Hal penting yang harus diperhatikan oleh setiap petugas investigator forensika digital dalam menjalankan aktivitas forensika digital adalah diikutinya setiap tahapan dan prosedur dalam forensika digital. Tahapan tersebut dikenal dengan istilah frameworks ataupun SOP investigasi. Tahapan dalam proses forensika digital harus sesuai dengan aturan hukum dan juga mekanisme yang tepat. Namun framework investigasi yang berkembang saat ini ternyata masih terdapat kekurangan dimana ada tahapan-tahapan yang diatur dalam standar yang berlaku seperti SNI 27037:2014, ternyata tidak diatur dalam framework tersebut. Sehingga ketika tahapan tersebut terlewatkan dalam proses investigasi, tentu akan menjadi sebuah masalah dan bisa digugat di pengadilan serta dibatalkannya hasil investigasi yang dilakukan terkait adanya prosedur yang tidak dilaksanakan. Oleh karena itu dilakukan penelitian dengan melakukan identifikasi terhadap ketentuan dan proses penting dalam dokumen SNI 27037:2014 untuk kemudian menghasilkan instrument evaluasi yang dapat digunakan oleh penyidik atau praktisi forensika digital untuk melakukan penyesuaian atau evaluasi terhadap framework yang digunakan selama ini.
As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and crime scenarios. In this Final Project use forensic mobile application to get data residing in cell phone actors, in the form of text, sound, picture and video that have or not yet deleted in smartphone. In this study, a model for investigating the crime scene is the author using the Generic Computer Forensic Investigation Model (GCFIM). On the GCFIM model the investigator may be able to return to the previous stage because of the possibility of a changeable situation (both physical and digital), the investigation tools used, the crime tools used, and the level of investigative expertise. In this research also added weighting method of word TF-IDF, where this method can help to find keyword in digital evidence in the form of word / text.
AbstrakSeiring dengan berkembangnya teknologi smartphone, museum sebagai aset pemerintah juga harus menyesuaikan dalam menampilkan koleksinya. Aplikasi QR Code Scanner yang dibangun berbasis Android menggunakan ZBar Library mempunyai fitur Scanner, Bookmark, tentang Museum Sonobudoyo, dan menampilkan foto koleksi secara 3D Rotate. Semua fitur dalam aplikasi ini dapat berjalan dengan baik. Hasil pengujian alpha adalah semua proses dalam aplikasi berhasil dijalankan saat dilakukan pengujian. Pengujian beta pada fungsionalitas aplikasi didapatkan 100% responden menyatakan "Ya", dan 0% responden menyatakan "Tidak". Sedangkan pengujian beta pada antarmuka sistem dengan hasil skor yaitu 66.4 yang berada pada skala rating antara 54.41 -67.20 adalah puas Abstract Along with the development of smartphone technology, the museum as an asset of the government also had to adjust the display collection. QR Code Scanner application built using Android-based ZBar Library features the Scanner, Bookmark, about Sonobudoyo, and display photos in 3D Rotate collection. All features in these applications can be run properly. Results of alpha testing is all in the application process successfully run during testing. Beta testing the application functionality obtained 100% of respondents said "Yes", and 0% of respondents said "No". While beta testing the system interface with the score is 66.4 which is located on the rating scale between 54.41 -67.20 is satisfied
<strong>Abstrak</strong><br />Audio forensik merupakan salah satu ilmu yang mnyandingkan antara ilmu pengetahuan dan metode ilmiah dalam proses analisis rekaman suara untuk membantu dan mendukung pengungkapan suatu tindak kejahatan yang diperlukan dalam proses persidangan. Undang-undang ITE No.19 Tahun 2016 menyebutkan bahwa rekaman suara merupakan salah satu alat bukti digital yang sah dan dapat digunakan sebagai penguat dakwaan. Rekaman suara yang merupakan barang bukti digital sangatlah mudah dan rentan dimanipulasi, baik secara sengaja maupun tidak disengaja. Pada penelitian ini dilakukan analisis terkait tingkat kemiripan antara rekaman suara voice changer dengan rekaman suara asli menggunakan analisis pitch, formant dan spectogram, rekaman suara yang dianalisis ada dua jenis rekaman suara yaitu suara laki-laki dan suara perempuan. Rekaman suara voice changer dan rekaman suara asli, diekstrak menggunakan tools praat kemudian informasi yang diperoleh dianalisis dengan analisis statistik pitch, formant dan spectrogrammenggunakan tools gnumeric. Penelitian ini menghasilkan bahwa analisis rekaman suara voice changer dengan rekaman suara asli dapat menggunakan analisis statistik pitch, formant dan spectrogram, rekaman suara voice changer A memiliki tingkat kemiripan yang paling tinggi dengan rekaman suara asli pada posisi low pitch, sedangkan voice changer yang lain lebih sulit untuk diidentifikasi.