KERANGKA KERJA DIGITAL FORENSIC READINESS PADA SEBUAH ORGANISASI (STUDI KASUS : PT WADITRA REKA CIPTA BANDUNG)
DOI:
https://doi.org/10.14421/csecurity.2019.2.2.1641Keywords:
Digital forensik, kerangka kerja, kesiapan digital forensic, difri, linkertAbstract
Digital Forensik telah berkembang saat ini, tetapi masih memerlukan adanya suatu kerangka kerja sistemik untuk menentukan seberapa siapkah suatu organisasi dalam melakukan Forensik Digital. Penelitian mengenai kesiapan forensik digital sebuah organisasi juga masih minim, untuk itu perlu dilakukannya suatu penelitian supaya bisa mengidentifikasi faktor-faktor yang berkontribusi terhadap kesiapan Forensik Digital yang nantinya bisa diukur dan setelah dihitung akan mengahasilkan sebuah nilai yang disebut Digital Forensic Readiness Index(DiFRI). Suatu organisasi perlu membuat kebijakan keamanan untuk melindungi aset informasi yang secara prinsip berisi berbagai cara yang perlu dilakukan untuk mengontrol, manajemen, mekanisme, prosedur dan tata cara mengamankan sebuah informasi tersebut. indikator yang akan dicoba dibahas masing-masing komponen yakni komponen strategi, kebijakan dan prosedur, teknologi dan keamanan, respon forensic digital serta kendali dan legalitas. Metode penghitungan pada pada hasil pengolahan kuesioner ini menggunakan skala Linkert yang biasa digunakan untuk mengukur persepsi atau pendapat seseorang mengenai sebuah peristiwa atau fenomena sosial.
References
Barske, D., Stander, A., & Jordaan, J. (2010). A digital forensic readiness framework for South African SME’s. Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010, (March). https://doi.org/10.1109/ISSA.2010.5588281
D, R. R. P. (2004). International Journal of Digital Evidence Winter 2004 , Volume 2 , Issue 3 A Ten Step Process for Forensic Readiness International Journal of Digital Evidence. International Journal of Digital Evidence, 2(3), 1–28. Retrieved from https://www.utica.edu/academic/institutes/ecii/publications/articles/A0B13342-B4E0-1F6A-156F501C49CF5F51.pdf
Dunn, W. N. (2000). Pengantar analisis kebijakan publik. Gadjah Mada University Press.
Elyas, M., Ahmad, A., Maynard, S. B., & Lonie, A. (2015). Digital forensic readiness: Expert perspectives on a theoretical framework. Computers and Security, 52(April), 70–89. https://doi.org/10.1016/j.cose.2015.04.003
Grobler, C. P., & Louwrens, C. P. (2007). Digital forensic readiness as a component of information security best practice. IFIP International Federation for Information Processing. https://doi.org/10.1007/978-0-387-72367-9_2
ID-CERT. (2018). Incident Monitoring Report Tahun 2017. 1–85. Retrieved from https://www.cert.or.id/media/files/UMUM_-_Laporan_Tahunan_2017.pdf
Indrajit, E. R. (2014). Manajemen Organisasi dan Tata Kelola Teknologi Informasi. Yogyakarta: Graha Ilmu.
Kazadi, J. M., & Jazri, H. (2015). Using digital forensic readiness model to increase the forensic readiness of a computer system. Proceedings of 2015 International Conference on Emerging Trends in Networks and Computer Communications, ETNCC 2015, (April), 131–137. https://doi.org/10.1109/ETNCC.2015.7184822
Kebande, V. R., Karie, N. M., & Venter, H. S. (2016). A generic Digital Forensic Readiness model for BYOD using honeypot technology. 2016 IST-Africa Week Conference, 1–12. IEEE.
Kigwana, I., & Venter, H. S. (2018). A Digital Forensic Readiness Architecture for Online Examinations. South African Computer Journal, 30(1), 1–39. https://doi.org/10.18489/sacj.v30i1.466
Mabuto, E. K., & Venter, H. S. (2011). State of the Art of Digital Forensic Techniques. ISSA.
Mohamed, E., B., M. S., Atif, A., & Andrew, L. (2014). Towards A Systemic Framework for Digital Forensic Readiness. Journal of Computer Information Systems, 54(3), 97–105. https://doi.org/10.1080/08874417.2014.11645708
Mouhtaropoulos, A., Li, C. T., & Grobler, M. (2014). Digital forensic readiness: Are we there yet? Journal of International Commercial Law and Technology.
Moussa, A. N., Ithnin, N. B., & Miaikil, O. A. M. (2014). Conceptual forensic readiness framework for infrastructure as a service consumers. Proceedings - 2014 IEEE Conference on System, Process and Control, ICSPC 2014, (April), 162–167. https://doi.org/10.1109/SPC.2014.7086250
Prayudi, Y., & Ashari, A. (2015). A Study on Secure Communication for Digital Forensics Environment. Int. J. Sci. Eng. Res, 6(1), 1036–1043.
Rahardjo, B. (2019). Security Outlook 2019.
Reddy, K., & Venter, H. (2008). Chapter 11 A FORENSIC FRAMEWORK FOR HANDLING INFORMATION. In Advances in Digital Forensics IV (pp. 143–155). https://doi.org/10.1007/978-3-642-04155-6_11
Sachowski, J., & Sachowski, J. (2019). Digital Forensic Readiness. Digital Forensics and Investigations, (October), 203–217. https://doi.org/10.4324/9781315194820-13
Subarsono, A. G. (2005). Analisis kebijakan publik: konsep, teori dan aplikasi. Pustaka Pelajar.
Suharto, E. (2005). Analisis kebijakan publik: panduan praktis mengkaji masalah dan kebijakan sosial. Alfabeta.
Tan, J. (2001). Forensic Readiness Assessment. Cambridge, MA:@ Stake, 1–23. Retrieved from http://project.honeynet.org
Widodo, T. (2016). Pengembangan Model Digital Forensic Readiness Index (DiFRI) Untuk Mencegah Kejahatan Dunia Maya. Jurnal Informatika Sunan Kalijaga, 1(1), 41–46.
Winarno, B. (2002). Teori dan proses kebijakan publik. Media Pressindo.
Yosepyn, Tino. (2011, September 9). Pedoman Penyusunan Kerangka Kerja Logis (LFA) Secara Bertahap [Blog post]. Restrieved from http://lingkarlsm.com/pedoman-penyusunan-kerangka-kerja-logis-lfa-secara-bertahap/
Downloads
Published
How to Cite
Issue
Section
License
Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Under the following terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.