9,185 research outputs found

    Pemanfaatan Raspberry Pi Untuk Hacking Dan Forensic

    Full text link
    Cybercrime because of the people who are not responsible, with the aim of damaging, modifying, and eliminating one's data, one of them with hacking techniques to be able to infiltrate into the data storage makes it easy to commit a crime. Treatment can be performed on cybercrime using forensic science as a problem solver. Cybercrime has digital evidence as traces of a criminal case, with digital evidence forensic science analysis to find out what activities performed on a criminal case. This study analyzed digital evidence on the network by utilizing Raspberry pi as a medium for hacking the network and to obtain digital evidence on the network . The method used to perform analysis of digital evidence is NIST (National Institute of Standards and Technology). Keywords – Cybercrime, Digital evidence, Forensic Science, Hacking, NIST (National Institute of Standards and Technology), Raspberry P

    Analisis Digital Forensik Rekaman Kamera CCTV Menggunakan Metode NIST (National Institute of Standards Technology)

    Get PDF
    Conventional crimes recorded on CCTV (Closed Circuit Television) cameras are increasing, every criminal who is proven to have committed a certain crime will be punished in accordance with statutory regulations. The problem is how a case recorded on a CCTV camera can be used as digital evidence. Digital evidence is closely related to ensuring data security, privacy and integrity while following the stages of the digital forensic identification process. The identification stage using the NIST (National Institute of Standard Technolog) method is used for investigations in finding information related to metadata on CCTV camera footage so that it can provide structured information, describe and process information obtained from digital forensic investigation sources that can be implemented into the Chain of Custody document which aims to be used as legal digital evidence in courtKejahatan konvensional yang terekam kamera CCTV (Closed Circuit Televison) semakin meningkat, setiap pelaku kejahatan yang terbukti melakukan tindak pidana tertentu akan dihukum sesuai dengan peraturan perundang-undangan. Permasalahannya, adalah bagaimana sebuah kasus yang terekam pada kamera CCTV dapat dijadikan sebagai alat bukti digital. Bukti digital berkaitan erat dalam memastikan keamanan, privasi dan integritas data saat mengikuti tahapan proses identifikasi digital forensik. Tahap identifikasi menggunakan metode NIST (National Institute of Standarts Technolog) digunakan untuk investigasi dalam mencari informasi terkait metadata pada rekaman kamera CCTV agar dapat memberikan informasi terstruktur, menggambarkan serta mengolah sebuah informasi yang didapat dari sumber investigasi digital forensik dapat di implementasikan kedalam dokumen Chain of Custody yang bertujuan untuk dapat digunakan sebagai alat bukti digital yang sah dalam pengadila

    Microcontroller-based random number generator implementation by using discrete chaotic maps

    Get PDF
    In recent decades, chaos theory has been used in different engineering applications of different disciplines. Discrete chaotic maps can be used in encryption applications for digital applications. In this study, firstly, Lozi, Tinkerbell and Barnsley Fern discrete chaotic maps are implemented based on microcontroller. Then, microcontroller based random number generator is implemented by using the three different two-dimensional discrete chaotic maps. The designed random number generator outputs are applied to NIST (National Institute of Standards and Technology) 800-22 and FIPS (Federal Information Processing Standard) tests for randomness validity. The random numbers are successful in all tests

    How good are MatLab, Octave and Scilab for Computational Modelling?

    Full text link
    In this article we test the accuracy of three platforms used in computational modelling: MatLab, Octave and Scilab, running on i386 architecture and three operating systems (Windows, Ubuntu and Mac OS). We submitted them to numerical tests using standard data sets and using the functions provided by each platform. A Monte Carlo study was conducted in some of the datasets in order to verify the stability of the results with respect to small departures from the original input. We propose a set of operations which include the computation of matrix determinants and eigenvalues, whose results are known. We also used data provided by NIST (National Institute of Standards and Technology), a protocol which includes the computation of basic univariate statistics (mean, standard deviation and first-lag correlation), linear regression and extremes of probability distributions. The assessment was made comparing the results computed by the platforms with certified values, that is, known results, computing the number of correct significant digits.Comment: Accepted for publication in the Computational and Applied Mathematics journa

    Evolución de un diseño funcional en un esquema FBS a través de las terminologías del NIST y B-Cube

