ANALISIS BUKTI FORENSIK DIGITAL PENIPUAN TRANSAKSI ONLINE PADA LINE MESSENGER MENGGUNAKAN METODE FORENSIK LANGSUNG

Syamsul Arifin, . (2023) ANALISIS BUKTI FORENSIK DIGITAL PENIPUAN TRANSAKSI ONLINE PADA LINE MESSENGER MENGGUNAKAN METODE FORENSIK LANGSUNG. Skripsi thesis, Universitas Pembangunan Nasional Veteran Jakarta.

[img] Text
ABSTRAK.pdf

Download (11kB)
[img] Text
AWAL.pdf

Download (408kB)
[img] Text
BAB 1.pdf

Download (102kB)
[img] Text
BAB 2.pdf
Restricted to Repository UPNVJ Only

Download (110kB)
[img] Text
BAB 3.pdf
Restricted to Repository UPNVJ Only

Download (138kB)
[img] Text
BAB 4.pdf
Restricted to Repository UPNVJ Only

Download (809kB)
[img] Text
BAB 5.pdf

Download (21kB)
[img] Text
DAFTAR PUSTAKA.pdf

Download (84kB)
[img] Text
RIWAYAT HIDUP.pdf
Restricted to Repository UPNVJ Only

Download (18kB)
[img] Text
LAMPIRAN.pdf
Restricted to Repository UPNVJ Only

Download (510kB)
[img] Text
HASIL PLAGIARISME.pdf
Restricted to Repository staff only

Download (500kB)
[img] Text
ARTIKEL KI.pdf
Restricted to Repository staff only

Download (863kB)

Abstract

The rapid development of computer technology is parallel to the increase in cybercrime. One example is the occurrence of fraud in online transactions. Such fraud can happen on the popular application called LINE Messenger, which is a multi-platform cloud-based instant messaging application that is free and non-profit. LINE is available for various operating systems such as Android, iOS, Windows Phone, Ubuntu Touch, and can also be accessed through computer devices like Windows, MacOS X, and Linux. Through the LINE application, users can exchange text messages, photos, videos, audios, documents, stickers, and various other file types. Every application running on a computer leaves behind traces of data and information in volatile memory, commonly known as Random Access Memory (RAM). Data and information stored in RAM can be obtained through a digital forensic technique known as "live forensics." Live forensics is an investigation method where the evidence collection process takes place while the perpetrator's computer or device is still actively in use. In the context of this research, the aim is to identify digital evidence related to cases of online transaction fraud found in volatile memory (RAM) and also on the disk of the machine. To achieve this goal, forensic tools called FTK Imager and WinHex are used. These tools are capable of retrieving and analyzing data and information stored in RAM. The results of this research consist of an analysis of digital evidence related to conversations, which can serve as significant evidence in uncovering cases of online transaction fraud.

Item Type: Thesis (Skripsi)
Additional Information: [No.Panggil: 1910511055] [Pembimbing: Henki Bayu Seta] [Penguji 1: Tjahjanto] [Penguji 2: Yuni Widiastiwi]
Uncontrolled Keywords: Digital Forensics, Live Forensics, LINE, Digital Evidence, Cybercrime, Volatile Memory, Virtual Machine, Windows OS
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
Divisions: Fakultas Ilmu Komputer > Program Studi Informatika (S1)
Depositing User: Syamsul Arifin
Date Deposited: 23 Aug 2023 02:08
Last Modified: 23 Aug 2023 02:08
URI: http://repository.upnvj.ac.id/id/eprint/25370

Actions (login required)

View Item View Item