scholarly journals Ekstraksi Logis Forensik Mobile pada Aplikasi E-Commerce Android

2020 ◽  
Vol 2 (1) ◽  
pp. 1-10
Author(s):  
Nuril Anwar ◽  
Son Ali Akbar ◽  
Ahmad Azhari ◽  
Imam Suryanto

Pesatnya perkembangan aplikasi android, terutama aplikasi di bidang e-commerce dan transaksi jual beli online yang populer di Indonesia, memaksa pengguna untuk memberikan izin untuk menggunakan fitur dan layanan aplikasi selama pemasangan dan pasca pemasangan. Kurangnya pemahaman pengguna akan resiko dari izin akses yang diminta oleh aplikasi sebelum atau setelah melakukan instalasi menjadikan celah pada keamanan data pengguna untuk mengakses fitur pada perangkat smartphone seperti kamera, media penyimpanan, kontak, akun dan fitur lainnya. Logical Extraction Method menjadi metode yang digunakan untuk mendapatkan data aplikasi dengan mengakusisi seluruh data file sistem pada smartphone menggunakan bantuan tools MOBILedit Forensic, TWRP (Team Win Recovery Project), dan Aplikasi Migrate. Akusisi data dari masing-masing aplikasi akan diambil Android Package File (APK) yang digunakan untuk proses analisis secara statis dengan menggunakan Tools Forensic MobSF (Mobile Security Framework). Berdasarkan hasil analisis yang dilakukan pada tiga aplikasi teratas e-commerce terdapat 51 izin akses dan dari tiga aplikasi e-commerce terpopuler di Indonesia dengan tingkat keamanan paling berbahaya dengan 49 izin akses, 7 izin akses normal dan 1 izin akses tanda tangan. Aplikasi lazada terdapat 21 izin akses berbahaya yang tidak diketahui pengguna sedangkan aplikasi Tokopedia terdapat 4 izin akses berbahaya yang tidak diketahui pengguna dan aplikasi Blibli.com terdapat 1 izin akses berbahaya yang tidak diketahui pengguna. Berdasarkan temuan celah keamanan dapat disimpulkan bahwa aplikasi e-commerce yang digunakan oleh penggunanya memungkinkan pula disisipi sebuah malware atau virus sejenis yang berpeluang dalam penggambilan data pribadi penggunanya.  The rapid development of android applications, especially applications in the field of e-commerce and online buying and selling transactions that are popular in Indonesia, force users to give permission to use the features and services of the application during installation and post-installation. Lack of user understanding of the risk of access permissions requested by the application before or after installation creates a gap in the user's data security to access features on smartphone devices such as cameras, storage media, contacts, accounts, and other features. Logical Extraction Method is a method used to obtain application data by acquiring all system file data on smartphones using the help of MOBILedit Forensic tools, TWRP (Team Win Recovery Project), and Migrate Applications. Data acquisition from each application will be taken by Android Package File (APK) which is used for the static analysis process using Tools Forensic MobSF (Mobile Security Framework). Based on the results of an analysis conducted on the top three e-commerce applications there are 51 access permits and of the three most popular e-commerce applications in Indonesia with the most dangerous level of security with 49 access permits, 7 normal access permits, and 1 signature access permit. The Lazada application has 21 dangerous access permits that the user does not know while the Tokopedia application has 4 dangerous access permits that the user does not know and the Blibli.com application has 1 dangerous access permit that the user does not know about. Based on the findings of a security hole, it can be concluded that the e-commerce application used by its users also allows the insertion of a malware or virus that has the opportunity to capture the user's personal data.

Author(s):  
Imam Riadi ◽  
Rusydi Umar ◽  
Imam Mahfudl Nasrulloh

The rapid development of computer technology in hardware, is currently developing non-volatile computer storage media Solid State Drive (SSD). SSD technology has a faster data access speed than Hard Disk and is currently starting to replace Hard Disk storage media. Freezing software on computer systems is often carried out by computer technicians, because it can save a computer maintenance costs due to errors, be exposed to computer viruses or malware. This software is used to prevent unwanted changes to the computer system, when the computer is restarted changes that occur in the computer system will not be stored on storage media. When this happens, what should be done by digital forensic investigators. This study discusses experimental forensic investigations on SSD media storage with frozen conditions or in this study said the frozen SSD. Frozen SSD is the condition of the drive that is locked so that there is no change in the computer system. Software used to lock and prevent changes such as Deep Freeze, Shadow Defender, Windows Steady State, and Toolwiz Time Freeze. Forensic research stages using methods NIST. The result shows that from comparative analysis conducted with Deep Freeze the results of the RecoverMyFile gives 76.38% and Autopsy gives 75,27%, while frozen condition with Shadow Defender the results of the RecoverMyFile gives 59.72% and Autopsy gives 74.44%. So the results of this study indicate the drive freezing software has an effect obtained can be an obstacle in the digital forensic process.  


