Investigasi Forensik Email dengan Berbagai Pendekatan dan Tools
DOI:
https://doi.org/10.61255/pisces.v2i2.494Keywords:
email forensics, digital crime, approaches and toolsAbstract
Email forensic investigation is one of the important areas in digital forensics that aims to uncover digital evidence through email analysis. This study discusses various approaches and tools used in email forensic investigations, with a focus on identifying and tracking suspicious activity, metadata analysis, and conversation reconstruction. The methods applied include header analysis, email authentication checks, and the use of anomaly detection algorithms. The tools used in the study included open-source and commercial software designed specifically for digital forensics, such as EnCase, FTK, and Mail Xaminer. The case studies presented demonstrate the effectiveness of these various approaches and tools in detecting cybercrimes such as phishing, fraud, and the spread of malware via email . The results of this study provide practical guidance for forensic investigators in choosing the right approach and tools according to the characteristics of the case being handled, and emphasize the importance of an in-depth understanding of the structure and mechanism of email s to obtain accurate and accountable results in court.
Abstract views: 333
,
PDF downloads: 302
Downloads
References
Alim, M., Nuruzzaman, M., & Rahman, M. A. (2021). "Investigating Email Forensics: Methods and Tools." Journal of Digital Forensics, Security and Law, 16(2), 45-56.
Arikunto, S. (2016). Prosedur Penelitian: Suatu Pendekatan Praktik. Jakarta: Rineka Cipta.
Chen, W., Liu, Y., & Zhang, H. (2020). "Improving Email Metadata Accuracy Using Machine Learning Techniques." International Journal of Digital Evidence, 25(3), 112-123.
Hussain, A., Ahmed, S., & Khan, M. (2021). "Developing a Forensic Approach to Detect Fake Emails Using Hashing and Digital Verification." Forensic Science International, 31(1), 67-78.
Karya, D., Hartono, T., & Nugroho, A. (2018). "Recovering Deleted Emails on Windows Systems: A Forensic Approach." Indonesian Journal of Cyber Security, 10(1), 23-34.
Shrivastava, R., Gupta, S., & Patel, A. (2019). "Detecting Suspicious Email Activities Using Machine Learning." Journal of Cyber Crime and Forensics, 22(4), 89-97.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Zefanya Deianera Anabelle, Mustari Lamada, Satria Gunawan Zain

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.








Email: fajarb@diginus.id