Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email
DOI:
https://doi.org/10.14421/jiska.2017.13-02Abstract
Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of life in the latest operation system windows 10. That study focused IN case several email security browsers Sales Operations manager of Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer Edge. In addition, although many digital forensics type software applications not free, goal on research objectives compares browser security information so it will be more minimize abuse email.
References
Arif, M. R. (2007). e-Mail Security. Seminar Nasional Teknologi 2007.
Bickford, J., & Giura, P. (2015). Safe Internet Browsing using a Transparent Virtual Browser. IEEE, pp. 423-432.
Carrier, B. D. (2009). Digital Forensics Works. IEEE, pp. 26-29.
Chan, E. M. (2011). https://www.ideals.illinois.edu. Retrieved from https://www.ideals.illinois.edu/bitstream/handle/21, diakses 25 Oktober 2016
Faiz, M. N., Umar, R., & Yudhana, A. (2016). ANALISIS KINERJA METODE LIVE FORENSICS UNTUK INVESTIGASI . Asosiasi Program Pascasarjana Perguruan Tinggi Muhammadiyah (APPPTM) Prosiding Konferensi Nasional Ke- 4 , pp. 207-211.
Gianni, F., & Solinas, F. (2013). Live Digital Forensics: Windows XP vs Windows 7. IEEE, pp. 1-6.
Hausknecht, K., Foit, D., & Burić1, J. (2015). RAM data significance in Digital Forensics. IEEE Conference Publications, pp. 1372 - 1375.
http://www.netmarketshare.com/. (n.d.). diakses 24 Oktober 2016
https://id.wikipedia.org/wiki/Microsoft_Edge. (n.d.). Retrieved from https://id.wikipedia.org/wiki/Microsoft_Edge, diakses 24 Oktober 2016
Jones, J., & Etzkorn, L. (2016). Analysis of Digital Forensics Live System Acquisition Methods to Achieve Optimal Evidence Preservation. IEEE, pp. 1-6.
Ligh, M. H., A. Case, J. L., & Aron, A. (2014). The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. Indianapolis: simultaneously.
Ligh, M., Adair, S., Hartstein, B., & Richard, M. (2010). Malware Analyst's Cookbook. Indianapolis: Wiley Publishing,.
Neethu Joseph, S. S., & Dija S, T. K. (2014). Volatile Internet Evidence Extraction from Windows. IEEE, pp. 1-5.
Rahardjo, B. (2002). Keamanan Sistem Informasi Berbasis Internet. Jakarta: PT INDOCISC - Jakarta.
Suryani, L. (2008-2014). http://ilmuti.org. Retrieved from http://ilmuti.org/wp-content/uploads/2014/03/Lely-Suryani-Mengenal-Macam-Macam-Web-Browser1.pdf , diakses 26 Oktober 2016
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms as stated in http://creativecommons.org/licenses/by-nc/4.0
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.