Hal penting yang harus diperhatikan oleh setiap petugas investigator forensika digital dalam menjalankan aktivitas forensika digital adalah diikutinya setiap tahapan dan prosedur dalam forensika digital. Tahapan tersebut dikenal dengan istilah frameworks ataupun SOP investigasi. Tahapan dalam proses forensika digital harus sesuai dengan aturan hukum dan juga mekanisme yang tepat. Namun framework investigasi yang berkembang saat ini ternyata masih terdapat kekurangan dimana ada tahapan-tahapan yang diatur dalam standar yang berlaku seperti SNI 27037:2014, ternyata tidak diatur dalam framework tersebut. Sehingga ketika tahapan tersebut terlewatkan dalam proses investigasi, tentu akan menjadi sebuah masalah dan bisa digugat di pengadilan serta dibatalkannya hasil investigasi yang dilakukan terkait adanya prosedur yang tidak dilaksanakan. Oleh karena itu dilakukan penelitian dengan melakukan identifikasi terhadap ketentuan dan proses penting dalam dokumen SNI 27037:2014 untuk kemudian menghasilkan instrument evaluasi yang dapat digunakan oleh penyidik atau praktisi forensika digital untuk melakukan penyesuaian atau evaluasi terhadap framework yang digunakan selama ini.
Server virtualization is a technology that can run multiple operating systems simultaneously on one computer. The emergence of server virtualization invites a new crime gap that is different from the challenge of finding clues and digital evidence in uncovering cases of crime. This certainly makes it difficult for investigators to make acquisitions of one of the operating systems in server virtualization without disturbing and shutting down the computer given the importance of the server. So far, acquisition techniques are generally used singly which only contains one operating system. Therefore, it is necessary to have a technique to acquire server virtualization by using the live forensics method without interrupting or shutting down other running operating systems. The use of the live forensics method to acquire server virtualization is done by applying three acquisition techniques. Three acquisition technique models are carried out by acquiring one of the operating systems that are in the virtual machine on server virtualization through the Proxmox server without turning off the other operating systems that are running. Of the three acquisition models that have been tested, it is known that there are two models of acquisition techniques that are well used and recommended based on the situation and conditions that are occurring.
Cloud Computing is a technological development that has been warmly discussed in recent years and has seen significant increases in usage, especially on the IAAS Cloud Computing model. The high rate of development of IAAS Cloud Computing model is in line with the high number of crimes involving IAAS Cloud Computing model on server virtualization. When a computer crime occurs and a digital forensic investigation will be carried out to uncover the case, it raises issues related to the acquisition of digital evidence. Because the acquisition model in general, it is done only to one operating system, while in virtualization there is more than one operating system, so the acquisition technique in general cannot be used because it takes only one operating system involved crime, and cannot acquire the whole data server related privacy data in other virtual operating systems. Therefore, research to make the acquisition system of server virtualization is needed. The focus in this research is to make system acquisition in server virtualization Proxmox using the live forensic method to produce a system that can acquire virtualization without disrupting the overall data server and in accordance with the principle of digital forensics. The resulting acquisition system can be a reference for investigators to investigate the IAAS Cloud Computing model on Proxmox virtualization and facilitate the investigator's work in the use of the system because the investigator simply chooses which virtual operating system to acquire, after which the system will work on its own the acquisition.
Cloud Computing is one of the technologies that continue to develop and progress in rapid adoption rates due to the various benefits and conveniences offered. Cloud Computing has four types of adoption models, one of which is a Private model and is widely adopted by users because it is safer and customizable. The high level of cloud computing adoption is an opportunity for criminals to use cloud computing in committing their crimes and requires handling digital forensics. However, each cloud model has different characteristics, so the investigative method used is also different. Then there is no specific guidance for investigating cloud computing. So it is necessary to analyse the investigation of private cloud computing that used OwnCloud from the server-side and develop the novel investigation framework based on SNI 27037: 2014. An analysis of investigations is performed to develop the novel investigation framework and to find out what evidence can be found based on the novel framework. The results of the research conducted can be a reference for investigators to conduct forensic investigations in cloud computing on the server-side and the novel investigation framework will become a reference to be used as a guide to the investigation on private cloud computing in the server-side.
