Analisis Keamanan Data Pribadi pada Shopee Paylater Menggunakan Metode Hybrid
Abstract
The low level of awareness and understanding of Shopee online shopping application users regarding the security of user data causes the level of digital crime to increase, as evidenced by the many crime cases that occur, namely the misuse of users' personal data by utilizing OTP codes as a verification process. This can be a loophole for digital crimes that are certainly very detrimental to users. Perform personal data security analysis on Shopee PayLater using the Hybrid method. The method used is the hybrid method, which is a method of combining basic digital forensic techniques with re-engineering techniques. This method can be used to analyze applications that involve user personal data, tools used such as MobSF, Virustotal to view application activity, and apk-deguard for apk reengineering. Personal data security research on Shopee PayLater was carried out using the help of Virustotal and MobSF tools found vulnerabilities caused by users. The results of the personal data security analysis carried out on the Android-based Shopee application show that there are several vulnerabilities in the user's personal data vulnerability, namely in the application licensing section.
References
[2] I. Saputra, G. M. A. Sasmita, and A. Wiranatha, “Pengembangan Sistem Keamanan untuk E-Commerce,” Jurnal Ilmiah Merpati (Menara Penelitian Akademika Teknologi Informasi), vol. 5, no. 1, p. 17, 2017.
[3] F. D. W. Damayanti and C. Canggih, “Pengaruh penggunaan pembayaran shopeepay later terhadap perilaku konsumsi islam generasi milenial di Surabaya,” Jurnal Ilmiah Ekonomi Islam, vol. 7, no. 3, pp. 1905–1915, 2021.
[4] M. D. K. Perdani, W. Widyawan, and P. I. Santosa, “Blockchain untuk Keamanan Transaksi Elektronik Perusahaan Financial Technology (Studi Kasus pada PT XYZ),” Semnasteknomedia Online, vol. 6, no. 1, pp. 1–14, 2018.
[5] I. K. Noppi Adi Jaya and I. A. Utari Dewi, “Regulasi Keamanan Data Pribadi Pengguna pada E-commerce di Indonesia,” 2022.
[6] H. Wijayanto, A. H. Muhammad, and D. Hariyadi, “Analisis Penyalahgunaan Data Pribadi Dalam Aplikasi Fintech Ilegal Dengan Metode Hibrid,” Jurnal Ilmiah SINUS, vol. 18, no. 1, pp. 1–10, 2020.
[7] R. K. Novriantama, A. Kusyanti, and R. I. Rokhmawati, “Analisis Privasi dan Kepercayaan Terhadap Keamanan Data Pengguna Aplikasi On Demand Service Menggunakan Metodologi Structural Equation Modeling,” Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer e-ISSN, vol. 2548, p. 964X, 2018.
[8] N. Nasirudin, S. Sunardi, and I. Riadi, “Analisis Forensik Smartphone Android Menggunakan Metode NIST dan Tool MOBILedit Forensic Express,” Jurnal Informatika Universitas Pamulang, vol. 5, no. 1, pp. 89–94, 2020.
[9] F. T. Saputra, B. Santoso, J. Kuswanto, and M. A. Ghofur, “Analisis Keamanan Informasi Kesadaran Pengguna WhatsApp Mod dengan Metode Analisis Statis dan Metode Kuantitatif,” in Prosiding Seminar Nasional Sains Teknologi dan Inovasi Indonesia p-ISSN, p. 5805.
[10] C. Hanifurohman and D. D. Hutagalung, “Analisa Keamanan Aplikasi Mobile E-Commerce Berbasis Android Menggunakan Mobile Security Framework,” in Seminar Nasional Enhancing Innovations for Sustainable Development, 2020.