The handling of digital evidence can become an evidence of a determination that crimes have been committed or may give links between crime and its victims or crime and the culprit. Soft System Methodology (SSM) is a method of evaluation to compare a conceptual model with a process in the real world, so deficiencies of the conceptual model can be revealed thus it can perform corrective action against the conceptual model, thus there is no difference between the conceptual model and the real activity. Evaluation on the IDFIF stage is only done on a reactive and proactive process stages in the process so that the IDFIF model can be more flexible and can be applied on the investigation process of a smartphone.
Perkembangan teknologi yang semakin pesat, dapat menimbulkan permasalahan bagi pengguna teknologi itu sendiri, semakin maju kehidupan masyarakat, maka kejahatan juga ikut semakin maju. Smartphone merupakan salah satu bentuk teknologi yang digunakan untuk melakukan penipuan melalui fasilitas Short Message Service (SMS). Pada saat smartphone yang digunakan untuk melakukan kejahatan maka smartphone tersebut dapat disita oleh aparat penegak hukum sebagai salah satu barang bukti. Cara pembuktian untuk mendapatkan bukti yang valid adalah dengan melakukan investigasi menggunakan pendekatan penanganan bukti digital yang dikenal dengan istilah Framework. Integrated Digital Forensics Investigation Framework versi 2 (IDFIF v2) merupakan framework terbaru yang telah dikembangkan sehingga dapat digunakan untuk proses investigasi smartphone.Kata kunci— Barang Bukti, Framework, IDFIF v2, Smartphone
RFID (Radio Frequenscy Identification) merupakan sebuah teknologi compact wireless yang diunggulkan untuk mentranformasi dunia komersial. Telah banyak dikembangkan di dunia bisnis maupun keamanan dewasa ini sebagai suksesor dari barcode, RFID dapat melakukan control otomatis untuk banyak hal. Sistem-sistem RFID menawarkan peningkatan efisien dalam penggendalian inventory control dalam pengidentifikasian barang. Oleh karena itu terdapat manfaat yang besar untuk sebuah perpustakaan secara intensif mempercayakan pada sistem ini. Adopsi yang meluas dari RFID banyak memunculkan persoalan dalam peningkatan layanan khususnya layanan self-service dan mengurangi layanan contacless, jaminan keamanan buku di perpustakaan sehingga perpustakaan akan dapat mengoptimalkan sumber daya manusia di perpustakaan. Peneliti menerapkan teknologi RFID pada pengisian data kunjungan perpustakaan dengan menggabungkan teknologi RFID yang berfungsi sebagai penghubung antara RFID reader dengan pembacaan database berbasis arduino.
Abstract. The handling of digital evidence each and every digital data that can proof a determination that a crime has been committed; it may also give the links between a crime and its victims or crime and the culprit. How to verify a valid evidence is to investigate using the approach known as the Digital Forensic Examination Procedures. Integrated Digital Forensic Investigation Framework (IDFIF) is the latest developed method, so that it is interesting to further scrutinize IDFIF, particularly in the process of investigation of a smartphone. The current smartphone devices have similar functions with computers. Although its functions are almost the same as the computer, but there are some differences in the process of digital forensics handling between computer devices and smartphones. The digital evidence handling process stages need to overcome the circumstances that may be encountered by an investigator involving digital evidence particularly on electronic media and smartphone devices in the field. IDFIF needs to develop in such a way so it has the flexibility in handling different types of digital evidence.Keywords: digital evidence, IDFIF, investigation, smartphoneAbstraks. Penanganan bukti digital mencakup setiap dan semua data digital yang dapat menjadi bukti penetapan bahwa kejahatan telah dilakukan atau dapat memberikan link antara kejahatan dan korbannya atau kejahatan dan pelakunya. Cara pembuktian untuk mendapatkan bukti valid adalah dengan melakukaninvestigasi dengan pendekatan Prosedur Pemeriksaan Digital Forensic. Integrated Digital Forensics Investigation Framework (IDFIF) merupakan metode terbaru sehingga IDFIF ini menarik untuk diteliti lebih lanjut terutama dalam proses investigasi smartphone. Saat ini perangkat smartphone memiliki fungsi yang sama dengan komputer. Meskipun demikian, ada beberapa perbedaan dalam proses penanganan digital forensics diantara perangkat komputer dan smartphone. Tahapan proses penanganan barang bukti digital seharusnya dibuat untuk mengatasi keadaan umum yang mungkin dihadapi oleh investigator yangmelibatkan barang bukti digital terutama pada perangkat smartphone dan media elektronik terkait di lapangan. IDFIF perlu dikembangkan sehingga memiliki fleksibilitas dalam menangani berbagai jenis barang bukti digital.Kata Kunci: bukti digital, IDFIF, investigasi, smartphone
