Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email

Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead...

Full description

Bibliographic Details
Main Authors: Muhammad Nur Faiz, Rusydi Umar, Anton Yudhana
Format: Article
Language:Indonesian
Published: Universitas Islam Negeri Sunan Kalijaga Yogyakarta 2017-03-01
Series:JISKA (Jurnal Informatika Sunan Kalijaga)
Online Access:http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/1113
id doaj-e104e026a77840f1b5cd76d464e3325f
record_format Article
spelling doaj-e104e026a77840f1b5cd76d464e3325f2021-10-05T13:02:39ZindUniversitas Islam Negeri Sunan Kalijaga YogyakartaJISKA (Jurnal Informatika Sunan Kalijaga)2527-58362528-00742017-03-011310.14421/jiska.2017.13-021006Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan EmailMuhammad Nur Faiz0Rusydi Umar1Anton Yudhana2Ahmad Dahlan UniversityAhmad Dahlan UniversityAhmad Dahlan University Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of life in the latest operation system windows 10. That study focused IN case several email security browsers Sales Operations manager of Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer Edge. In addition, although many digital forensics type software applications not free, goal on research objectives compares browser security information so it will be more minimize abuse email. http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/1113
collection DOAJ
language Indonesian
format Article
sources DOAJ
author Muhammad Nur Faiz
Rusydi Umar
Anton Yudhana
spellingShingle Muhammad Nur Faiz
Rusydi Umar
Anton Yudhana
Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email
JISKA (Jurnal Informatika Sunan Kalijaga)
author_facet Muhammad Nur Faiz
Rusydi Umar
Anton Yudhana
author_sort Muhammad Nur Faiz
title Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email
title_short Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email
title_full Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email
title_fullStr Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email
title_full_unstemmed Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email
title_sort implementasi live forensics untuk perbandingan browser pada keamanan email
publisher Universitas Islam Negeri Sunan Kalijaga Yogyakarta
series JISKA (Jurnal Informatika Sunan Kalijaga)
issn 2527-5836
2528-0074
publishDate 2017-03-01
description Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of life in the latest operation system windows 10. That study focused IN case several email security browsers Sales Operations manager of Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer Edge. In addition, although many digital forensics type software applications not free, goal on research objectives compares browser security information so it will be more minimize abuse email.
url http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/1113
work_keys_str_mv AT muhammadnurfaiz implementasiliveforensicsuntukperbandinganbrowserpadakeamananemail
AT rusydiumar implementasiliveforensicsuntukperbandinganbrowserpadakeamananemail
AT antonyudhana implementasiliveforensicsuntukperbandinganbrowserpadakeamananemail
_version_ 1716842341950554112