2019
DOI: 10.22219/kinetik.v4i4.850
|View full text |Cite
|
Sign up to set email alerts
|

Live Forensics Analysis of Line App on Proprietary Operating System

Abstract: The development of computer technology is increasing rapidly. This has positive and negative effects. One of the negative effects that occurred was the use of Line applications to conduct online shop fraud. Line is one of the instant messenger applications that can be used on computers, especially on Windows 8.1 operating system computers. Applications that run on the computer leave traces of data on Random Access Memory (RAM). Data left in RAM can be obtained using digital forensic techniques, namely live for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
13
0
2

Year Published

2020
2020
2022
2022

Publication Types

Select...
6

Relationship

4
2

Authors

Journals

citations
Cited by 8 publications
(15 citation statements)
references
References 9 publications
0
13
0
2
Order By: Relevance
“…Penelitian dengan metode live forensic dilakukan oleh ) dengan judul Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics, penelitian ini menghasilkan barang bukti terkait kasus penipuan online dengan menggunakan tool ftk imager. Peneliti mengambil dan menganalisis data pada RAM, berupa percakapan WhatsApp (Riadi et al, 2019) Kerangka kerja dalam penyusunan laporan investigasi suatu kasus dapat dilakukan dengan beberapa metode, diantaranya menggunakan metode National Institute of Justice (NIJ) dan National Institute of Standard Technology (NIST). Penelitian dengan metode NIJ dilakukan oleh (Riadi et al, n.d.) (Riadi, Yudhana, et al, 2018).…”
Section: Gambar 2 Rangkuman Persentase Serangan Siberunclassified
“…Penelitian dengan metode live forensic dilakukan oleh ) dengan judul Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics, penelitian ini menghasilkan barang bukti terkait kasus penipuan online dengan menggunakan tool ftk imager. Peneliti mengambil dan menganalisis data pada RAM, berupa percakapan WhatsApp (Riadi et al, 2019) Kerangka kerja dalam penyusunan laporan investigasi suatu kasus dapat dilakukan dengan beberapa metode, diantaranya menggunakan metode National Institute of Justice (NIJ) dan National Institute of Standard Technology (NIST). Penelitian dengan metode NIJ dilakukan oleh (Riadi et al, n.d.) (Riadi, Yudhana, et al, 2018).…”
Section: Gambar 2 Rangkuman Persentase Serangan Siberunclassified
“…Still, on the other hand, some parties are not responsible for using Metasploit to carry out illegal hacking [3] [4]. On a computer, there is a Random Access Memory (RAM) in which there is a lot of data and information related to the processes running on a computer [5] [6].…”
Section: Introductionmentioning
confidence: 99%
“…Digital forensics processes need to be carried out to expose these crimes. Digital forensics is a science that aims to obtain evidence related to criminal cases and can be accounted for before the law [5][9] [10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Live forensics technique will be able to improve the results of digital evidence data recovery from the TRIM function on the NVMe SSD. This technique can also guarantee the data integrity without losing the digital evidence [14] [15].…”
mentioning
confidence: 99%