Room safety is very important considering that the crime scene is very disturbing to the public, one of which is the usual theft case. This might be caused partly because of economic factors that cause people to sometimes take shortcuts to make ends meet by stealing. So the PIR sensor sensor tool was made to detect human movements making it easier for us to control security when leaving a room empty, the media used is Mobile, by utilizing SMS facilities. The purpose of this research is the implementation of the PIR sensor as a detector of human motion in a room based on sms. This tool consists of a sensor that is a pir sensor as a detector of human motion around, and the bazzer will sound every time there is a movement that is captured by a pir sensor, a GPRS Shield which has a sim card inside that works to send SMS. This type of research used is qualitative research with experimental methods, namely by conducting a cona test (trial and error) for mechanical and electronic design components of the hadware and trying to explain. From this research produced information provider using two KC7738 PIR-based SMS sensors can be applied by the public so that they can provide information when leaving a room empty.
An important aspect of a network security system is maintaining data integrity and ensuring that it can be used by users safely. All types of attacks and countermeasures against network discovery attempts by unauthorized parties must be able to overcome efforts to protect network security systems. Firewall systems are used to solve this problem, but software-level attack errors cannot be protected by firewall systems. In this study, the implementation of port knocking and port blocking methods in the network was successfully carried out for data privacy issues. The port blocking method on the Mikrotik router permanently blocks the www port and the Winbox port using the services provided by the Mikrotik router. The port knocking method is more effective because it has rules for being able to enter the proxy server and access it remotely on the local network. The port knocking network implementation experiment applied to the Mikrotik router has enforced the winbox port, and www with 1-2-3 authentication flows with each authentication has a predetermined timeout time.
The number of crimes committed by utilizing advances in information technology such as information leakage, embezzlement of money in banks, credit card fraud, pornography, terrorism, drug trafficking and many more are definitely related to the name digital data. File signatures or magic numbers are one of the forensic science techniques that assist in processing this digital data. The method used in this research is the National Institute Standards Technology method to analyze the authenticity of digital data and the method of proof to obtain valid evidence during the identification process of data or file content. This research is presented in the form of an analysis of the use of signature files in investigations to determine the type of file in the case of leaking company information xyz, the research stage uses evidence handling procedures in the laboratory. Contributions made after conducting a series of case investigations using signature files have been successfully carried out using the Access Data FTK Imager application version 4.2.0 and WinHex version 18.6. Signature files can be used for case investigations in identifying and verifying file types so that files that have been modified can be restored and can be read by the operating system by checking file types through hexadecimal values in the header file (file prefix) that show the characteristics of each type file so that the file type can be found and the file can be read by the operating system.
The Smart Home system consists of control, monitoring and automation devices that can be accessed from anywhere as long as there is an internet connection. In Smart Home, several devices or home appliances that can be accessed through android-based applications such as temperature monitoring, gas intensity, fire identification and automatic monitoring of door conditions. This research aims to design and create a smart home system based on the IoT concept. The research methodology uses an experimental methodology. The design of this system is made using an Android smartphone, Arduino microcontroller, Ethernet shield, relay module, fire sensor, temperature sensor (LM35), gas sensor (MQ6), and magnetic sensor. The results of this study are monitoring and control systems on smart homes by utilizing an already available Web service called Teleduino. This web service functions as an intermediary between an Android device and the Arduino microcontroller. The Arduino Microcontroller requires an additional device called the Ethernet Shield to connect Arduino to the Internet that is connected directly to the Teleduino web service.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
334 Leonard St
Brooklyn, NY 11211
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.