Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email
Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | Indonesian |
Published: |
Universitas Islam Negeri Sunan Kalijaga Yogyakarta
2017-03-01
|
Series: | JISKA (Jurnal Informatika Sunan Kalijaga) |
Online Access: | http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/1113 |
id |
doaj-e104e026a77840f1b5cd76d464e3325f |
---|---|
record_format |
Article |
spelling |
doaj-e104e026a77840f1b5cd76d464e3325f2021-10-05T13:02:39ZindUniversitas Islam Negeri Sunan Kalijaga YogyakartaJISKA (Jurnal Informatika Sunan Kalijaga)2527-58362528-00742017-03-011310.14421/jiska.2017.13-021006Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan EmailMuhammad Nur Faiz0Rusydi Umar1Anton Yudhana2Ahmad Dahlan UniversityAhmad Dahlan UniversityAhmad Dahlan University Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of life in the latest operation system windows 10. That study focused IN case several email security browsers Sales Operations manager of Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer Edge. In addition, although many digital forensics type software applications not free, goal on research objectives compares browser security information so it will be more minimize abuse email. http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/1113 |
collection |
DOAJ |
language |
Indonesian |
format |
Article |
sources |
DOAJ |
author |
Muhammad Nur Faiz Rusydi Umar Anton Yudhana |
spellingShingle |
Muhammad Nur Faiz Rusydi Umar Anton Yudhana Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email JISKA (Jurnal Informatika Sunan Kalijaga) |
author_facet |
Muhammad Nur Faiz Rusydi Umar Anton Yudhana |
author_sort |
Muhammad Nur Faiz |
title |
Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email |
title_short |
Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email |
title_full |
Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email |
title_fullStr |
Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email |
title_full_unstemmed |
Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email |
title_sort |
implementasi live forensics untuk perbandingan browser pada keamanan email |
publisher |
Universitas Islam Negeri Sunan Kalijaga Yogyakarta |
series |
JISKA (Jurnal Informatika Sunan Kalijaga) |
issn |
2527-5836 2528-0074 |
publishDate |
2017-03-01 |
description |
Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of life in the latest operation system windows 10. That study focused IN case several email security browsers Sales Operations manager of Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer Edge. In addition, although many digital forensics type software applications not free, goal on research objectives compares browser security information so it will be more minimize abuse email.
|
url |
http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/1113 |
work_keys_str_mv |
AT muhammadnurfaiz implementasiliveforensicsuntukperbandinganbrowserpadakeamananemail AT rusydiumar implementasiliveforensicsuntukperbandinganbrowserpadakeamananemail AT antonyudhana implementasiliveforensicsuntukperbandinganbrowserpadakeamananemail |
_version_ |
1716842341950554112 |