Syamsul Arifin, . (2023) ANALISIS BUKTI FORENSIK DIGITAL PENIPUAN TRANSAKSI ONLINE PADA LINE MESSENGER MENGGUNAKAN METODE FORENSIK LANGSUNG. Skripsi thesis, Universitas Pembangunan Nasional Veteran Jakarta.
Text
ABSTRAK.pdf Download (11kB) |
|
Text
AWAL.pdf Download (408kB) |
|
Text
BAB 1.pdf Download (102kB) |
|
Text
BAB 2.pdf Restricted to Repository UPNVJ Only Download (110kB) |
|
Text
BAB 3.pdf Restricted to Repository UPNVJ Only Download (138kB) |
|
Text
BAB 4.pdf Restricted to Repository UPNVJ Only Download (809kB) |
|
Text
BAB 5.pdf Download (21kB) |
|
Text
DAFTAR PUSTAKA.pdf Download (84kB) |
|
Text
RIWAYAT HIDUP.pdf Restricted to Repository UPNVJ Only Download (18kB) |
|
Text
LAMPIRAN.pdf Restricted to Repository UPNVJ Only Download (510kB) |
|
Text
HASIL PLAGIARISME.pdf Restricted to Repository staff only Download (500kB) |
|
Text
ARTIKEL KI.pdf Restricted to Repository staff only Download (863kB) |
Abstract
The rapid development of computer technology is parallel to the increase in cybercrime. One example is the occurrence of fraud in online transactions. Such fraud can happen on the popular application called LINE Messenger, which is a multi-platform cloud-based instant messaging application that is free and non-profit. LINE is available for various operating systems such as Android, iOS, Windows Phone, Ubuntu Touch, and can also be accessed through computer devices like Windows, MacOS X, and Linux. Through the LINE application, users can exchange text messages, photos, videos, audios, documents, stickers, and various other file types. Every application running on a computer leaves behind traces of data and information in volatile memory, commonly known as Random Access Memory (RAM). Data and information stored in RAM can be obtained through a digital forensic technique known as "live forensics." Live forensics is an investigation method where the evidence collection process takes place while the perpetrator's computer or device is still actively in use. In the context of this research, the aim is to identify digital evidence related to cases of online transaction fraud found in volatile memory (RAM) and also on the disk of the machine. To achieve this goal, forensic tools called FTK Imager and WinHex are used. These tools are capable of retrieving and analyzing data and information stored in RAM. The results of this research consist of an analysis of digital evidence related to conversations, which can serve as significant evidence in uncovering cases of online transaction fraud.
Item Type: | Thesis (Skripsi) |
---|---|
Additional Information: | [No.Panggil: 1910511055] [Pembimbing: Henki Bayu Seta] [Penguji 1: Tjahjanto] [Penguji 2: Yuni Widiastiwi] |
Uncontrolled Keywords: | Digital Forensics, Live Forensics, LINE, Digital Evidence, Cybercrime, Volatile Memory, Virtual Machine, Windows OS |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software |
Divisions: | Fakultas Ilmu Komputer > Program Studi Informatika (S1) |
Depositing User: | Syamsul Arifin |
Date Deposited: | 23 Aug 2023 02:08 |
Last Modified: | 23 Aug 2023 02:08 |
URI: | http://repository.upnvj.ac.id/id/eprint/25370 |
Actions (login required)
View Item |