Abstract Students are one of the many users of technology and the internet. Based on data from the Association of Indonesian Internet Service Providers, it states that as many as 100% of student respondents stated using the internet every day. So that the potential for students to become victims of cyber crime continues to increase. This is because many internet users are not careful in using it. Cyber crimes that often occur include identity theft, kidnapping, online fraud, burglary and so forth. During this time many users who write their personal identity on social media, not even a few who post about the location they visit. Then many students are fond of using free wifi. Cybercrime will not occur if there is vigilance and caution from its users. Students should be able to realize the negative effects of cyberspace. For this reason, an analysis is needed regarding the presence of social media users. In this research, analysis of student awareness in the informatics engineering study program, computer science faculty, Muhammadiyah University of Riau to find out how much the level of student awareness about the dangers of cybercrime is based on the social media and user awareness categories. From the results of the study, it was concluded that students of the Department of Informatics had a fairly good level of awareness. This is evidenced from the average results obtained in the social media category, 83.4% of students have a fairly good awareness while the average user awareness category of 72.7%. However, the university, faculty and study programs must still provide assistance, education or outreach to those who do not have a good level of vigilance because there are still a few percent who still do not have a good level of vigilance. Keywords: cybercrime, students, awareness, social media, internet Abstrak Mahasiswa merupakan salah satu pengguna teknologi dan internet yang cukup banyak. Berdasarkan data dari Asosiasi Penyedia Jasa Internet Indonesia, menyebutkan bahwa sebanyak 100% responden dari mahasiswa menyatakan menggunakan internet setiap harinya. Sehingga potensi mahasiswa menjadi korban kejahatan siber pun terus meningkat. Hal ini disebabkan karena banyak pengguna internet yang tidak berhati-hati dalam menggunakannya. Kejahatan cyber yang sering terjadi diantaranya adalah pencurian identitas, pembulian, penipuan online, perampokan dan lain sebagainya. Selama ini banyak pengguna yang menuliskan identitas pribadinya di media social, bahkan tidak sedikit yang memposting tentang lokasi yang mereka kunjungi. Kemudian banyak mahasiswa yang gemar menggunakan wifi gratis. Kejahatan cyber tidak akan terjadi jika ada kewaspadaan dan kehati-hati dari para penggunanya. Seharusnya para mahasiswa dapat menyadari dampak negatif dari dunia maya. Untuk itu perlu dilakukan analisis terkait kesadaarn pengguna media sosial. Dalam penelitian ini, analisis kesadaran mahasiswa di program studi teknik informatika, fakultas ilmu komputer, universitas muhammadiyah riau untuk mengetahui seberapa besar tingkat kesadaran mahasiswa tentang bahaya cybercrime didasarkan pada kategori media sosial dan kesadaran pengguna. Dari hasil penelitian, disimpulkan bahwa mahasiswa Jurusan Teknik Informatika memiliki tingkat kesadaran yang cukup baik. Hal ini dibuktikan dari hasil rata-rata yang diperoleh pada kategori media sosial, 83,4% mahasiswa mempunyai kesadaran yang cukup baik sedangkan pada kategori kesadaran pengguna rata-rata sebanyak 72,7%. Namun pihak universitas, fakultas dan juga program studi tetap harus memberikan pendampingan, edukasi ataupun sosialisasi bagi yang belum memiliki tingkat kewaspadaan yang baik karena masih ada beberapa persen masih masih belum mempunyai tingkat kewaspadaan yang baik. Kata kunci: cybercrime, mahasiswa, kesadaran, media social, internet
Students are one of the many users of technology and the internet. So that the potential for students to become victims of cybercrime continues to increase. It happens because many internet users are not careful in using it. Cybercrime will not occur if there are awareness and caution from its users who, unfortunately, there are still many users not care about this. For this reason, it is necessary to conduct an analysis related to the awareness of social media and technology users of the danger of cybercrime for students. In this research, an analysis of students' awareness is carried out in the informatics engineering study program at Muhammadiyah University of Riau to find out how much the level of awareness about the dangers of cybercrime. The analysis is based on three categories, namely social media, cyber fraud, and user awareness. From the results of the study, it was concluded that the students of the Department of Informatics Engineering had a pretty good level of awareness. In the social media category, an average level of awareness was found at 84.2%, in the Cyber Fraud category at 81.75%, and in the user awareness category at 72.7%. So based on this value, the relevant authorities can compile policies related to appropriate education for students to avoid cybercrime.
Kebutuhan organisasi bergantung pada infrastruktur teknologi salah satunya kebutuhan pengembangan server. UPT Teknologi dan Komunikasi Pendidikan yang bertugas dibidang teknologi juga membutuhkan pengembangan server. Karena awalnya UPT Teknologi dan Komunikasi Pendidikan hanya memiliki 3 unit server dan tidak memadai untuk menjalankan kebutuhan. UPT Teknologi dan Komunikasi Pendidikan minimal harus mempunyai 7 unit server. Ketiga server yang berjalan juga menggunakan resource yang sedikit. Hal ini membuat tidak efisiensinya penggunaan server tersebut. Virtualisasi kemudian menjadi solusi yang tepat untuk menyelesaikan masalah tersebut. Virtualisasi berbasiskan open source menjadi pilihan utama untuk digunakan seperti proxmox. Dengan penerapan virtualisasi proxmox, penggunaan resource menjadi maksimal, karena 3 server dapat berjalan bersamaan di 1 server fisik. Dan dengan fitur Live Migration dari proxmox, satu virtual machine dapat dipindahkan ke server fisik lainnya ketika maintenance tanpa downtime. Dengan demikian, biaya pengadaan server baru dapat diminimalisir dan biaya operasional yang harus dikeluarkan menjadi berkurang.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.