Data Integrity Testing of Digital Evidence Data Capture Results on Private Cloud Computing Services
Abstract
Full Text:
PDF (52-58)References
Q. Covert, D. Steinhagen, M. Francis, and K. Streff, “Towards a Triad for Data Privacy,†in Hawaii International Conference on System Sciences, 2020. DOI: 10.24251/HICSS.2020.535
M. F. Panende, I. Riadi, and Y. Prayudi, “Konsep Attribute Based Access Control (ABAC) Pada Lemari Penyimpanan Bukti Digital (LPBD),†JURNAL TEKNIK INFORMATIKA, vol. 11, no. 1, pp. 85–94, May 2018. DOI: 10.15408/jti.v11i1.7220
Amin Aenurahman Ali and Niken Dwi Wahyu Cahyani, “Digital Forensic Analysis on iDevice: Jailbreak iOS 12.1.1 as a Case Study,†Telkom Univesity, Bandung, 2019.
L. Singh and N. Dutta, “Routing Protocols for CRAHN: A Comparative Evaluation,†2020, pp. 3–11. DOI: 10.1007/978-981-15-1624-5_1
M. A. Adam, N. Widiyasono, and H. Mubarok, “Analisis Data Digital Evidence pada Layanan Voice Over Internet Protocol (VoIP),†Jurnal Edukasi dan Penelitian Informatika (JEPIN), vol. 2, no. 2, Nov. 2016. DOI: 10.26418/jp.v2i2.17578
E. Chintia, R. Nadiah, H. N. Ramadhani, Z. F. Haedar, A. Febriansyah, and M. Sc. E. N. A. Rakhmawati S.Kom., “Kasus Kejahatan Siber yang Paling Banyak Terjadi di Indonesia dan Penanganannya,†Journal of Information Engineering and Educational Technology, vol. 2, no. 2, p. 65, Feb. 2019. DOI: 10.26740/jieet.v2n2.p65-69
Y. | Setya and A. Suganda, “Design of Digital Evidence Collection Framework in Social Media Using SNI 27037:2014,†2022.
S. Madiyanto, H. Mubarok, and N. Widiyasono, “Mobile Forensics Investigation Proses Investigasi Mobile Forensics Pada Smartphone Berbasis IOS,†Jurnal Rekayasa Sistem & Industri (JRSI), vol. 4, no. 01, Sep. 2017. DOI: 10.25124/jrsi.v4i01.149
I. F. Editia Kurdiat, N. Widiyasono, and H. Mubarok, “Analisis Proses Investigasi Dekstop PC Yang Terhubung Layanan Private Cloud,†Jurnal Teknik Informatika dan Sistem Informasi, vol. 2, no. 2, Aug. 2016. DOI: 10.28932/jutisi.v2i2.463
N. Widiyasono, I. Riadi, and A. Luthfi, “Penerapan Metode ADAM Pada Proses Investigasi Layanan Private Cloud Computing,†Jurnal Edukasi dan Penelitian Informatika (JEPIN), vol. 2, no. 1, Jun. 2016. DOI: 10.26418/jp.v2i1.15501
D. Sudyana, N. Lizarti, and E. Erlin, “Forensic Investigation Framework on Server Side of Private Cloud Computing,†Lontar Komputer : Jurnal Ilmiah Teknologi Informasi, p. 181, Dec. 2019. DOI: 10.24843/lkjiti.2019.v10.i03.p06
Refbacks
- There are currently no refbacks.