Two-Call Index Based Internet Traffic Sharing Analysis in Case of Cyber Crime Environment of Computer Network

Author(s):  
Dr. Sharad Gangele ◽  
◽  
Prof. (Dr.) Ashish Dongre
Temida ◽  
2009 ◽  
Vol 12 (3) ◽  
pp. 63-74
Author(s):  
Dejan Vuletic

The accelerated growth of the information-communication technology use brought about cyber crime as a new form of crime connected with the misuse of computer network. Human trafficking and human organ trafficking are changing in line with the state-of-art technological achievements i.e. becoming more and more characteristic of cyber space. Passing appropriate regulations at both national and international levels presents an important step in solving the problem of human organ trafficking through Internet.


2021 ◽  
Vol 2 (2) ◽  
pp. 117-123
Author(s):  
Priska Choirina ◽  
Muhammat Maariful Huda ◽  
Urnika Mudhifatul Jannah ◽  
Satria Utama ◽  
Erlillah Rizqi Kusuma Pradani

The positive value of the internet is that the information generated can facilitate everyday human work. One of the negative impacts caused by the internet is cyber crime. As the Indonesian Army who is conducting studies at the Politeknik Angkatan Darat, it is not only required to be professional and proficient in physical warfare strategies. But it also has to be sophisticated and not technologically illiterate in dealing with all threats in cyberspace, including cyber crime. One of the basic sciences for dealing with cyber crime is computer networks by implementing the concept of network topology. Network topology simulation training using packet tracer software in the context of community service activities has the aim of providing technological concepts about the use of packet tracers along with network topology simulations. This training begins with an introduction to network topology which discusses implementation in military life and its strengths and weaknesses. Furthermore, the implementation of this knowledge into a packet tracer and simulating the network topology. From the participants consisting of telkommil, it is hoped that all of them can take part in the training in order to understand how to design a good computer network using packet tracer software.


2021 ◽  
pp. 1111
Author(s):  
Yuwono Prianto ◽  
Nabila Annisa Fuzain ◽  
Afif Farhan

Digital activity during the pandemic is increasing this is because people are asked to stay at home doing all activities online, this makes people vulnerable to becoming victims of cyber crime. Cybercrime itself is a cyber crime by using a computer or computer network as a tool, or as a target, as well as the location of the crime, the absence of space and time limits makes it easier for cyber criminals to carry out their actions in the cyber world. The author's purpose in conducting this analysis is to discuss what are the obstacles in handling cybercrime cases during the Covid-19 pandemic and how to enforce the law for cybercrime perpetrators. This article is the result of normative legal research that focuses on the use of secondary data. Cyber crimes need special attention from law enforcement, both national and international. The perpetrators of cybercrime have not been fully prosecuted due to the weakness of the cyber legislation system in Indonesia and the limited number of experts to handle this case. Cyber law has not been clearly spelled out in the regulations governing the technical implementation. The perpetrators of cyber crime come from various countries, limited human resources and infrastructure are the main obstacles. It requires a strong commitment from the leadership, law enforcement institutions to improve the quality and quantity of human resources as well as to prepare an adequate budget for the procurement of facilities and infrastructure as well as to establish cooperation with higher education to accelerate the handling of existing limitations. Aktivitas digital pada masa pandemi semakin meningkat hal ini disebabkan masyarakat diminta untuk tetap di rumah melakukan semua kegiatan dilakukan secara daring, hal ini membuat masyarakat rawan menjadi korban kejahatan cyber. Cybercrime sendiri adalah kejahatan dunia maya dengan menggunakan komputer atau jaringan komputer sebagai alat, atau sebagai sasaran, serta lokasi terjadinya kejahatan, tidak adanya batasan ruang dan waktu memudahkan penjahat cyber untuk melakukan aksinya di dunia cyber. Tujuan penulis melakukan analisis ini  adalah untuk membahas apa saja yang menjadi kendala dalam menangani kasus cybercrime di saat masa pandemi Covid-19 dan bagaimana penegakan hukum bagi para pelaku cybercrime. Artikel ini meruupakan hasil dari penilitian hukum normatif yang fokus pada penggunaan data sekunder. Kejahatan cyber  crime perlu mendapatkan perhatian khusus dari penegak hukum baik nasional maupun Internasional. Pelaku cybercrime belum seluruhnya dapat di proses hukum karena lemahnya sistem perundangan-undangan siber di Indonesia dan terbatasnya tenaga ahli yang dimilki untuk menangani kasus ini, Undang-Undang cyber belum dijabarkan dengan jelas didalam Peraturan yang mengatur mengenai teknis pelaksanaannya. Pelaku cyber crime berasal berbagai dari negara, terbatasnya SDM dan prsarana menjadi kendala utama. Diperlukan komitmen yang kuat dari pimpinan, Institusi penegak hukum untuk meningkatkan kualitas dan kuantitaf SDM serta penyiapan anggaran yang memadai untuk pengadaan sarana dan prasana serta menjalin kerjasama dengan pendidikan tinggi untuk mempercepat penanganan keterbatasan yang ada.


Author(s):  
Bagus Aji Saputro

Computer network users have to spend a lot of money to use the Internet. The Internet has given a very big change in the dissemination of information, so that many people are using data through the Internet. This problem can be solved by MikroTik as a regulator of Internet data traffic and limiting bandwidth that can interfere with computer network activities in accordance with the regulations that have been applied. As a result of not being limited in bandwidth, it causes an overload on a network which has an impact on disrupting internet traffic on that network. Each agency should implement bandwidth restrictions according to the needs of users using the internet. Result from this research is not being limited in bandwidth, it causes an overload on a network which has an impact on disrupting internet traffic on that network. Each agency should implement bandwidth restrictions according to the needs of users using the internet.


Author(s):  
Budi Rahardjo ◽  
I Putu Agus Eka Pratama

Computer forensics and anti computer forensics are two opposing fields. Computer forensics is done by a computer forensics expert in order to obtain accurate data and evidence of cyber crime cases for investigation, while the anti-computer forensics conducted by the attacker to remove traces at once difficult computer forensics expert in performing its duties. For the attacker, the selection of anti-computer forensics tool that default on the target machine, more effective and faster than installing it first on the victim machine. For this reason the author chose shred as anti computer forensics applications on GNU / Linux machine. If anti forensic work, forensic experts would be difficult to perform computer forensics to data as evidence of cyber crime. This paper describes the anti-forensics performed by the attacker to remote machines GNU / Linux for cyber crime cases in a computer network. Anti forensic performed using shred the syslog file to remove traces of the crime at the same time make it difficult for the forensic process by computer forensics expert. Tests performed on three pieces of computer-based GNU / Linux on System Signals Lab intranet ITB. Each act as the target machine (server), firewall machine, and the machine attacker. Doing the anti computer forensics and computer forensics at the server machine. The test results are recorded and analyzed in order to then be deduced.


Sign in / Sign up

Export Citation Format

Share Document