Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email

Authors

  • Muhammad Nur Faiz Ahmad Dahlan University
  • Rusydi Umar Ahmad Dahlan University
  • Anton Yudhana Ahmad Dahlan University

DOI:

https://doi.org/10.14421/jiska.2017.13-02

Abstract

Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of life in the latest operation system windows 10. That study focused IN case several email security browsers Sales Operations manager of Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer Edge. In addition, although many digital forensics type software applications not free, goal on research objectives compares browser security information so it will be more minimize abuse email.

Author Biographies

Muhammad Nur Faiz, Ahmad Dahlan University

saya mahasiswa Magister Teknik Informatika di Universitas Ahmad Dahlan angkatan 2016, s1 di UIN Sunan Kalijaga Yogyakarta angkatan 2010 dan lulus tahun 2014 jurusan Teknik Informatika

no hp : 085729234400

Rusydi Umar, Ahmad Dahlan University

informatics engineering lecturer, faculty of engineering, Ahmad Dahlan University

Anton Yudhana, Ahmad Dahlan University


Electrical engineering lecturer, faculty of engineering, Ahmad Dahlan University

References

Arif, M. R. (2007). e-Mail Security. Seminar Nasional Teknologi 2007.

Bickford, J., & Giura, P. (2015). Safe Internet Browsing using a Transparent Virtual Browser. IEEE, pp. 423-432.

Carrier, B. D. (2009). Digital Forensics Works. IEEE, pp. 26-29.

Chan, E. M. (2011). https://www.ideals.illinois.edu. Retrieved from https://www.ideals.illinois.edu/bitstream/handle/21, diakses 25 Oktober 2016

Faiz, M. N., Umar, R., & Yudhana, A. (2016). ANALISIS KINERJA METODE LIVE FORENSICS UNTUK INVESTIGASI . Asosiasi Program Pascasarjana Perguruan Tinggi Muhammadiyah (APPPTM) Prosiding Konferensi Nasional Ke- 4 , pp. 207-211.

Gianni, F., & Solinas, F. (2013). Live Digital Forensics: Windows XP vs Windows 7. IEEE, pp. 1-6.

Hausknecht, K., Foit, D., & Burić1, J. (2015). RAM data significance in Digital Forensics. IEEE Conference Publications, pp. 1372 - 1375.

http://www.netmarketshare.com/. (n.d.). diakses 24 Oktober 2016

https://id.wikipedia.org/wiki/Microsoft_Edge. (n.d.). Retrieved from https://id.wikipedia.org/wiki/Microsoft_Edge, diakses 24 Oktober 2016

Jones, J., & Etzkorn, L. (2016). Analysis of Digital Forensics Live System Acquisition Methods to Achieve Optimal Evidence Preservation. IEEE, pp. 1-6.

Ligh, M. H., A. Case, J. L., & Aron, A. (2014). The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory. Indianapolis: simultaneously.

Ligh, M., Adair, S., Hartstein, B., & Richard, M. (2010). Malware Analyst's Cookbook. Indianapolis: Wiley Publishing,.

Neethu Joseph, S. S., & Dija S, T. K. (2014). Volatile Internet Evidence Extraction from Windows. IEEE, pp. 1-5.

Rahardjo, B. (2002). Keamanan Sistem Informasi Berbasis Internet. Jakarta: PT INDOCISC - Jakarta.

Suryani, L. (2008-2014). http://ilmuti.org. Retrieved from http://ilmuti.org/wp-content/uploads/2014/03/Lely-Suryani-Mengenal-Macam-Macam-Web-Browser1.pdf , diakses 26 Oktober 2016

Downloads

Published

2017-03-30

How to Cite

Faiz, M. N., Umar, R., & Yudhana, A. (2017). Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email. JISKA (Jurnal Informatika Sunan Kalijaga), 1(3), 108–114. https://doi.org/10.14421/jiska.2017.13-02