Akuisisi Data Forensik Google Drive Pada Android Dengan Metode National Institute of Justice ( NIJ )
DOI:
https://doi.org/10.24014/coreit.v4i1.5803Abstract
Smartphone adalah salah satu bukti perkembangan teknologi digital. Pada saat ini smartphone juga mengalami perkembangan pada media penyimpanan salah satunya adalah media penyimpanan Cloud. Penyimpanan awan yang ada pada android dan menjadi bawaan dari sebuah smartphone dengan sistem operasi andoid. Perkembangan media cloud storage ini tidak menutup kemungkinan akan mendapat dampak penggunaan yang bersifat negative atau dapat di gunakan sebagai media untuk tindak kejahatan. Hal ini merupakan tantangan baru bagi IT forensic dan penegak hukum untuk melakukan penyelidikan terhadap tindak kejahatan digital pada media cloud storage google drive pada android. Akuisisi digunakan untuk tahap yang penting dalam proses analisis tetapi tetap di rujuk dari metode yang sudah disepakati. Pengunaan metode yang di gunakan dalam menangani kejahatan dengan barang bukti media smartphone adalah Metode National Institute of Justice ( NIJ) .
References
S. Sahiruddin, Imam Riadi, “ANALISIS FORENSIK RECOVERY DENGAN KEAMANAN FINGERPRINT.”
G. M. Zamroni, R. Umar, and I. Riadi, “Analisis Forensik Aplikasi Instant Messaging Berbasis Android,” Annu. Res. Semin., vol. 2, no. 1, pp. 102–105, 2016.
A. Firdonsyah, I. Riadi, and Sunardi, “Analisis Forensik Bukti Digital Blackberry Messenger Pada Android,” Semin. Nas. Click Karawang, pp. 25–29, 2016.
B. Martini and K. K. R. Choo, “Cloud storage forensics: OwnCloud as a case study,” Digit. Investig., vol. 10, no. 4, pp. 287–299, 2013.
V. Roussev and S. McCulley, “Forensic analysis of cloud-native artifacts,” Digit. Investig., vol. 16, pp. S104–S113, 2016.
H. Chung, J. Park, S. Lee, and C. Kang, “Digital forensic investigation of cloud storage services,” Digit. Investig., vol. 9, no. 2, pp. 81–95, 2016.
D. Rathod, “G o o g l e D r i v e F o r e n s i c s,” pp. 136–140.
C. Long and Z. Qing, “Forensic Analysis to China’s Cloud Storage Services,” Int. J. Mach. Learn. Comput., vol. 5, no. 6, pp. 467–470, 2015.
M. N. Faiz, R. Umar, A. Yudhana, and U. A. Dahlan, “Analisis Live Forensics Untuk Perbandingan Kemananan Email Pada Sistem Operasi Proprietary,” J. Ilm. Ilk., vol. 8, no. 3, pp. 242–247, 2016.
J. T. Informatika, F. T. Industri, and U. I. Indonesia, “USB ANALISYS TOOL UNTUK INVESTIGASI FORENSIKA DIGITAL Fietyata Yudha.”
H. Chung, J. Park, S. Lee, and C. Kang, “Digital forensic investigation of cloud storage services,” Digit. Investig., vol. 9, no. 2, pp. 81–95, 2012.
R. Umar, A. Yudhana, and M. N. Faiz, “ANALISIS KINERJA METODE LIVE FORENSICS UNTUK INVESTIGASI RANDOM ACCESS MEMORY PADA SISTEM PROPRIETARY,” pp. 207–211.
I. A. Vassil Roussev, “Forensic Acquisition of Cloud Drives Forensic Acquisition of Cloud Drives ∗,” no. January 2016, 2017.
A. A. Anton Yudhana , Rusydi Umar, “Akuisisi dan analisis google drive pada smartphone android,” 2017.
Y. Prayudi, B. Sugiantoro, M. T. Informatika, F. T. Industri, and U. I. Indonesia, “Abstrak.”
Esley
R. A. Putra, A. Fadlil, and I. Riadi, “Forensik Mobile Pada Smartwach Berbasis Android,” Jurti, vol. 1, no. 1. pp. 41–47, 2017.
M. Nur Faiz, R. Umar, and A. Yudhana, “Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email,” JISKa, vol. 1, no. 3, pp. 108–114, 2017.
Downloads
Published
Issue
Section
License
The Authors submitting a manuscript do so on the understanding that if accepted for publication, copyright of the article shall be assigned to CoreIT journal and published by Informatics Engineering Department Universitas Islam Negeri Sultan Syarif Kasim Riau as publisher of the journal.
Authors who publish with this journal agree to the following terms:
Authors automatically transfer the copyright to the journal and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike (CC BY SA) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate permission for non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).