skip to main content

Analisis Forensik Database Menggunakan Metode Forensik Statis

*Imam Riadi  -  Universitas Ahmad Dahlan, Indonesia
Rusdy Umar  -  Universitas Ahmad Dahlan, Indonesia
Dora Bernadisman  -  Universitas Ahmad Dahlan, Indonesia
Open Access Copyright (c) 2019 JSINBIS (Jurnal Sistem Informasi Bisnis)

Citation Format:
Abstract

SIMDA (Regional Management Information System) is a system created by the BPKP (Financial and Development Supervisory Agency) to assist local governments in implementing regional financial management so that it complies with applicable, efficient, effective, transparent, accountable and auditable regulations. Management data is stored in the SIMDA database on a server connected to a computer network, it is possible that the database is always infiltrated and indicated by data manipulation by hackers. The purpose of this study is to monitor database activity and detect data manipulation done by hackers, then forensic processes are carried out using static forensic methods with stages, namely data collection, data checking, data analysis, and reporting so as to provide evidence and instructions to do analysis on the SIMDA Planning database. The results obtained using static forensic methods show that there has been manipulation or change in the budget ceiling of the activity that exceeds the program budget ceiling (mark-up in budget planning) carried out by hackers who enter through the SIMDA database. Output from forensic processes can prove manipulation data that is carried out by hackers can be detected using SQL Profiler and SQL Log Analyzer tools so that output can be used as digital evidence to assist law enforcement in revealing cybercrime crime cases and can be accounted for in court proceedings.

Fulltext View|Download
Keywords: Forensik; Database; SIMDA; Manipulasi, SQL Injection

Article Metrics:

  1. Al-Azhar, M., 2012. Digital Forensik Panduan Praktis Investigasi Komputer. anwar, nuril, & Riadi, I., 2017. Analisis Investigasi Forensik WhatsApp Messanger Smartphone Terhadap WhatsApp Berbasis Web. Jurnal Ilmiah Teknik Elektro Komputer Dan Informatika, 3(1), 1–10. Retrieved from
  2. Cohen, F., & Ph, D., 2013. Digital Forensic EvidenceExamination(Copyright,p.517).Retrived, from http://all.net/books/2013-DFE-Examination.pdf
  3. Bernadisman, D., 2017. Analisis Forensik Basis Data Menggunakan Framework Open Web Application Security Project (OWASP), Prosiding Seminar Nasional Informatika, Vol.1, Jakarta, November 18, 45-58
  4. Casey, E., 2010. Handbook of Digital Forensics and Investigation, Unites states of America, academi Press
  5. Faiz, M.N., Umar, R. dan Yudhana, A., 2017. Implementasi Live Forensics untuk perbandingan Browser pada Keamanan Email.(JISKa), Vol. 1, No. 3, 108-114
  6. Fowler, K., 2007, Forensic Analysis of a SQL Server 2005 Database Server.USA: emergis
  7. Kalbande, D. & Jain, N., 2013. Comparative Digital Forensic Model. International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET), Vol. 2 No. 8, 3414-3419
  8. Murniati, Munandi, R., Arif, T.Y., 2018. Analysis of Web Server Security Against Structure Query Language Injection Attacks in ASEAN Senior High Schools. 3 (1), 1-7
  9. Subli, M., Sugiantoro, B., Prayudi, Y., 2017. Metadata Forensik Untuk Mendukung Proses Investigasi Digital. Jurnal Ilmiah Data Manajemen dan Teknologi Informasi 18 (1), 44-50
  10. Riadi, I, Umar, R , Wasito., 2014. Analisis Forensik Serangan SQL Injection Menggunakan Metode Statis Forensik. Volume 1 No.1, 1-2
  11. Sistem Informasi Manajemen Daerah, 2018. Website: http://www.bpkp.go.id/sakd/konten/333/Versi-2.1.bpkp diakses tanggal 20 Februari 2019
  12. Sulianta, F. 2014. Teknik Forensik. Jakarta : PT Elex Media Komputindo

Last update:

No citation recorded.

Last update: 2024-12-21 06:10:38

No citation recorded.