2021 ◽  
pp. 178359172110512
Author(s):  
Lei Huang ◽  
Miltos Ladikas ◽  
Guangxi He ◽  
Julia Hahn ◽  
Jens Schippl

The current rapid development of online car-hailing services creates a serious challenge to the existing paradigm of market governance and antitrust policy. However, the debate on the market structure of the car-hailing platform requires more empirical evidence to uncover its functions. This research adopts an interdisciplinary methodology based on computer science and economics, and including software reverse engineering tools applied to the interoperability of the terminal application and resource allocation model, to demonstrate the topological market structure of personal data resources allocation in China’s car-hailing industry. Within the discussion of the hybrid nature of technology and economy, the analysis results clearly show that China’s car-hailing platform services present a multi-sided market structure when seen from the perspective of personal data resource allocation. Personal data resource (PDR), that is considered an essential market resource, is applied as an asset transferred unhindered between platforms via the application programming interface, and thus, creating a new market allocation mechanism. The connection between the car-hailing platforms and social media platforms is an essential aspect of the market competition in the domain. As applications of online platforms increase in the global context, this research offers a new perspective in personal data resource allocation with implications for the governance of the platform economy.


2020 ◽  
pp. 80-85
Author(s):  
Tetiana Yehorova-Lutsenko

Problem setting. The rapid development of public relations determines the use of information technology in all spheres of life, including in the field of public administration. There is no doubt about the need to introduce elements of e-government into everyday life, as it improves the lives of ordinary citizens, increases trust in public authorities and local governments, reduces the time spent on businesses and individuals needed to receive services. Analysis of recent research. The issue of providing digital social services was paid attention to by, V.P Kohan, M.M. Petrova, N.M. Terletska, D.I. Rusnak, V.L. Polar, V.V. Ripples. The formation of an appropriate mechanism for the digital provision of social administrative services in Ukraine remains unresolved. Target of research. The article is to define the tasks for the formation of the administrative and legal mechanism and the use of digitalization in the provision of social administrative services. Article’s main body. New online services are being introduced on the territory of Ukraine, which enable consumers to receive it remotely. In our opinion, in the future, these services should simplify the procedure for accessing them, given the subjects who are primarily interested in using them, and expand the scope of their provision: from informing the consumer to receiving the result. But these tasks can be accomplished only with the proper financial and material support of local governments, including the poorest financially united territorial communities. In addition, local governments should be required to retain technical specialists and consultants who will provide software and hardware for the provision of administrative social services and eliminate the inability of certain segments of the population to use high-tech digital services. These tasks should be attributed to those that require constant monitoring of their implementation and improvement of their mechanism. Features of the regime of social services are that: 1) their list is not defined by law, so it is more determined by the subjects – recipients of services; 2) socialization of services involves the organization of simplified access of citizens to administrative services; 3) the mechanism for providing accessible social services must ensure the protection of personal data of service recipients. Conclusions and prospects for the development. The unification of types of social administrative services and mechanisms of their provision with similar services provided in the countries of the European Union may be key to Ukraine’s progress towards a single digital space with the European Union.


2018 ◽  
Vol 173 ◽  
pp. 02029
Author(s):  
XU Jiahui ◽  
YU Hongyuan ◽  
WANG Gang ◽  
WANG Zi ◽  
BAI Jingjie ◽  
...  

The rapid development of mobile Internet technology and the wide spread of smart terminals have brought opportunities for the transformation of power grid business model. Compared to the non-real-time information, the real-time and running data of dispatch and control domain is easy to be intercepted and cracked. To solve this problem, this paper presents a new approach to mobile application security framework for the power grid control field. It is to realize secondary encryption by using the method of MD5+AES mixed encryption algorithm and combining the time stamp in real-time data transmission process. At the same time it is to prevent cross-border operations and brute force by using Token authentication and Session technology. China EPRI safety test results show that the application of the framework significantly improves the integrity, safety and reliability of real-time data in power grid control.


