriminal untuk melakukan tindak kejahatan siber. Ketika kejahatan siber telah terjadi, dibutuhkan penanganan dengan metode forensik digital untuk menganalisis barang bukti digital dan menemukan bukti-bukti kejahatan. Namun, teknik investigasi terhadap cloud computing berbeda, karena masalah reliabilitas data. Melakukan investigasi dari sisi pengguna merupakan salah satu metode yang dapat dilakukan. Oleh karena itu perlu dilakukan penelitian untuk melakukan proses investigasi kejahatan terhadap sisi pengguna yang terhubung layanan private cloud dan menganalisis barang bukti yang bisa didapatkan dari proses investigasi. Untuk mendukung proses investigasi dan analisis barang bukti digital yang dilakukan telah sesuai dengan kaidah forensik digital, digunakan framework Standar Nasional Indonesia (SNI) 27037:2014 yang merupakan standar nasional untuk analisis forensik digital. Dari hasil penelitian yang dilakukan, framework SNI 27037:2014 berhasil digunakan untuk menuntun proses investigasi terhadap barang bukti digital dari sisi pengguna dan berhasil menemukan beberapa barang bukti digital, seperti data yang telah dihapus, riwayat akses penggunaan cloud, dan riwayat akses file.Kata kunci: investigasi forensik digital, cloud computing, SNI 27037:2014