![]() ![]() However, smartphones used to access these cloud services can serve as potential sources. The complex architecture and legal restrictions associated with cloud services make the acquisition of data from servers almost impossible in digital investigations involving cloud services. Berdasarkan hasil penelitian dengan live forensik dengan akuisisi dan analisis memori RAM, bukti digital dapat dideteksi dan didapatkan bukti digital berupa file dokumen yang didapatkan dari sebuah tautan yang digunakan untuk berbagi file. Penelitian ini dilakukan melalui sebuah simulasi atas skenario kasus penggunaan cloud kemudian dilakukan tahapan-tahapan dalam proses investigasi dari metode digital forensik yang meliputi acquisition, examination, analysis dan conclusion. Dalam penelitian ini dilakukan penelitian cloud storage forensik dari layanan Adrive. Cloud forensik tetap menjadi kendala dan tantangan bagi investigator dikarenakan setiap penyedia cloud memiliki arsitektur yang berbeda sehingga diperlukan investigasi yang berbeda dalam melakukan cloud forensik. Kejahatan cyber akan semakin beraneka macam dan memungkinkan pelaku kejahatan akan berinovasi dengan adanya cloud. Disamping beberapa kemudahan dan kenyaman dalam menggunakan cloud, menimbulkan masalah baru yaitu cybercrime. ![]() Cloud computing juga menjadi salah satu teknologi yang cepat berkembang dan transformatif. This study increases the knowledge of cloud storage forensics and the significance of registry analysis during digital investigations.Įra revolusi industri 4.0 yang serba digital seperti sekarang ini, teknologi cloud tidak bisa dilepaskan dalam kehidupan kita. ![]() The study explores different experimental setups for the forensic analysis and adopted an integrated conceptual digital forensic framework in the investigation process to detect relevant forensic artifacts from the registry of a windows 10 device. This study identifies relevant artifacts that can be forensically extracted from the registry of a window 10 device that accessed iDrive cloud storage. Therefore, there is a need to perform client-side forensics to be able to carry out forensic investigation on digital devices as related to the activities on cloud storage. The logs of malicious usages can be obtained from the cloud service providers for forensic investigations but the privacy issue among other factors make it difficult for such logs to be shared. These benefits can also be exploited by the cybercriminals to perform various criminal activities including storing and exchanging of illegal materials on cloud storage platforms. The accessibility of cloud storage over the internet as a result of cloud computing technology provides the opportunity to store, share and upload data online with the use of digital devices which can be accessed anytime and anywhere. The ad-vantage of chaos cryptography is randomness alike, which creates more complex encryption and decryption key by a concept of confu-sion and diffusion. Chaotic cryptography is an application of chaos theory into cryptography, which makes use of a simplex system to produce chaotic value needed for the encryption and decryption. What cryptography simply said is a practice to protect data from theft, alteration, and authenticate. This is one of the reason backups must be an automated process. A hacker looks for the oppor-tunity even as tiny as a day of forgotten backup. One of the human errors is humans easily forgot things, in this situation a backup which sometimes manually may be forgotten to do even it's a click away. The solution is to do backup properly the crucial data, and it can be hard on users especially a beginner. This dependency becomes much of a problem if the availability of this data is not kept high. Dependency on IT infrastructures can be seen with more people these days in processing all the data with a computer and store it within storage in the database. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |