Metode Live Forensik Untuk Investigasi Serangan Formjacking Pada Website Ecommerce
Abstract
Keywords
Full Text:
PDF (Bahasa Indonesia)References
A.- Ahmadi, “Akuisisi Data Forensik Google Drive Pada Android Dengan Metode National Institute of Justice ( NIJ ),” J. CoreIT J. Has. Penelit. Ilmu Komput. dan Teknol. Inf., vol. 4, no. 1, p. 8, 2018,doi:10.24014/coreit.v4i1.5803.
Alex, M. E., & Kishore, R. (2017). Forensics framework for cloud computing. Computers and Electrical Engineering, 60, 193–205. https://doi.org/10.1016/j.compeleceng.2017.02.006
A. A. Zabar and F. Novianto, “Keamanan Http Dan Https Berbasis Web Menggunakan
Sistem Operasi Kali Linux,” J. Ilm. Komput. dan Inform., vol. 69, no. 2, pp. 2089–9033, 2015
Carrier, B., & Spafford, E. . (2003). Getting Physical with the Investigative Process. International Journal of Digital Evidence, 2(2), 1–20. https://doi.org/10.1.1.156.9541
D. Y. Kristiyanto, A. Iriani, S. Yulianto, and J. Prasetyo, “Visualisasi dan Intepretasi Database Engine Website Penilai Kinerja Karyawan Berbasis Online Transaction Processing (OLTP),” Pros. SINTAK 2018, no. Mvc, pp. 325–332, 2018.
Gregg Gunsch, Clint Carr, M. R. (2009). An Examination of Digital Forensic Models. 4th International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2009, 1(3), 42–53. https://doi.org/10.1109/SADFE.2009.8
Hakim, “Pengertian Website Menurut Para Ahli | TipsSerbaSerbi.” p. PENDIDIKAN,
Kurniawan, N. A. (2014). Jurnal pencegahan kejahatan carding sebagai kejahatan transnasional menurut hukum internasional.
M. N. Faiz, R. Umar, and A. Yudhana, “Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email,” JISKa, vol. 1, no. 3, pp. 108–114, 2017.
T. Rochmadi, “Live Forensik Untuk Analisa Anti Forensik Pada Web Browser Studi Kasus Browzar,” Indones. J. Bus. Intell., vol. 1, no. 1, pp. 32–38, 2018
M. F. Sidiq and M. N. Faiz, “Review Tools Web Browser Forensics untuk Mendukung
Pencarian Bukti Digital,” JEPIN, vol. 5, no. 1, pp. 67–73, 2019.
Nuh Al-Azhar, M. (2012). digital forensics. 302.
National Institute Of Standards And Technology U.S Departement of Commerce, “Cybersecurity | NIST,” 2019. [Online]. Available: https://www.nist.gov/topics/cybersecurity. [Accessed: 22-May-2019]
Ucu Nugraha. (2016). Manajemen Risiko Sistem Informasi Pada Perguruan Perguruan Tinggi Menggunakan Kerangka Kerja NIST SP 800-300. Seminar Nasional Telekomunikasi Dan Informatika (SELISIK 2016), 2503–2844.
Purbasari, W. (2017). MODEL KEPERCAYAAN KONSUMEN PADA SITUS E-COMMERCE. 1(1).
Puspitaningrum, D. A. (2017). Faktor – Faktor Yang Loyalitas Pada Konsumen E-Commerce Tokopedia Di Kota Semarang.
Pollitt, M. M. (2007). An Ad Hoc Review of Digital Forensic Models National Center for Forensic Science Department of Engineering Technology University of Central Florida. Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE’07), 43–54. https://doi.org/10.1109/SADFE.2007.3
R. Umar, A. Yudhana, and M. N. Faiz, “Experimental Analysis of Web Browser Sessions Using Live Forensics Method Experimental Analysis of Web Browser Sessions Using Live Forensics Method,” IJECE, vol. 8, no. 5, pp. 2951–2958, 2018,doi: 10.11591/ijece.v8i5.pp.2951-2958
R. Ayatulloh, K. Noor, and R. Umar, “Perancangan Prbandingan Live Forensics Pada Keamanan Media Sosial Instagram, Facebook dan Twitter di Windows 10,” SNST ke-9, pp. 125–128, 2018.
S. Awal et al., “Makalah Digital Forensik ( FTK IMAGER ),” 2017.
Takwa, O., Belgacem, C. R., & Adel, D. (2016). A New Digital Investigation Frameworks Comparison Method. International Journal of Computer Techniques -–, 3(4), 6–10. Retrieved from http://www.ijctjournal.org
Weiser, M., Biros, D., & Mosier, G. (2017). Development of A National Repository of Digital Forensic Intelligence. The Journal of Digital Forensics, Security and Law, (c). https://doi.org/10.15394/jdfsl.2006.1003I. Riadi, R. Umar, and I. M. Nasrulloh, “Experimental Investigation of Frozen Solid State Drive on Digital Evidence with Static Forensic Methods,” Lontar Komput. J. Ilm. Teknol. Inf., vol. 9, no. 3, p. 169, 2018, doi: 10.24843/lkjiti.2018.v09.i03.p06
DOI: https://doi.org/10.32528/justindo.v7i1.5356
Refbacks
- There are currently no refbacks.
Copyright (c) 2022 Nova Setiawan, Ahmad R Pratama, Erika Ramadhani
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.