<br />Kata Kunci: Audio Forensik, Voice Changer, Rekaman Suara, Pitch, Formant, Spectogram<br /><br /><strong>Abstract</strong><br />Audio forensics is one of the sciences that mnyandingkan between science and scientific methods in the process of sound recording analysis to assist and support the disclosure of a crime required in the trial process. The ITE Act No.19 of 2016 states that voice recording is one of the most valid digital instruments and can be used as an indictment. Voice recordings that are digital evidence are extremely easy and prone to be manipulated, either intentionally or unintentionally. In this research, there is an analysis related to the similarity level between the voice changer voice recording with the original sound recordings using pitch, formant and spectogram analysis. The sound recording that is analyzed are two types of sound recording, namely male voice and female voice. Voice recording of voice changer and original sound recording, extracted using praat tools then the information obtained is analyzed by pitch, formant and spectrogram analysis using gnumeric tools. This study resulted in the analysis of voice changer voice recording with original sound recording using pitch, formant and spectrogram statistical analysis, voice changer A voice recording has the highest level of resemblance with original sound recording in low pitch position, while other voice changer more difficult to be identified<br />Keywords: Audio forensics, Voice Changer, Sound Recording, Pitch, Formant, Spectogram
Software development usually follows the stages known as the Software Development Life Cycle (SDLC). Development begins with the requirements phase and then continues with the design, development of test plans, implementation (coding), testing, and deployment. However, the security aspect has not been explicitly reflected in SDLC. In fact security must be present at every stage of the SDLC. Application of security in the process of developing software, especially e-Commerce, one of which uses the Security Development Lifecycle-Agile (SDL-Agile) method. The advantage of the SDL-Agile method is the application development process which incorporates a safety factor in each application development process, which is concise, and emphasizes user satisfaction. This objective of this paper examine the deployment of SDL Agile Method for eCommerce website to measure its confidentiality, integrity, and availability of the systems.
Digital evidence handling and preservation are one stage of digital forensic process. This part is very crucial because digital evidence is the basis of digital forensic process.
Server virtualization is a technology that can run multiple operating systems simultaneously on one computer. The emergence of server virtualization invites a new crime gap that is different from the challenge of finding clues and digital evidence in uncovering cases of crime. This certainly makes it difficult for investigators to make acquisitions of one of the operating systems in server virtualization without disturbing and shutting down the computer given the importance of the server. So far, acquisition techniques are generally used singly which only contains one operating system. Therefore, it is necessary to have a technique to acquire server virtualization by using the live forensics method without interrupting or shutting down other running operating systems. The use of the live forensics method to acquire server virtualization is done by applying three acquisition techniques. Three acquisition technique models are carried out by acquiring one of the operating systems that are in the virtual machine on server virtualization through the Proxmox server without turning off the other operating systems that are running. Of the three acquisition models that have been tested, it is known that there are two models of acquisition techniques that are well used and recommended based on the situation and conditions that are occurring.
In the digital era like today the growth of data in the database is very rapid, all things related to technology have a large contribution to data growth as well as social media, financial technology and scientific data. Therefore, topics such as big data and data mining are topics that are often discussed. Data mining is a method of extracting information through from big data to produce an information pattern or data anomaly
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.