MAKING OF DIGITAL FORENSIC READINESS INDEX (DiFRI) MODELS TO MALWARE ATTACKS

Authors

  • Yogi Pratama Program Studi Teknik Informatika, Universitas Islam Indonesia, Indonesia

DOI:

https://doi.org/10.14421/csecurity.2020.3.2.2005

Keywords:

Malware, Digital Forensic, Digital Forensic Readiness, Digital Forensic Readiness Index

Abstract

The increasing number of malware spread in the world today, then there will be more opportunities to commit crime, so readiness is needed for every internet user in dealing with these crimes. The readiness to handle crime is called digital forensic readiness. Therefore, we need a specific digital forensic readiness model to measure the level of readiness of internet users or institutions in achieving malware attacks. This model has the main components used to determine or calculate the level of readiness of internet users or institutions, the main components are the strategy component, the policy & procedure component, the technology & security component, the digital forensic response component, the control & legality component. The calculation method used in this study is a Likert Scale, with this method the results will be obtained that are closer to the real situation. The value / index of readiness level obtained will provide recommendations to internet users and these recommendations can be used to make improvements properly and on target.

References

Alamsyah, R. (2009). Teknik Forensik Meneliti Bukti Digital. Retrieved March 5, 2018, from http://www.perspektifbaru.com/wawancara/708 pada 16 Oktober 2009.05

Barske, D., Stander, A., & Jordaan, J. (2010). A digital forensic readiness framework for South African SME’s. Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010. https://doi.org/10.1109/ISSA.2010.5588281

Elyas, M., Ahmad, A., Maynard, S. B., & Lonie, A. (2015). Digital forensic readiness: Expert perspectives on a theoretical framework. Computers and Security, 52, 70–89. https://doi.org/10.1016/j.cose.2015.04.003

Grobler B., T. and L. (2007). Digital Forensic Readiness as a Component of Information Security Best Practice. IFIP International Federation for Information Processing, 232, 13.

Marcella, A. J., & Greenfield, R. S. (2002). “Cyber Forensics a field manual for collecting, examining and preserving evidence of computer crimes”, by CRC Press LLC, United States of America.

Mouhtaropoulos, A., & Li, C. (2014). Digital Forensic Readiness : Are We There Yet ?, 1(3), 173–179.

Palmer, G. (2001). the first Digital Forensic Research Workshop. The First Digital Forensic Research Workshop (DFRWS), (1), 15–18. https://doi.org/10.1111/j.1365-2656.2005.01025.x

Reavis, J. (2012). The Ongoing Malware Threat: How Malware Infects Websites and Harms Businesses — and What You Can Do to Stop It. Symantec, 11. Retrieved from https://www.geotrust.com/anti-malware-scan/malware-threat-white-paper.pdf

Robert Rowlingson Ph. (2004). A Ten Step Process for Forensic Readiness.

Onyemauche, U.C. Nwosu, Q.N. & Mbanusi, C.E. (2015). A Conceptual Framework on Digital Forensics Readiness for Criminals Tracking: Data Reduction Modalities. http://www.ijritcc.org

Kebande, V.R. Karie, N.M. & Venter, H.S. (2016). Generic Digital Forensic Readiness Model for BYOD using Honeypot Technology.

Park, S. Kim, Y. Park, G. Na, O. & Chang, H. (2018). Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment.

Siddiqui, M. A. (2008). Data Mining Methods For Malware Detection.

Downloads

Published

11-12-2020

How to Cite

[1]
Y. Pratama, “MAKING OF DIGITAL FORENSIC READINESS INDEX (DiFRI) MODELS TO MALWARE ATTACKS”, csecurity, vol. 3, no. 2, pp. 1–5, Dec. 2020.