    Get PDF
    Ponencia presentada en el XIII Congreso Internacional de Ingeniería de Proyectos celebrado en Badajoz , 8-10 de julio de 2009The FBS (Function, Behaviour, Structure) framework is broadly used by designers as methodology for design analysis process, since it allows to represent a design evolution from a protocols study. This framework allows carrying out computational modelling, this is, computer applications able to search and combine solution design procedures for a problem represented by functions. The possibilities of these systems have been increased with the use of function classifications, this is, the use of taxonomies and ontologies. The present work shows a design evolution from some given requirements, using taxonomies provided by the functional basis of NIST (National Institute of Standards and Technology) and B-Cube model. With this example it is expected to empirically demonstrate how this model will work into a KBS (Knowledge Based System), and how it can provide alternative valid solutions for the initial problem, supported by the necessary databases.El marco FBS (Function, Behaviour, Structure) es ampliamente utilizado por los diseñadores como metodología para el proceso de análisis de diseños, puesto que permite representar la evolución de un diseño a partir de un estudio de protocolos. Este marco permite llevar a cabo el modelado computacional, es decir, aplicaciones informáticas capaces de encontrar y combinar procedimientos de diseños de soluciones para un problema representado por funciones. Las posibilidades de dichos sistemas se han visto incrementadas gracias a las clasificaciones de las funciones, es decir, al uso de taxonomías y ontologías. El presente trabajo presenta la evolución de un diseño a partir de unos requerimientos dados, a través de las taxonomías propuestas por las functional basis del NIST (National Institute of Standards and Technology) y por el modelo B-Cube. Con este ejemplo se pretende demostrar empíricamente cómo funcionaría dicho modelo en un KBS (sistema basado en el conocimiento), y cómo, apoyado por las bases de datos necesarias, es capaz de proporcionar soluciones alternativas viables para el enunciado dado

    Electromagnetic Wave Scattering by Small Impedance Particles of an Arbitrary Shape

    Get PDF
    Scattering of electromagnetic (EM) waves by one and many small (ka1ka\ll 1) impedance particles DmD_m of an arbitrary shape, embedded in a homogeneous medium, is studied. Analytic formula for the field, scattered by one particle, is derived. The scattered field is of the order O(a2κ)O(a^{2-\kappa}), where κ[0,1)\kappa \in [0,1) is a number. This field is much larger than in the Rayleigh-type scattering. An equation is derived for the effective EM field scattered by many small impedance particles distributed in a bounded domain. Novel physical effects in this domain are described and discussed

    ANALISIS MANAJEMEN RISIKO KEAMANAN JARINGAN MENGGUNAKAN FRAMEWORK NIST

    Get PDF
    Keamanan suatu jaringan komputer sangat penting bagi suatu jaringan komputer, karena jika terjadi sesuatu maka dapat dimanfaatkan serangan atau penyusupan ke dalam jaringan komputer tersebut. Oleh karena itu, perlu adanya jaminan keamanan jaringan, suatu jaringan (sistem) agar tercipta layanan yang memberikan kenyamanan dan kepercayaan kepada pengguna layanan tersebut, terutama pada saat LAN terhubung ke Internet akan menjadi semakin penting.. Pentingnya penelitian ini adalah untuk mengurangi ancaman yang berdampak negatif pada sistem keamanan informasi, sehingga mengurangi dampak kegagalan sistem informasi dan meminimalkan risiko yang mungkin timbul. Selain itu, analisis sistem keamanan jaringan dilakukan dengan menggunakan Framework NIST (National Institute of Standards Technology), kerangka kerja yang dirancang untuk perhitungan kualitatif berdasarkan analisis sistem keamanan. Analsis risiko keamanan jaringan salah satu perusahaan perbankan berhasil dilakukan dengan menggunakan framework NIST SP800-30 dan ditemukan bahwa sistem keamanan jaringan yang telah berjalan selama ini terdapat seperti backdoor yang memiliki tingkat risiko rendah, packet snifing, spoofing dan rookit sedang, dan Ddos memiliki tingkat risiko yang tinggi

    An overview on the evaluated video retrieval tasks at TRECVID 2022

    Full text link
    The TREC Video Retrieval Evaluation (TRECVID) is a TREC-style video analysis and retrieval evaluation with the goal of promoting progress in research and development of content-based exploitation and retrieval of information from digital video via open, tasks-based evaluation supported by metrology. Over the last twenty-one years this effort has yielded a better understanding of how systems can effectively accomplish such processing and how one can reliably benchmark their performance. TRECVID has been funded by NIST (National Institute of Standards and Technology) and other US government agencies. In addition, many organizations and individuals worldwide contribute significant time and effort. TRECVID 2022 planned for the following six tasks: Ad-hoc video search, Video to text captioning, Disaster scene description and indexing, Activity in extended videos, deep video understanding, and movie summarization. In total, 35 teams from various research organizations worldwide signed up to join the evaluation campaign this year. This paper introduces the tasks, datasets used, evaluation frameworks and metrics, as well as a high-level results overview.Comment: arXiv admin note: substantial text overlap with arXiv:2104.13473, arXiv:2009.0998
    corecore