Maturity Level Analysis of Digital Evidence Handling on Integrated Criminal Justice System based on NIST SP800-53 Revision 5 Using NIST Maturity

Chandra Tirta Aditya Gunawan, Yohan Suryanto

Abstract


The challenge of handling digital evidence in an integrated justice system is that it is vulnerable, easy to change, and destroyed, so it needs to be protected from security threats when stored, processed, and transmitted by each interconnected law enforcer. This study aims planning evaluation as a part to enhance security control by analyzing the maturity level of XYZ's organization as a law enforcement in handling digital evidence in an integrated criminal justice system. So far, there has been no research that measures the level of maturity in the handling of potential digital evidence. This study uses the NIST SP800-53 Rev 5 security control standard and measures the maturity level using NIST Maturity. The result of the research is that the current organizational maturity level is 2.1 (range 0-5). The XYZ organization, in general, has had a pattern in dealing with digital potential in terms of information security and privacy, but it has not been established so it is still vulnerable, inconsistent, and reactive. Organizations need to improve control of information security and privacy optimally so that the security of digital evidence can be guaranteed. These results can be part of the evaluation process of the organization's planning to improve security controls.


Keywords


integrated criminal justice system; digital evidence; maturity level; NIST SP 800-53 Rev 5; NIST maturity

Full Text:

PDF

References


Anderson, Philip., and European Union. European Network and Information Security Agency. 2014. Electronic Evidence, a Basic Guide for First Responders : Good Practice Material for CERT First Responders., ENISA.

Arshad, H., Jantan, A. bin, and Abiodun, O. I. 2018. “Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence,” Journal of Information Processing Systems (14:2), Korea Information Processing Society, pp. 346–376. (https://doi.org/10.3745/JIPS.03.0095).

Avianto, H., and Ogi, D. 2019. “Design of Electronic Medical Record Security Policy in Hospital Management Information System (SIMRS) in XYZ Hospital,” in 2019 2nd International Conference on Applied Information Technology and Innovation (ICAITI), KCG College of Technology, pp. 163–167. (https://doi.org/10.1109/ICAITI48442.2019.8982122).

Cipher, "NIST Maturity Self-Assessment Survey," https://info.cipher.com/nist-maturity-self-assessment-survey accessed 10/02/2022.

“Constitution of Indonesia 8/1981 about Criminal Procedure Law.” 1981. Jakarta.

“Constitution of Indonesia 11/2008 about Information and Electronic Transactions.” 2008. Jakarta.

“Constitution of Indonesia 20/2001 about Eradication of Corruption.” 2001. Jakarta.

Dananjaya, N. S. 2014. "Sistem Peradilan Pidana Terpadu (Integreted Criminal Justice System) Di Kaji Dari Perspektif Sub Sistem Kepolisian". Vyavahara Duta, 9 (1). ISSN 1978-0982 (https://erepo.unud.ac.id/id/eprint/11614)

Feri Efendi, T., Rahmadi, R., and Prayudi, Y. 2020. “Rancang Bangun Sistem Untuk Manajemen Barang Bukti Fisik Dan Chain of Custody (CoC) Pada Penyimpananan Laboratorium Forensika Digital,” Jurnal Teknologi Dan Manajemen Informatika (6:2), pp. 53–63. (https://doi.org/10.26905/jtmi.v6i2.4177).

“ISO/IEC 27037:2012 Technology — Security Techniques — Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence.” 2012.

Kohar, A., Riadi, I., and Lutfi, A. 2015. “Analysis of Smartphone Users Awareness Activities Cybercrime,” International Journal of Computer Applications (129:2), Foundation of Computer Science, pp. 1–6. (https://doi.org/10.5120/ijca2015906449).

Kurniawan, E., and Riadi, I. 2018. “Security Level Analysis of Academic Information Systems Based on Standard ISO 27002:2003 Using SSE-CMM,” International Journal of Computer Science and Information Security (16), pp. 139–147. (https://doi.org/10.13140/RG.2.2.20925.15840).

Le, N. T., and Hoang, D. B. 2016. “Can Maturity Models Support Cyber Security?,” in 2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC), Las Vegas, NV, USA: IEEE, December 9. (https://doi.org/10.1109/PCCC.2016.7820663).

Mukasey, M. B., Sedgwick, J. L., and Hagy, D. W. 2001. “Special REPORT Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition,” Washington DC. (www.ojp.usdoj.gov/nij).

NIST SP800-53 Revision 5 - Security and Privacy Controls for Information Systems and Organizations.” 2020. Gaithersburg, MD, September 23. (https://doi.org/10.6028/NIST.SP.800-53r5).

Niati, D. R., Siregar, Z. M. E., & Prayoga, Y. (2021). The Effect of Training on Work Performance and Career Development: The Role of Motivation as Intervening Variable. Budapest International Research and Critics Institute (BIRCI-Journal): Humanities and Social Sciences, 4(2), 2385–2393. https://doi.org/10.33258/birci.v4i2.1940

Nugroho, S. A. 2010. “Analisis Kedudukan Dan Kekuatan Pembuktian Digital Evidence Dalam Pembuktian Perkara Korupsi (Suatu Studi Terhadap UU Nomor 11 Tahun 2008 Tentang Informasi Dan Transaksi Elektronik Dan UU Nomor 20 Tahun 2001 Tentang Pemberantasan Tindak Pidana Korupsi),” Semarang.

Prayudi, Y. 2014. “Problema Dan Solusi Digital Chain of Custody Dalam Proses Investigasi Cybercrime,” Seminar Nasional Aplikasi Teknologi Informasi (Senasti), pp. 197–204.

R, R., Riadi, I., and Prayudi, Y. 2016. “A Maturity Level Framework for Measurement of Information Security Performance,” International Journal of Computer Applications (141:8), Foundation of Computer Science, pp. 1–6. (https://doi.org/10.5120/ijca2016907930).

Supriyatna. 2009. “KUHAP DAN SISTEM PERADILAN PIDANA TERPADU,” in Wacana Hukum, 8(1) (Vol. VIII), Surakarta, September 27. (https://doi.org/10.33061/1.jwh.2009.8.1.318).

Tian, Z., Li, M., Qiu, M., Sun, Y., and Su, S. 2019. “Block-DEF: A Secure Digital Evidence Framework Using Blockchain,” Information Sciences (491), Elsevier Inc., pp. 151–165. (https://doi.org/10.1016/j.ins.2019.04.011).

Yoga Pradana, F., and Trianto, N. 2018. “Privacy Control for Personally Identifiable Information on the Information System (Case Study:XYZ Organization),” in 2018 International Conference on Applied Information Technology and Innovation (ICAITI), KCG College of Technology, pp. 50–55. (https://doi.org/10.1109/ICAITI.2018.8686766).




DOI: https://doi.org/10.33258/birci.v5i2.4861

Article Metrics

Abstract view : 54 times
PDF - 23 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.