Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Analisis bukti digital pada fitur view once Whatsapp dan self destruct Telegram menggunakan metode NIST SP 800-101 Rev 1
Bookmark Share

Text

Analisis bukti digital pada fitur view once Whatsapp dan self destruct Telegram menggunakan metode NIST SP 800-101 Rev 1

Rizky Ainur Rofiq - Personal Name; Muhammad Yusuf Bambang Setiadji - Personal Name; Dimas Febriyan Priambodo - Personal Name; Tiyas Yulita - Personal Name;

Penelitian dilakukan untuk mencari bukti digital dari fitur view once WhatsApp dan self destruct Telegram dengan skenario smartphone dalam keadaan unroot dan root. Smartphone yang digunakan dalam penelitian adalah smarphone android. Metode yang dijadikan pedoman dalam penelitian adalah NIST 800-101 Revision 1. Skenario yang dijalankan berupa pesan gambar dan video sekali lihat yang dimiliki oleh fitur tersebut. Selanjutnya, data diambil menggunakan tools MobilEdit Forensic dan Magnet Axiom yang selanjutnya data hasil pengambilan akan diperiksa dan dianalisis oleh MobilEdit Forensic dan Magnet Axiom. Hasil dari analisis yang didapatkan fitur view once WhatsApp berhasil ditemukan berupa artefak foto dan video dengan skenario root. Sedangkan artefak foto dan video dari fitur self destruct Telegram dengan skenario root tidak dapat ditemukan, namun artefak berupa riwayat pengiriman fitur tersebut dapat ditemukan. Fitur view once WhatsApp dan self destruct Telegram tidak dapat ditemukan pada smartphone dengan kondisi unroot. Fitur view once WhatsApp dengan smartphone kondisi root kurang efektif dalam mencapai anti forensik, dikarenakan artefak fitur tersebut dapat ditemukan, sedangkan fitur self destruct Telegram dengan kondisi smartphone root, fitur view once WhatsApp dan self destruct Telegram dengan smartphone kondisi unroot lebih efektif dalam mencapai tujuan anti forensik dikarenakan artefak fitur tersebut tidak ditemukan. Penelitian ini diharapkan dapat memberikan informasi hasil analisis bukti digital, mengetahui keefektifan dari fitur tersebut dalam mencapai tujuan anti forensik dengan kondisi smartphone root dan unroot, serta memberikan tambahan referensi bagi penelitian lain tentang digital forensik berbasis mobile agar dikembangkan di masa yang akan datang --

The research was conducted to find evidence of digital view once whatsapp and self destruct Telegram with smartphone scenarios in unrooted and rooted state. The smartphone used in this study is an android smartphone. The method used as a guide in this research is NIST 800-101 Revision 1. The scenario is run in the form of a one-time message, images and videos owned by the feature. Furthermore, the data is taken using MobilEdit Forensic and Magnet Axiom tools, which will then be examined and analyzed by MobilEdit Forensic and Magnet Axiom. The results of the analysis obtained by the view once WhatsApp feature were found in the form of photo and video artifacts with a root scenario. Meanwhile, photo and video artifacts from self-destruct telegram feature with the root scenario could not be found, but artifacts in the form of the delivery history of the feature could be found. The view once WhatsApp and self destruct Telegram features cannot be found on smartphones with unrooted conditions. The view once WhatsApp feature with a root condition is less effective in anti-forensic, because artifacts of the feature can be found. Meanwhile, self-destruct Telegram feature with a root condition, view once WhatsApp and self-destruct Telegram features with an unrooted condition are more effective in anti-forensic because the feature artifact was not found. This research is expected to provide information on the results of digital evidence analysis, determine the effectiveness of these features in achieving anti-forensic goals with root and unrooted smartphone conditions, and provide additional references for other research on mobile-based digital forensics to be developed in the future.


Availability
#
Rekayasa Keamanan Siber 2022 RIZ a
TA20220101568
Available - Read on Location
#
Rekayasa Keamanan Siber 2022 RIZ a
TA20220101569
Available - Read on Location
Detail Information
Series Title
-
Call Number
2022 RIZ a
Publisher
Bogor : Politeknik Siber dan Sandi Negara., 2022
Collation
xvi, 58 hlm.
Language
Indonesia
ISBN/ISSN
--
Classification
--
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
anti forensik
Self Destruct Telegram
Skenario Root
Skenario Unroot
View Once WhatsApp
Specific Detail Info
-
Statement of Responsibility
Rizky Ainur Rofiq
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?