Implementasi Digital Forensik Brunei Darussalam Dalam Membangun Keamanan Siber
DOI:
https://doi.org/10.33172/pa.v4i1.194Abstract
Abstrak - Tantangan dunia cyber bukan merupakan sesuatu yang baru, terlebih lagi di era informasi dimana semua terkoneksi melalui internet, dengan berkembangnya perangkat untuk menyambungkan manusia dengan satu sama lain, seperti computer, smartphone, tablet, dan lain sebagainya semakin membuka peluang bagi para pelaku kejahatan untuk melancarkan serangan melalui dunia siber. Agar dapat mengatasi ancaman tersebut maka sangat diperlukan penanganan yang cepat dan tepat sasaran agar dapat segera diantisipasi. Salah satunya adalah dengan menggunakan digital forensics, sebuah acuan untuk menginvestigasi segala bentuk bukti digital yang dijadikan sebagai alat untuk melakukan cybercrime. Dalam tulisan ini, penulis melihat bagaimana pemerintah Brunei Darussalam mengimplementasikan Digital Forensics untuk meningkatkan Cyber Security di Brunei Darussalam. Dengan bekerja sama dengan pihak swasta dan beberapa lembaga lainnya yang terkait dengan penanggulangan cybercrime pemerintah Brunei Darussalam telah menciptakan sebuah struktur dan acuan yang cukup baik untuk dapat menghadapi berbagai ancaman cyber yang ada di Brunei Darussalam. Dengan demikian pemerintah Indonesia dapat mempelajari hal tersebut agar dapat menciptakan sebuah struktur dan acuan yang baik pula untuk dapat menghadapi ancaman cyber di Indonesia.
Kata kunci: Siber, Kejahatan Siber, Keamanan Siber, Forensik Digital
Abstract - The challenges of the cyber world is not something new, especially in the information age where all connected via the Internet, with the development of devices to connect people with each other, such as computers, smartphones, tablets, and so the more opportunities for criminals to launch attacks through cyber world. In order to overcome such threats so it will need a fast and precise handling goals that can be anticipated. One of them is to use a digital forensics, a reference to investigate all forms of digital evidence that is used as a tool to commit cybercrime. In this paper, the authors look at how the government of Brunei Darussalam to implement Digital Forensics to boost Cyber Security in Brunei Darussalam. By working closely with the private sector and other institutions associated with cybercrime prevention Brunei government has created a structure and references were good enough to be able to deal with cyber threats that exist in Brunei Darussalam. Thus the government of Indonesia can learn it in order to create a structure and a good reference as well to be able to confront cyber threats in Indonesia.
Key Words: Cyber, Cybercrime, Cybersecurity, Digital Forensics
References
Daftar Pustaka
A roadmap for digital forensic research. (2001). Tech. rep., Digital Forensic Research Workshop.
Cybenko. G., Giani, A., & Thompson, P. (2002). Cognitive Hacking: A Battle for the Mind. Computer, 35 (8), 50-56
Drubin. C. (2016). Booming Opportunities in IOT Cybersecurity. Microwave Journal, 59 (6), 52
Edward. F. (2015). Cyber Security Challenges: Protecting your transportation management center. ITE Journal.
Finomore, V., Sitz, A .., Blair, E., Rahlil, K., Champion, M., Funke, G., Mancuso, V. & Knott, B. (2013). Effects of Cyber disruption in a Distributed Team Decision Making Task, Proceedings of the Human Factors and ergonomics Society Annual Meeting, 57, 394-398.
Gary L Palmer. (2001). A Road Map for Digital Forensic Research. Technical Report DTRT0010-01, DFRWS. Report for the First Digital Forensic Research Workshop (DFRWS).
Goolsby, R. (2013). On Cybersecurity, Crowdsourcing, and Social Cyber Attack. commons Lab Policy Memo Series, 1-9.
H M Wolfe. (2003). “Web Solutions and Technologies After the Hack”, presented at ICE Conference, 2003
Hammond, B. (2015). FBI Issues Cybersecurity Alert for IOT Devices. Cybersecurity Policy Report.
Hewling. (2010). Digital Forensics: The UK Legal Framework, Published Masters dissertation, University of Liverpool, Liverpool UK
Higginbotham, S. (2015). The FBI warns citizens to beware of cybercrime and the Internet of things. Fortune.
Howard, PN, Duffy, A., Freelon, D., Hussain, M., Mari, W. & Mazaid, M. (2011). What was the role of Social Media During the Arab Spring? Opening Closed Regimes. Project on Information Technology & Political Islam (PITPI).
Pembentukan Badan Cyber Nasional Diprediksi Molor Lagi. (2017). Online Article: http://semarang.bisnis.com/read/20160815/16/88875/pembentukan-badan-cyber-nasional-diprediksi-molor-lagi. Diakses Pada 6 April 2017
Knott, B. (2014). Cyber Trust and Influence. Proceedings of the Human Factors and Ergonoics Society annal Meeting, 58 (1), 415-418. DOI: 10.1177 / 1541931214581985
Legislation, Attorney General Chambers, Brunei Darussalam
Michael Noblett, Mark.M.Pollitt and Lawrence Presley. (2000). Recovering and Examining Computer Forensic Evidence, Forensic Science Communications, Volume 2, Number 4.
RBTS. (2015). Combating Cyber Security Threats, Cyber Security Forum Brunei
Reith, M., Carr, C., and Gunsch, G. (2002). An examination of digital forensic models. International Journal of Digital Evidence 1, 3.
Ryan Harris – DFRWS. (2006). Conference proceedings, Arriving at an Anti-forensics consensus
S. S. Basamh, H. A. Qudaih and J. B. Ibrahim. (2014). "An Overview on Cyber Security Awareness in Muslim Countries," International Journal of Information and Communication Technology Research, vol. 4, no. 1, pp. 21-24.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.