Author(s):  
Scott E Mensch ◽  
LeAnn Wilkie

People use smartphones for a variety of purposes. However, little is known about users' mobile security awareness. This study examines mobile security behaviors of college students. The study's findings conclude that college students, while technologically savvy, may not take appropriate measures to protect their personal data from hackers and thieves.


Author(s):  
Dewa Gede Sudika Mangku ◽  
Ni Putu Rai Yuliartini ◽  
I. Nengah Suastika ◽  
I. Gusti Made Arya Suta Wirawan

The emergence and rapid development of information and communication technology has brought about various opportunities and challenges. One of them is the active interaction between individuals and the digital-based information service providers. In modern economic development, related information including personal data or also known as digital dossier—the collection of large amounts of an individual’s information using digital technology—are valuable assets due to their high economic value since they are widely utilized by businesses. In this regard and due to the increasing number of cellphone and internet users, there is a need to study the issues on the importance of protecting one’s personal data. In Indonesia, there is no specific regulation regarding the protection of personal data. Therefore, it is essential to come up with specific and comprehensive legislation related to personal data protection as legal basis for better implementation of personal data protection in Indonesia in the future. The purpose of this research is to find out and analyze the current policies on protection of personal data of internet users in Indonesia. This study uses a normative juridical method with a statutory approach and utilizes literature study. The result shows that the concept of personal data protection implies that individuals have the right to determine whether one will join an online community, share or exchange personal data with another, and the conditions that must be met in order to do so. The study likewise found that the threat of personal data leakage is increasingly occurring because of the development of the e-commerce sector in Indonesia.


Author(s):  
Oleksandra S. Yavorska ◽  
Vitaliy M. Kosovych ◽  
Ihor Y. Boiko ◽  
Leonid L. Tarasenko ◽  
Iryna I. Shpuhanych

Fast improvement of the IT field requires relevant safety of intellectual assets rights. The legal protection of laptop applications, software programs and foreign legal practices is a contentious issue. With the rapid development of the IT sector within the international context, the issues of copyright safety, patenting and non-disclosure of personal data have gained urgency. The research methodology involved the use of methods of analysis and synthesis, logical and system - structural analysis, control methods, structural and functional analysis in combination with the method of case study and the method of content analysis. The article comprehensively analyses the modern perspective of intellectual belongings proper and copyright in IT outsourcing. The scope of unconventional challenges in the sphere of copyright safety inside the area of IT sphere are exemplified using the case of Ukraine. The case addresses opportunities to enhance the regulatory framework for copyright safety of experts engaged in IT outsourcing. It is stressed that the existing legal procedures and methods are slower in responding to changes in the field of IT outsourcing than the world's quickest trends in this sphere.


Author(s):  
Fadele Ayotunde Alaba ◽  
◽  
Abayomi Jegede ◽  
Christopher Ifeanyi Eke ◽  
◽  
...  

The Internet of Things (IoT) expects to improve human lives with the rapid development of resource-constrained devices and with the increased connectivity of physical embedded devices that make use of current Internet infrastructure to communicate. The major challenging in such an interconnected world of resource-constrained devices and sensors are security and privacy features. IoT is demand new approaches to security like a secure lightweight authentication technique, scalable approaches to continuous monitoring and threat mitigation, and new ways of detecting and blocking active threats. This paper presents the proposed security framework for IoT network. A detail understanding of the existing solutions leads to the development of security framework for IoT network. The framework was developed using cost effective design approach. Two components are used in developing the protocol. The components are Capability Design (mainly a ticket, token or key that provides authorization to access a device) and Advanced Encryption Standard (AES)-Galois Counter Mode (GCM) (a-security protocol for constrained IoT devices). AES-GCM is an encryption process that is based on authentication and well suitable IoT.


2019 ◽  
Vol 8 (2) ◽  
pp. 2947-2951

Nowadays rapid development of cloud computing in smart healthcare system has significantly improved the quality of health. However, data security and user privacy are a major concern for smart healthcare systems. These days any kind of data can be used for malicious purposes. Many harmful entities constantly try to gain access to the personal data of internet users. This data includes sensitive information that doctors store of patients and is often stored using some kind of third party cloud providing service that is not very secure. To take care of this issue, in this paper, Symmetric Balanced Incomplete Block Design (SBIBD) is utilized for key Security so that unauthorized client can’t get access to the data easily. It also allows the patients immediate and easy access to the data using unique user ID. This system makes use of double encryption using Blowfish algorithm to ensure maximum security of data and the concept of block level is used where data is stored using multiple blocks.


Sign in / Sign up

Export Citation Format

Share Document