Abstract

Data is something that can be manipulated by irresponsible people and causing fraud. The use of log files, data theft, unauthorized person, and infiltration are things that should be prevented before the problem occurs. The authenticity of application data that evaluates the performance of company employees is very crucial. This paper will explain how to maintain the company’s big data as a valid standard service to assess employee performance database, based on employee performance of MariaDB or MySQL 5.0.11 with InnoDB storage engine. The authenticity of data is required for decent digital evidence when sabotage occurs. Digital forensic analysis carried out serves to reveal past activities, record time and be able to recover deleted data in the InnoDB storage engine table. A comprehensive examination is carried out by looking at the internal and external aspects of the Relational Database Management System (RDBMS). The result of this research is in the form of forensic tables in the InnoDB engine before and after sabotage occurs.

Highlights

  • At present almost all companies have a database system [1]

  • Correction and analysis results for digital forensic applications for evaluating employee performance under the supervision of digital forensic experts, when the InnoDB engine database is declared sabotage, the report is forwarded to the company for further legal action with evidence of digital forensic data

  • The company data was successfully reconstructed through a file cluster system so that acts of sabotage can be known

Read more

Summary

Introduction

At present almost all companies have a database system [1]. Companies that already have a computer-based information system (CBIS) have stored their information into a database management system. This information is crucial and is used as the main tool to make decisions about the performance of employees in the company [3]. Results and information on forensic databases can be used for several reasons [4, 5]. Companies that have databases that contain employee data certainly concern the interest of many people’s privacy, authentic verification of each employee’s data is needed for a more specific purpose, namely being able to guarantee correct and fair data

Objectives
Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call