Claim Missing Document
Check
Articles

Found 4 Documents
Search

Comparative Analysis and Design of Cybersecurity Maturity Assessment Methodology Using NIST CSF, COBIT, ISO/IEC 27002 and PCI DSS Diah Sulistyowati; Fitri Handayani; Yohan Suryanto
JOIV : International Journal on Informatics Visualization Vol 4, No 4 (2020)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.4.4.482

Abstract

Data or Information security in today's digital era is crucial in every organization that needs to pay attention. Management of organizational information is one of the components in realizing Good Corporate Governance. The measure of an adequate level of protection is an indicator of the cybersecurity awareness aspects of an organization's business processes in the short, medium, and long term, especially in the field that deals with information and communication technology (ICT). To make this happen, it requires a security standard that is appropriate and follows its needs to help organizations know the maturity level of cybersecurity in protecting its information security. The ABC organization is one of the Government agencies that manage the critical infrastructure and Indonesian digital economies. The organization has currently implemented several international security standards through its planning, implementation, evaluation document, and ICT activities.  However, based on the national information security readiness assessment, information security management readiness results are still not optimal. In this study, an analysis of the NIST, ISO 27002, COBIT, and PCI DSS security standards has been carried out, which are ABC organizational security standards in managing ICT by assigned tasks and functions. Furthermore, the analysis result is used as materials for drafting a cybersecurity maturity framework through the four standard approaches that have become the basis for ICT management. The proposed concept of twenty-one integrated cybersecurity categories is expected to be a capital in measure ICT management performance in ABC organizations.
Framework Design for the Retrieval of Instant Messaging in Social Media as Electronic Evidence Linda Rosselina; Yohan Suryanto; Tofan Hermawan; Fahdiaz Alief
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 7, No 1: EECSI 2020
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v7.2064

Abstract

The rapid growth of social media features not only brings many advantages but also causes problems. Mainly related to digital evidence when cybercrime occurs. One of the social media features that are currently popular is the unsend message feature in instant messaging applications such as Instagram, Whatsapp, Facebook Messenger, Skype, Viber, and Telegram. In the case of cybercrime, the perpetrator can delete the messages and erase digital evidence, making it difficult to trace. Those artifact messages might be useful for law enforcement or forensic investigators to be used as digital evidence in court. Therefore, an effective and efficient framework is needed in the mobile forensic investigation process to guarantee the integrity of the data obtained. This paper will discuss the review of several international standards on mobile forensics, namely NIST SP 800-101, ISO/ IEC, and SWGDE. This paper also proposes a framework design to retrieve unsend data artifacts on social media according to official and widely used international mobile forensic standards.
Maturity Level Analysis of Digital Evidence Handling on Integrated Criminal Justice System based on NIST SP800-53 Revision 5 Using NIST Maturity Chandra Tirta Aditya Gunawan; Yohan Suryanto
Budapest International Research and Critics Institute-Journal (BIRCI-Journal) Vol 5, No 2 (2022): Budapest International Research and Critics Institute May
Publisher : Budapest International Research and Critics University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33258/birci.v5i2.4861

Abstract

The challenge of handling digital evidence in an integrated justice system is that it is vulnerable, easy to change, and destroyed, so it needs to be protected from security threats when stored, processed, and transmitted by each interconnected law enforcer. This study aims planning evaluation as a part to enhance security control by analyzing the maturity level of XYZ's organization as a law enforcement in handling digital evidence in an integrated criminal justice system. So far, there has been no research that measures the level of maturity in the handling of potential digital evidence. This study uses the NIST SP800-53 Rev 5 security control standard and measures the maturity level using NIST Maturity. The result of the research is that the current organizational maturity level is 2.1 (range 0-5). The XYZ organization, in general, has had a pattern in dealing with digital potential in terms of information security and privacy, but it has not been established so it is still vulnerable, inconsistent, and reactive. Organizations need to improve control of information security and privacy optimally so that the security of digital evidence can be guaranteed. These results can be part of the evaluation process of the organization's planning to improve security controls.
Implementing the Chaotic Permutation Multicircular Cryptography Technique using Asymmetric Key Aria Lesmana; Ruki Harwahyu; Yohan Suryanto
ULTIMATICS Vol 14 No 2 (2022): Ultimatics : Jurnal Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ti.v14i2.2837

Abstract

In digital computing, cryptographic methods considers performance in both speed and security. This study aims to explore and improve a permutation-based symmetric chaotic cryptography technique called Chaotic Permutation Multicircular (CPMC). In this study, a method is proposed to implement asymmetric key system from CPMC technique by generating a reverser key for reverting the permutation result of CPMC encryption back to its original arrangement using the same function as encryption. The reverser key alongside the CPMC key act as encryption and decryption key pair. The pair key generation and cryptographic function utilizes the encryption function of CPMC technique dubbed CPMC Shrinking algorithm. Asymmetric implementation can simplify CPMC technique by also using CPMC Shrinking algorithm for decryption, therefore enabling it as a single function for encryption and decryption. The asymmetric single function cryptography test show improvement in speed from faster cryptographic speed in decryption compared to initial implementation by average of 75.87%