Comparative Analysis of NIJ and NIST Methods for MicroSD Investigations: A Technopreneur Approach

Nizirwan Anwar (1) , Agung Mulyo Widodo (1) , Binastya Anggara Sekti (1) , Muhamad Bahrul Ulum (1) , Mosiur Rahaman (2) , Hani Dewi Ariessanti (1)
(1) Esa Unggul University, Indonesia,
(2) Asia University, Taiwan, Province of China

Abstract

This research aims to compare the performance of two forensic investigation methods, the National Institute of Justice (NIJ) and the National Institute of Standards and Technology (NIST), specifically for evidence analysis of MicroSD cards. MicroSD cards are frequently used as external storage in various digital devices, making them critical in digital forensic investigations. The study evaluates the effectiveness of these methods using tools such as Access Data FTK Imager and autopsy. The NIJ method enthis comparative passes detailed stages of preparation, collection, examination, analysis, and reporting, while the NIST method includes stages of collection, examination, analysis, and reporting. Results indicate that the NIJ method provides more comprehensive and detailed results, while the NIST method offers a faster investigation process. Additionally, tables and graphs illustrating performance metrics are included to substantiate the findings. This comparative analysis provides valuable insights for technopreneurs in optimizing digital forensic methods for better data integrity and efficiency, ultimately enhancing decision-making processes in technological entrepreneurship. Furthermore, this study aligns with the United Nations' Sustainable Development Goals (SDGs), particularly Goal 9: Industry, Innovation, and Infrastructure, by promoting innovative forensic methods that support the development of resilient infrastructure and foster innovation in the digital age. This study highlights the importance of effective forensic methods in supporting technopreneurial ventures.

Full text article

Generated from XML file

References

S. Sunardi, I. Riadi, R. Umar, and M. F. Gustafi, “Audio forensics on smartphone with digital forensics research workshop (dfrws) method,” CommIT (Communication and Information Technology) Journal, vol. 15, no. 1, pp. 41–47, 2021.

A. A. Khan, M. Uddin, A. A. Shaikh, A. A. Laghari, and A. E. Rajput, “Mf-ledger: blockchain hyperledger sawtooth-enabled novel and secure multimedia chain of custody forensic investigation architecture,” IEEE Access, vol. 9, pp. 103 637–103 650, 2021

D. S. S. Wuisan, R. A. Sunardjo, Q. Aini, N. A. Yusuf, and U. Rahardja, “Integrating artificial intelligence in human resource management: A smartpls approach for entrepreneurial success,” Aptisi Transactions on Technopreneurship (ATT), vol. 5, no. 3, pp. 334–345, 2023.

M. Naz, F. A. Al-zahrani, R. Khalid, N. Javaid, A. M. Qamar, M. K. Afzal, and M. Shafiq, “A secure data sharing platform using blockchain and interplanetary file system,” Sustainability, vol. 11, no. 24, p. 7054, 2019.

B. Rawat, A. S. Bist, B. S. Riza, A. Oktariyani, and U. Rahardja, “Analysis of examination process during covid and post covid in indian context,” in 2021 9th International Conference on Cyber and IT Service Management (CITSM). IEEE, 2021, pp. 1–5.

F. Bahtiar, N. Widiyasono, and A. P. Aldya, “Forensic volatile memory for malware detection using machine learning algorithm,” Jurnal Rekayasa Sistem & Industri (JRSI), vol. 6, no. 01, pp. 52–57, 2019.

A. Ruangkanjanases, A. Khan, O. Sivarak, U. Rahardja, and S.-C. Chen, “Modeling the consumers’ flow experience in e-commerce: The integration of ecm and tam with the antecedents of flow experience,” SAGE Open, vol. 14, no. 2, p. 21582440241258595, 2024.

M. Dalal and M. Juneja, “Steganography and steganalysis (in digital forensics): a cybersecurity guide,” Multimedia Tools and Applications, vol. 80, no. 4, pp. 5723–5771, 2021.

P. A. Sunarya, U. Rahardja, S. C. Chen, Y.-M. Lic, and M. Hardini, “Deciphering digital social dynamics: A comparative study of logistic regression and random forest in predicting e-commerce customer behavior,” Journal of Applied Data Sciences, vol. 5, no. 1, pp. 100–113, 2024.

M. Tanque and P. Bradford, “Virtual raspberry pi-s with blockchain and cybersecurity applications,” in Advances in Computers. Elsevier, 2023, vol. 131, pp. 201–232.

