International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 185 - Number 36 |
Year of Publication: 2023 |
Authors: Herdin Asmara Timor, Imam Riadi |
10.5120/ijca2023923157 |
Herdin Asmara Timor, Imam Riadi . Web Forensics on Tiktok Services using National Institute of Standards and Technology Method. International Journal of Computer Applications. 185, 36 ( Oct 2023), 40-46. DOI=10.5120/ijca2023923157
Users use tiktok to share photos and videos, comment, and also features to like a video that is uploaded. More and more people use tiktok, but more and more irresponsible users whose accounts are used to torture others online. As a result, cyberbullying is still rampant on tiktok the investigation process in cyberbullying situations and to find the necessary seven digital evidence. The initial stage is the collection stage, where evidence such as files, documents, data, and physical evidence is collected. The examination stage is the stage of examining the data obtained from the previous location. The analysis stage is the stage of reviewing the data obtained from the last step the analysis stage, where the examination results are analyzed in depth. Finally, the reporting stage is the preparation of a report containing the results of the analysis that has been carried out. Tools FTK imager digital evidence of captions usernames of tiktok actors. Tools video cache view digital evidence of deleted video posts, content, and videos that have become images. tools browser history capturer digital evidence in the form of date, time of occurrence, and web browser. Tools browsing history view digital proof of activity history, namely date and time, caption uploads and web types, and user names. On tiktok, every action leaves a digital trail. Investigators can follow and collect evidence of various activities, such as captions, images, and posted videos.