ANALISIS TROJAN DAN SPYWARE MENGGUNAKAN METODE HYBRID ANALYSIS

Malicious Software or malware is software created to damage a computer system. The increase in internet users is also in line with the increase in the use of software. However, there are still many users who still use pirated software because it is relatively free and easy to obtain. Pirated softwar...

Full description

Saved in:
Bibliographic Details
Main Author: Annisa Rizky Damanik, (Author)
Format: Book
Published: 2023-01-18.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repoupnvj_23100
042 |a dc 
100 1 0 |a Annisa Rizky Damanik, .  |e author 
245 0 0 |a ANALISIS TROJAN DAN SPYWARE MENGGUNAKAN METODE HYBRID ANALYSIS 
260 |c 2023-01-18. 
500 |a http://repository.upnvj.ac.id/23100/1/ABSTRAK.pdf 
500 |a http://repository.upnvj.ac.id/23100/2/AWAL.pdf 
500 |a http://repository.upnvj.ac.id/23100/3/BAB%201.pdf 
500 |a http://repository.upnvj.ac.id/23100/4/BAB%202.pdf 
500 |a http://repository.upnvj.ac.id/23100/5/BAB%203.pdf 
500 |a http://repository.upnvj.ac.id/23100/6/BAB%204.pdf 
500 |a http://repository.upnvj.ac.id/23100/7/BAB%205.pdf 
500 |a http://repository.upnvj.ac.id/23100/8/DAFTAR%20PUSTAKA.pdf 
500 |a http://repository.upnvj.ac.id/23100/9/RIWAYAT%20HIDUP.pdf 
500 |a http://repository.upnvj.ac.id/23100/10/LAMPIRAN.pdf 
500 |a http://repository.upnvj.ac.id/23100/11/HASIL%20PLAGIARISME.pdf 
500 |a http://repository.upnvj.ac.id/23100/12/ARTIKEL%20KI.pdf 
520 |a Malicious Software or malware is software created to damage a computer system. The increase in internet users is also in line with the increase in the use of software. However, there are still many users who still use pirated software because it is relatively free and easy to obtain. Pirated software is usually embedded with dangerous malware such as Trojans and spyware. Trojans are the most common type of malware found in computer systems with many cases. And spyware is a type of malware that is difficult to see its activity on a computer system, even anti-virus often cannot detect this type of malware. All crimes of spreading this malware are always related to stealing credit card information, internet banking and other cybercrimes. To prove that the software installed and used on a computer is malicious software, digital forensics is required by analyzing the software. Hybrid analysis technique is a combination of static and dynamic analysis which is suitable for analyzing malware activity. The author hopes that using this analysis method can prove traces of malicious Trojan and spyware activity in the software used. 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
690 |a QA75 Electronic computers. Computer science 
690 |a QA76 Computer software 
655 7 |a Thesis  |2 local 
655 7 |a NonPeerReviewed  |2 local 
787 0 |n http://repository.upnvj.ac.id/23100/ 
787 0 |n http://repository.upnvj.ac.id 
856 4 1 |u http://repository.upnvj.ac.id/23100/  |z Link Metadata