Analisis Forensik Database Menggunakan Metode Forensik Statis

Imam Riadi, Rusdy Umar, Dora Bernadisman
{"title":"Analisis Forensik Database Menggunakan Metode Forensik Statis","authors":"Imam Riadi, Rusdy Umar, Dora Bernadisman","doi":"10.21456/VOL9ISS1PP9-17","DOIUrl":null,"url":null,"abstract":"SIMDA (Regional Management Information System) is a system created by the BPKP (Financial and Development Supervisory Agency) to assist local governments in implementing regional financial management so that it complies with applicable, efficient, effective, transparent, accountable and auditable regulations. Management data is stored in the SIMDA database on a server connected to a computer network, it is possible that the database is always infiltrated and indicated by data manipulation by hackers. The purpose of this study is to monitor database activity and detect data manipulation done by hackers, then forensic processes are carried out using static forensic methods with stages, namely data collection, data checking, data analysis, and reporting so as to provide evidence and instructions to do analysis on the SIMDA Planning database. The results obtained using static forensic methods show that there has been manipulation or change in the budget ceiling of the activity that exceeds the program budget ceiling (mark-up in budget planning) carried out by hackers who enter through the SIMDA database. Output from forensic processes can prove manipulation data that is carried out by hackers can be detected using SQL Profiler and SQL Log Analyzer tools so that output can be used as digital evidence to assist law enforcement in revealing cybercrime crime cases and can be accounted for in court proceedings.","PeriodicalId":123899,"journal":{"name":"Jurnal Sistem Informasi Bisnis","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jurnal Sistem Informasi Bisnis","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21456/VOL9ISS1PP9-17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

SIMDA (Regional Management Information System) is a system created by the BPKP (Financial and Development Supervisory Agency) to assist local governments in implementing regional financial management so that it complies with applicable, efficient, effective, transparent, accountable and auditable regulations. Management data is stored in the SIMDA database on a server connected to a computer network, it is possible that the database is always infiltrated and indicated by data manipulation by hackers. The purpose of this study is to monitor database activity and detect data manipulation done by hackers, then forensic processes are carried out using static forensic methods with stages, namely data collection, data checking, data analysis, and reporting so as to provide evidence and instructions to do analysis on the SIMDA Planning database. The results obtained using static forensic methods show that there has been manipulation or change in the budget ceiling of the activity that exceeds the program budget ceiling (mark-up in budget planning) carried out by hackers who enter through the SIMDA database. Output from forensic processes can prove manipulation data that is carried out by hackers can be detected using SQL Profiler and SQL Log Analyzer tools so that output can be used as digital evidence to assist law enforcement in revealing cybercrime crime cases and can be accounted for in court proceedings.
用静态法医方法对数据库进行法医分析
SIMDA(区域管理信息系统)是由BPKP(金融和发展监督局)创建的一个系统,旨在协助地方政府实施区域财务管理,使其符合适用的、高效的、有效的、透明的、负责任的和可审计的法规。管理数据存储在连接计算机网络的服务器上的SIMDA数据库中,数据库随时有可能被黑客渗透和操纵数据。本研究的目的是监测数据库活动,发现黑客的数据操纵行为,然后采用静态取证方法,分数据收集、数据检查、数据分析和报告四个阶段进行取证过程,为SIMDA Planning数据库的分析提供证据和指导。使用静态取证方法获得的结果表明,通过SIMDA数据库进入的黑客对活动的预算上限进行了操纵或更改,超出了程序预算上限(预算计划中的加价)。取证过程的输出可以证明黑客的操纵数据可以使用SQL Profiler和SQL Log Analyzer工具检测到,因此输出可以用作数字证据,以协助执法部门揭露网络犯罪案件,并可以在法庭诉讼中进行说明。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信