D4 Rekayasa Keamanan Siber
Permanent URI for this collectionhttps://repository.polibatam.ac.id/handle/PL029/1769
Browse
Item Analisis Kesadaran Keamanan Dengan Model Kruger & Kearney Dalam Penggunaan E-Wallet Pada Generasi Z (Gen-Z) Di Indonesia(Politeknik Negeri Batam, 2024-07-08) Nur, Muhammad Abdul Razak; Arif, HamdaniIn recent years, e-wallets, sometimes known as digital wallets, have gained popularity in Indonesia. Under all the comforts offered, patrons are exposed to a multitude of security hazards. Similar to how the human factor is crucial to cybersecurity and information, security awareness is necessary. This study used primary data to analyze variations in security awareness according to the demographic features of the 207 E-Wallet users in Indonesia who took part in an online survey. The study aimed to measure the consumers' degree of security awareness. Indonesian E-Wallet users have a generally high level of security awareness, according to the measurement results based on the Kruger and Kearney model. However, there is still room for improvement in terms of knowledge, attitudes, and behaviors regarding software, the internet, and PINs/passwords, all of which are lower than in the hardware focus area. Additionally, this survey found that the two main factors influencing Indonesian E-Wallet users' level of security awareness are age and gender (generation Z). The study's findings can be utilized to develop a variety of targeted policies or interventions aimed at raising security awareness among all Indonesian e-wallet users.Item Analisis Risiko Keamanan Informasi Berdasarkan ISO 27001 dengan Menggunakan Metodologi FMEA pada Perusahaan XYZ(2024) Abidin, Ismail Wafi Khoerul Abidin; Arif, Hamdani; Arif, HamdaniRisiko merupakan potensi yang dapat mengakibatkan kerugian atau gangguan terhadap aset atau informasi dalam suatu sistem. Penelitian ini difokuskan pada analisis risiko keamanan informasi pada perusahaan XYZ menggunakan metode FMEA dengan mengacu standar ISO 27001:2022. Adanya penelitian ini, diharapkan mampu memberikan pemahaman yang komprehensif mengenai risiko keamanan informasi dan memberikan rekomendasi untuk meningkatkan keamanan informasi perusahaan XYZ. Melalui pendekatan kualitatif dan kuantitatif, penelitian ini akan mengidentifikasi potensi risiko keamanan informasi dan mengembangkan rencana tindakan untuk mencegah atau mengurangi risiko tersebut.Item Memory DumpAnalysis in Capture The Flag: Using Volatility 3 to Extract Hidden Files(Politeknik Negeri Batam, 2024-06-12) Yusriyah, Isnaeni Hari; Arapenta, Joy Gilbert; Tambunan, Jean Tirstan; Arif, HamdaniThe field of study that examines how to uncover, collect, analyze, and present digital evidence from electronic devices is called computer forensics. This research focuses on the analysis of memory dumps in the Capture The Flag (CTF) cybersecurity competition with the aim of uncovering hidden files that may be concealed in memory by an attacker. Conducting analysis on memory dumps is an important technique in digital forensics and security incident investigation to uncover suspicious activities and hidden evidence that is not available on storage media. The Volatility Framework is utilized as the main framework for analyzing memory dumps. The analysis process adopts the general stages of the computer forensics investigation model, including acquisition, analysis, and extraction. Various Volatility plugins and modules, such as imageinfo, pslist, cmdline, filescan, grep, and dumpfiles, are optimized to identify suspicious processes, locations of hidden files, and passwords required to open encrypted files. This research shows that the Volatility Framework is an effective memory forensics tool for extracting important information from memory dumps, including hidden files, which is highly useful in the context of cybersecurity competitions such as Capture The Flag (CTF).