C. Lukita, L. D. Bakti, U. Rusilowati, A. Sutarman, and U. Rahardja, “Predictive and analytics using data mining and machine learning for customer churn prediction,” Journal of Applied Data Sciences, vol. 4, no. 4, pp. 454–465, 2023.

M. S. Mazhar, Y. Saleem, A. Almogren, J. Arshad, M. H. Jaffery, A. U. Rehman, M. Shafiq, and H. Hamam, “Forensic analysis on internet of things (iot) device using machine-to-machine (m2m) frame- work,” Electronics, vol. 11, no. 7, p. 1126, 2022.

M. G. Christopher and K. Raychaudhuri, “A digital forensic approach for examination and analysis of frozen hard disk of virtual machine.” International Journal of Cyber-Security and Digital Forensics, vol. 8, no. 4, pp. 262–273, 2019.

I. Riadi, I. A. Rafiq et al., “Forensic mobile analysis on social media using national institute standard of technology method.” International Journal of Safety & Security Engineering, vol. 12, no. 6, 2022.

U. Rahardja, N. Lutfiani, A. S. Rafika, and E. P. Harahap, “Determinants of lecturer performance to enhance accreditation in higher education,” in 2020 8th International Conference on Cyber and IT Service Management (CITSM). IEEE, 2020, pp. 1–7.

S. Kosasi, I. D. A. E. Yuliani, U. Rahardja et al., “Boosting e-service quality of online product businesses through it leadership,” in 2022 International Conference on Science and Technology (ICOSTECH). IEEE, 2022, pp. 1–10.

N. Y. Ahn and D. H. Lee, “Forensics and anti-forensics of a nand flash memory: From a copy-back program perspective,” IEEE Access, vol. 9, pp. 14 130–14 137, 2021.

R. Shree, A. K. Shukla, R. P. Pandey, V. Shukla, and D. Bajpai, “Memory forensic: Acquisition and analysis mechanism for operating systems,” Materials Today: Proceedings, vol. 51, pp. 254–260, 2022.

L. Rosselina, Y. Suryanto, T. Hermawan, and F. Alief, “Framework design for the retrieval of instant messaging in social media as electronic evidence,” in 2020 7th International Conference on Electrical Engineering, Computer Sciences and Informatics (EECSI). IEEE, 2020, pp. 209–215.

I. G. N. G. Wicaksanaa and I. K. G. Suhartanaa, “Forensic analysis of telegram desktop-based applications using the national institute of justice (nij) method,” Jurnal Elektronik Ilmu Komputer Udayana p-ISSN, vol. 2301, p. 5373, 2020.

U. Rahardja, C. T. Sigalingging, P. O. H. Putra, A. Nizar Hidayanto, and K. Phusavat, “The impact of mobile payment application design and performance attributes on consumer emotions and continuance intention,” Sage Open, vol. 13, no. 1, p. 21582440231151919, 2023.

A. N. Ichsan and I. Riadi, “Mobile forensic on android-based imo messenger services using digital forensic research workshop (dfrws) method,” Int. J. Comput. Appl, vol. 174, no. 18, pp. 34–40, 2021.

R. Tarmizi, N. Septiani, P. A. Sunarya, and Y. P. A. Sanjaya, “Harnessing digital platforms for entrepreneurial success: A study of technopreneurship trends and practices,” Aptisi Transactions on Technopreneurship (ATT), vol. 5, no. 3, pp. 278–290, 2023.

K. D. O. Mahendraa and I. K. A. Mogia, “Digital forensic analysis of michat applications on android as digital proof in handling online prostitution cases,” Jurnal Elektronik Ilmu Komputer Udayana p-ISSN, vol. 2301, p. 5373, 2021.

U. Rusilowati, F. P. Oganda, R. Rahardja, T. Nurtino, and E. Aimee, “Innovation in smart marketing: The role of technopreneurs in driving educational improvement,” Aptisi Transactions on Technopreneurship (ATT), vol. 5, no. 3, pp. 305–318, 2023.

D. Uroz and R. J. Rodr ́ıguez, “On challenges in verifying trusted executable files in memory forensics,” Forensic Science International: Digital Investigation, vol. 32, p. 300917, 2020.

B. K. Bintoro, N. Lutfiani, D. Julianingsih et al., “Analysis of the effect of service quality on company reputation on purchase decisions for professional recruitment services,” APTISI Transactions on Management, vol. 7, no. 1, pp. 35–41, 2023.

