Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology
Nowadays developments in information technology are growing rapidly, especially in email. Email became one that almost the whole world had. Email is one of the results of developments in information and communication. Email is widely used to exchange information by sending and receiving data, such...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Universitas Islam Negeri Sunan Kalijaga Yogyakarta
2022-05-01
|
Series: | JISKA (Jurnal Informatika Sunan Kalijaga) |
Subjects: | |
Online Access: | http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/3009 |
_version_ | 1797756816169369600 |
---|---|
author | Imam Riadi Sunardi Fitriyani Tella Nani |
author_facet | Imam Riadi Sunardi Fitriyani Tella Nani |
author_sort | Imam Riadi |
collection | DOAJ |
description |
Nowadays developments in information technology are growing rapidly, especially in email. Email became one that almost the whole world had. Email is one of the results of developments in information and communication. Email is widely used to exchange information by sending and receiving data, such as document files, pictures, letters, and others. So much for the crimes that often occur in emails. Email crimes that often occur among them are email spoofing. Email spoofing is a forgery that occurs in the header of the email. So, the email is sent as if it were a valid email. Email spoofing is often used in spamming activities. Crimes committed by cybercrime must leave evidence such as IP Address, sender's email, and time of sending the email. This research will do forensics on email spoofing. The research uses the Live Forensics method, where the computer is used in a powered-on state. The research also uses the NIST (National Institute of Standards Technology) research flow. The email that will be analyzed is in the email header section using 3 tools, namely tracer email analyzer, email dossier, and mail header analysis. This analysis will compare and check the accuracy of the email headers using these tools. Emails suspected of email spoofing will be proven using tools. Based on the 'form' received' and 'Message-ID' headers. Based on the results, the tool that meets the value after the analysis is tracer email analysis.
|
first_indexed | 2024-03-12T18:07:04Z |
format | Article |
id | doaj.art-1471b5ad32ae4721a2edebc76e0bd0d2 |
institution | Directory Open Access Journal |
issn | 2527-5836 2528-0074 |
language | English |
last_indexed | 2024-03-12T18:07:04Z |
publishDate | 2022-05-01 |
publisher | Universitas Islam Negeri Sunan Kalijaga Yogyakarta |
record_format | Article |
series | JISKA (Jurnal Informatika Sunan Kalijaga) |
spelling | doaj.art-1471b5ad32ae4721a2edebc76e0bd0d22023-08-02T09:27:56ZengUniversitas Islam Negeri Sunan Kalijaga YogyakartaJISKA (Jurnal Informatika Sunan Kalijaga)2527-58362528-00742022-05-0172Analisis Forensik pada Email Menggunakan Metode National Institute of Standards TechnologyImam Riadi0Sunardi1Fitriyani Tella Nani2Universitas Ahmad DahlanUniversitas Ahmad DahlanUniversitas Ahmad Dahlan Nowadays developments in information technology are growing rapidly, especially in email. Email became one that almost the whole world had. Email is one of the results of developments in information and communication. Email is widely used to exchange information by sending and receiving data, such as document files, pictures, letters, and others. So much for the crimes that often occur in emails. Email crimes that often occur among them are email spoofing. Email spoofing is a forgery that occurs in the header of the email. So, the email is sent as if it were a valid email. Email spoofing is often used in spamming activities. Crimes committed by cybercrime must leave evidence such as IP Address, sender's email, and time of sending the email. This research will do forensics on email spoofing. The research uses the Live Forensics method, where the computer is used in a powered-on state. The research also uses the NIST (National Institute of Standards Technology) research flow. The email that will be analyzed is in the email header section using 3 tools, namely tracer email analyzer, email dossier, and mail header analysis. This analysis will compare and check the accuracy of the email headers using these tools. Emails suspected of email spoofing will be proven using tools. Based on the 'form' received' and 'Message-ID' headers. Based on the results, the tool that meets the value after the analysis is tracer email analysis. http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/3009Email SpoofingHeader EmailMetode NISTTiga ToolsLive Forensics |
spellingShingle | Imam Riadi Sunardi Fitriyani Tella Nani Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology JISKA (Jurnal Informatika Sunan Kalijaga) Email Spoofing Header Email Metode NIST Tiga Tools Live Forensics |
title | Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology |
title_full | Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology |
title_fullStr | Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology |
title_full_unstemmed | Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology |
title_short | Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology |
title_sort | analisis forensik pada email menggunakan metode national institute of standards technology |
topic | Email Spoofing Header Email Metode NIST Tiga Tools Live Forensics |
url | http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/3009 |
work_keys_str_mv | AT imamriadi analisisforensikpadaemailmenggunakanmetodenationalinstituteofstandardstechnology AT sunardi analisisforensikpadaemailmenggunakanmetodenationalinstituteofstandardstechnology AT fitriyanitellanani analisisforensikpadaemailmenggunakanmetodenationalinstituteofstandardstechnology |