MAKING OF DIGITAL FORENSIC READINESS INDEX (DiFRI) MODELS TO MALWARE ATTACKS
DOI:
https://doi.org/10.14421/csecurity.2020.3.2.2005Keywords:
Malware, Digital Forensic, Digital Forensic Readiness, Digital Forensic Readiness IndexAbstract
The increasing number of malware spread in the world today, then there will be more opportunities to commit crime, so readiness is needed for every internet user in dealing with these crimes. The readiness to handle crime is called digital forensic readiness. Therefore, we need a specific digital forensic readiness model to measure the level of readiness of internet users or institutions in achieving malware attacks. This model has the main components used to determine or calculate the level of readiness of internet users or institutions, the main components are the strategy component, the policy & procedure component, the technology & security component, the digital forensic response component, the control & legality component. The calculation method used in this study is a Likert Scale, with this method the results will be obtained that are closer to the real situation. The value / index of readiness level obtained will provide recommendations to internet users and these recommendations can be used to make improvements properly and on target.
References
Alamsyah, R. (2009). Teknik Forensik Meneliti Bukti Digital. Retrieved March 5, 2018, from http://www.perspektifbaru.com/wawancara/708 pada 16 Oktober 2009.05
Barske, D., Stander, A., & Jordaan, J. (2010). A digital forensic readiness framework for South African SME’s. Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010. https://doi.org/10.1109/ISSA.2010.5588281
Elyas, M., Ahmad, A., Maynard, S. B., & Lonie, A. (2015). Digital forensic readiness: Expert perspectives on a theoretical framework. Computers and Security, 52, 70–89. https://doi.org/10.1016/j.cose.2015.04.003
Grobler B., T. and L. (2007). Digital Forensic Readiness as a Component of Information Security Best Practice. IFIP International Federation for Information Processing, 232, 13.
Marcella, A. J., & Greenfield, R. S. (2002). “Cyber Forensics a field manual for collecting, examining and preserving evidence of computer crimes”, by CRC Press LLC, United States of America.
Mouhtaropoulos, A., & Li, C. (2014). Digital Forensic Readiness : Are We There Yet ?, 1(3), 173–179.
Palmer, G. (2001). the first Digital Forensic Research Workshop. The First Digital Forensic Research Workshop (DFRWS), (1), 15–18. https://doi.org/10.1111/j.1365-2656.2005.01025.x
Reavis, J. (2012). The Ongoing Malware Threat: How Malware Infects Websites and Harms Businesses — and What You Can Do to Stop It. Symantec, 11. Retrieved from https://www.geotrust.com/anti-malware-scan/malware-threat-white-paper.pdf
Robert Rowlingson Ph. (2004). A Ten Step Process for Forensic Readiness.
Onyemauche, U.C. Nwosu, Q.N. & Mbanusi, C.E. (2015). A Conceptual Framework on Digital Forensics Readiness for Criminals Tracking: Data Reduction Modalities. http://www.ijritcc.org
Kebande, V.R. Karie, N.M. & Venter, H.S. (2016). Generic Digital Forensic Readiness Model for BYOD using Honeypot Technology.
Park, S. Kim, Y. Park, G. Na, O. & Chang, H. (2018). Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment.
Siddiqui, M. A. (2008). Data Mining Methods For Malware Detection.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Yogi Pratama
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Under the following terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.