MEMBANGUN PROFIL RESIKO PADA PEMBUATAN PETA DIGITAL MENGGUNAKAN FRAMEWORK NIST
DOI:
https://doi.org/10.14421/csecurity.2018.1.1.1236Abstract
GPS (Global Positioning System) is the main device that record location based on coordinate . The purpose of location recording is making digital maps and the output are printed-maps. Digital maps and printed-maps that have been authorized by the government will become reference for every activities like terminating the location objects or borderline. The Accuracy and authenticity of coordinate data from GPS is essential for high-accuracy maps, but digital maps are also vulnerable from editing, duplication, or deleted for a particular purpose. Because of that, supervisory management in the manufacturing process is needed to help facilitate in building a digital map-making profile. The reference in managing risk management to build the profile is NIST Framework.
References
DARYONO, B. S. (2017). Pengembangan Pelaporan Framework Cyber Crime. JISKa, Vol 1 No., 133–147. Retrieved from https://www.researchgate.net/publication/316510836_PENGEMBANGAN_FRAMEWORK_PELAPORAN_CYBER_CRIMEFRAMEWORK_PELAPORAN_CYBER_CRIME
FABIAN BUSTAMANTE, WALTER FUERTES, PAUL DIAZ, T. T. (2017). Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with EnterpriseObjectives. Advances in Science, Technology and Engineering Systems Journal, Vol. 2, No, 88–99. Retrieved from https://www.researchgate.net/publication/317138094_Methodology_for_Management_of_Information_Security_in_In-dustrial_Control_Systems_A_Proof_of_Concept_aligned_with_Enterprise_Objectives
GUNTUR BAGUS PAMUNGKAS, BAMBANG SUDARSONO, S. K. (2014). Verifikasi Batas Wilayah Antara Kabupaten Sukoharjo Dan Kabupaten Karang Anyar. Jurnal Geodesi Undip, Volume 3,(Permasalahan Batas Daerah), 14–24.
IBNU, Z. (2013). Rancang Bangun Pelacak Lokasi Dengan Teknologi GPS. Teknomatika, Vol. 3 No.(Pelacakan Lokasi Kejahatan dengan GPS).
J KIYOSHI. (2013). Investigating the Impact of Global Positioning System Evidence.
KRAMER, J. (2013). No DroidSpotter: A forensic tool for Android location data collection and analysis. IOWA State Univercyti.
LAST DAVID. (2014). GPS Forensics, Crime and Jamming, (GPSJamming).
LESTARI, U., & KRISTIYANA, S. (2013). Rancang Bangun Mobile Tracking Application Module Untuk Pencarian Posisi Benda Bergerak Berbasis Short Massage Service ( Sms ). Seminar Nasional Teknologi Informasi Dan Komputasi (SENASTIK 2013), 30–31.
NURDIATI SRI, BARUS BABA, P. D. (2015). Pengembangan Sistem Informasi Geografis Tindak Kejahatan Multilevel berbasis Web. Retrieved from http://download.portalgaruda.org/article.php?article=85662&val=235
PRAHASTA, E. (2009). Sistem InformasiGeografis Konsep-Konsep Dasar (Cetakan Pe). Bandung: Informatika.
PRAYUDI YUDI, S. S. (2014). Analisis Bukti Digital Global Positioning System (GPS) Pada Smartphone Android. Konferensi Nasional Sistem Dan Informatika (KNS&I) 2014, (bukti digital GPS).
PURBO ONNO W. (2017). Framework Cybersecurity. Retrieved January 13, 2018, from http://lms.onnocenter.or.id/wiki/index.php/Framework_Cybersecurity
STONEBURNER GARY , GOGUEN ALICE, AND F. A. (2002). Risk Management Guide for Information Technology Systems. Cumputer Security, (Reports on Computer System Technology). Retrieved from https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/admiNISTrative/securityrule/NIST800-30.pdf
UCU NUGRAHA. (2016). Manajemen Risiko Sistem Informasi Pada Perguruan Perguruan Tinggi Menggunakan Kerangka Kerja NIST SP 800-300. Seminar Nasional Telekomunikasi Dan Informatika (SELISIK 2016), 2503–2844.
WIDYANTARA, I. M. O., AGUS, I. G., & WARMAYANA, K. (2015). Penerapan Teknologi GPS Tracker Untuk Identifikasi Kondisi Traffik Jalan Raya, 14(1), 31–35.
Downloads
Published
How to Cite
Issue
Section
License
Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Under the following terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.