A. S. Pallivalappil and S. Jagadeesha, “Procedures for digital forensics and incident response on including data integrity constraints on solid-state drives (ssd)-a literature review,” International Journal of Case Studies in Business, IT and Education (IJCSBE), vol. 6, no. 1, pp. 328–350, 2022.

V. Meilinda, S. A. Anjani, and M. Ridwan, “A platform based business revolution activates indonesia’s digital economy,” Startupreneur Business Digital (SABDA Journal), vol. 2, no. 2, pp. 155–174, 2023.

M. Stoyanova, Y. Nikoloudakis, S. Panagiotakis, E. Pallis, and E. K. Markakis, “A survey on the internet of things (iot) forensics: challenges, approaches, and open issues,” IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 1191–1221, 2020.

N. Ramadhona, I. Erliyani et al., “Exploring the components of management information systems: Software, database, and brainware-a literature review,” International Transactions on Education Technology, vol. 2, no. 1, pp. 65–70, 2023.

A. R. Javed, W. Ahmed, M. Alazab, Z. Jalil, K. Kifayat, and T. R. Gadekallu, “A comprehensive survey on computer forensics: State-of the-art, tools, techniques, challenges, and future directions,” IEEE Access, vol. 10, pp. 11 065–11 089, 2022.

H. A. Winata and F. Simon, “Influence of profitability, audit quality, and corporate governance on earnings management,” APTISI Transactions on Management, vol. 8, no. 2, pp. 93–104, 2024.

F. Adam and G. Ray, “The role of information and communication technology (ict) in enhancing the innovative learning process,” IAIC Transactions on Sustainable Digital Innovation (ITSDI), vol. 2, no. 1, pp. 54–60, 2020.

A. W. Malik, D. S. Bhatti, T.-J. Park, H. U. Ishtiaq, J.-C. Ryou, and K.-I. Kim, “Cloud digital forensics: Beyond tools, techniques, and challenges,” Sensors, vol. 24, no. 2, p. 433, 2024.

B. Rawat and D. Maulidditya, “Entrepreneurship in information technology as a method for improving student creativity in the digital economy,” IAIC Transactions on Sustainable Digital Innovation (ITSDI), vol. 4, no. 1, pp. 32–37, 2022.

G. Kim, S. Kim, M. Park, Y. Park, I. Lee, and J. Kim, “Forensic analysis of instant messaging apps: Decrypting wickr and private text messaging data,” Forensic Science International: Digital Investigation, vol. 37, p. 301138, 2021.

M. S. Chang and C. P. Yen, “Linkedin social media forensics on windows 10.” Int. J. Netw. Secur., vol. 22, no. 2, pp. 321–330, 2020.

A. A. Mughal, “A comprehensive study of practical techniques and methodologies in incident-based approaches for cyber forensics,” Tensorgate Journal of Sustainable Technology and Infrastructure for Developing Countries, vol. 2, no. 1, pp. 1–18, 2019.

G. P. Widodo and M. Syukri, “Elements of commerce shows enterprise development innovation efficient auditing and the way of the future,” ADI Journal on Recent Innovation, vol. 3, no. 1, pp. 97–104, 2021.

A. Menahil, W. Iqbal, M. Iftikhar, W. B. Shahid, K. Mansoor, and S. Rubab, “Forensic analysis of social networking applications on an android smartphone,” Wireless Communications and Mobile Computing, vol. 2021, no. 1, p. 5567592, 2021.

N. N. Rafiana, “Technopreneurship strategy to grow entrepreneurship career options for students in higher education,” ADI Journal on Recent Innovation, vol. 5, no. 2, pp. 110–126, 2024.

Authors

Nizirwan Anwar
[email protected] (Primary Contact)
Agung Mulyo Widodo
Binastya Anggara Sekti
Muhamad Bahrul Ulum
Mosiur Rahaman
Hani Dewi Ariessanti
Anwar, N., Widodo, A. M. ., Sekti, B. A., Ulum, M. B. ., Rahaman, M. ., & Ariessanti, H. D. . (2024). Comparative Analysis of NIJ and NIST Methods for MicroSD Investigations: A Technopreneur Approach. Aptisi Transactions on Technopreneurship (ATT), 6(2), 169–181. https://doi.org/10.34306/att.v6i2.407

Article Details