Pendekatan Model Bisnis Untuk Pemetaan Triage Forensics
Abstract
Keywords
Full Text:
PDFReferences
R. Raditio, Aspek Hukum Transaksi Elektronik Perikatan, Pembuktian dan Penyelesaian Sengketa, 2nd ed. Yogyakarta: Graha Ilmu, 2014.
K. Kent, S. Chevalier, T. Grance, and H. Dang, “Guide to integrating forensic techniques into incident response,” NIST Spec. Publ., no. August, pp. 800–886, 2006.
H. Ibrahim, H. G. Yavuzcan, and M. Ozel, “Digital forensics : An Analytical Crime Scene Procedure Model ( ACSPM ),” Forensic Sci. Int., vol. 233, no. 1–3, pp. 244–256, 2013.
M. D. Kohn, M. M. Eloff, and J. H. P. Eloff, “Integrated digital forensic process model,” Comput. Secur., vol. 38, pp. 103–115, 2013.
Y. D. Rahayu and Y. Prayudi, “Membangun Integrated Digital Forensics Investigation Frameworks ( IDFIF ) Menggunakan Metode Sequential Logic,” Semin. Nas. SENTIKA, vol. 2014, no. Sentika, 2014.
Y. Prayudi, A. Ashari, and T. K. Priyambodo, “A Proposed Digital Forensics Business Model to Support Cybercrime Investigation in Indonesia,” I.J. Comput. Netw. Inf. Secur., vol. 11, no. October, pp. 1–8, 2015.
J. Ćosić and Z. Ćosić, “Chain of Custody and Life Cycle of Digital Evidence,” Comput. Technol. Appl., vol. 3, no. 2012, pp. 126–129, 2012.
P. S. Patil and P. A. S. Kapse, “Survey on Different Phases of Digital Forensics Investigation Models,” pp. 1529–1534, 2015.
D. McClelland and F. Marturana, “A Digital Forensics Triage methodology based on feature manipulation techniques,” 2014 IEEE Int. Conf. Commun. Work. ICC 2014, no. June, pp. 676–681, 2014.
B. Yang, N. Li, and J. Jiang, “A new triage process model for digital investigations,” Proc. 2016 IEEE Adv. Inf. Manag. Commun. Electron. Autom. Control Conf. IMCEC 2016, pp. 712–717, 2017.
B. Hitchcock, N. A. Le-Khac, and M. Scanlon, “Tiered forensic methodology model for digital field triage by non-digital evidence specialists,” DFRWS 2016 EU - Proc. 3rd Annu. DFRWS Eur., vol. 16, pp. S75–S85, 2016.
M. S. Bashir and M. N. A. Khan, “A triage framework for digital forensics,” Comput. Fraud Secur., vol. 2015, no. 3, pp. 8–18, 2015.
K. Peffers, T. Tuunanen, M. A. Rothenberger, and S. Chatterjee, “A Design Science Research Methodology for Information Systems Research,” J. Manag. Inf. Syst., vol. 24, no. 3, pp. 45–77, 2008.
M. Von Rosing, S. White, F. Cummins, and H. De Man, Business Process Model and Notation-BPMN. Elsevier Inc., 2015.
Subektiningsih, Y. Prayudi, and I. Riadi, “Digital Forensics Workflow as A Mapping Model for People, Evidence, and Process in Digital Investigation,” Int. J. Cyber-Security Digit. Forensics, vol. 7, no. 3, pp. 294–304, 2018.
J. Sammons, “Digital Forensics,” Introd. to Inf. Secur., pp. 275–302, 2014.
I. Riadi, J. Eko Istiyanto, and A. Ashari, “Log Analysis Techniques using Clustering in Network Forensics,” IJCSIS) Int. J. Comput. Sci. Inf. Secur., vol. 10, no. 7, 2012.
I. Riadi, J. Eko, A. Ashari, and S. -, “Internet Forensics Framework Based-on Clustering,” Int. J. Adv. Comput. Sci. Appl., vol. 4, no. 12, pp. 115–123, 2013.
J. Richter, N. Kuntze, and C. Rudolph, “Securing digital evidence,” 5th Int. Work. Syst. Approaches to Digit. Forensic Eng. SADFE 2010, no. September, pp. 119–130, 2010.
Y. Prayudi, A. Luthfi, and A. M. R. Pratama, “Pendekatan Model Ontologi Untuk Merepresentasikan Body of Knowledge Digital Chain of Custody,” Cybermatika ITB, vol. 2, no. 2, pp. 36–43, 2014.
Object Management Group, “BPMN-Business Process Model and Notation,” 2016. [Online]. Available: www.omg.org/bpmn. [Accessed: 30-May-2017].
Bizagi, “BPMN by Example-Bizagi Suite,” resouces.bizagi.com. p. 25, 2014.
Bizagi, “Overview Bizagi Modeler,” 2017. [Online]. Available: http://help.bizagi.com/process-modeler/en/index.html?system_requirements.htm. [Accessed: 01-Jan-2017].
Bizagi, “Process Validation,” 2017. [Online]. Available: http://help.bizagi.com/process-modeler/en/index.html?system_requirements.htm. [Accessed: 01-Jan-2017].
S. Gregor and A. R. Hevner, “Positioning and presenting design science research for maximum impact,” MIS Q., vol. 37, no. 2, pp. 337–355, 2013.
S. T. March and G. F. Smith, “Design and natural science research on information technology,” vol. 15, pp. 251–266, 1995.
P. Antonelli, R. Mathew, A. Hevner, S. Chatterjee, and I. Series, “Design Science Research in Information Systems,” pp. 9–23, 2010.
Ec-Council, “Module 05 First Responder Procedures.” 2012.
Refbacks
- There are currently no refbacks.