2015
DOI: 10.14257/ijsia.2015.9.6.28
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Trusted Environment as a Strategy to Maintain the Integrity and Authenticity of Digital Evidence

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 32 publications
0
3
0
1
Order By: Relevance
“…In digital forensics, as in any branch of forensic science, the emphasis must be on evidential integrity and security (IPrayudi, 2015). In observing this priority, every forensics practitioner must adhere to stringent guidelines.…”
Section: Digital Forensics Science and Digital Evidencementioning
confidence: 99%
“…In digital forensics, as in any branch of forensic science, the emphasis must be on evidential integrity and security (IPrayudi, 2015). In observing this priority, every forensics practitioner must adhere to stringent guidelines.…”
Section: Digital Forensics Science and Digital Evidencementioning
confidence: 99%
“…Bukti elektronik adalah barang bukti yang bersifat fisik dan dapat dikenali secara visual seperti (komputer, handphone, camera, CD, hardisk, dan lain-lain) sedangkan bukti digital adalah barang bukti yang berisi informasi-informasi digital hasil ekstaksi dari bukti elektronik. Bukti digital merupakan alat bukti yang sah dipengadilan, sebagaimana yang dijelaskan oleh [2] dalam penelitiannya bahwa informasiinformasi digital yang tersimpan didalam perangkat elektronik dapat digunakan sebagai alat bukti yang sah sebagaimana diatur dalam UU ITE Nomor 11 Tahun 2008 Pasal 5 Ayat 1 yang berbunyi "Informasi Elektronik dan/atau Dokumen Elektronik dan/atau hasil cetaknya merupakan alat bukti hukum yang sah". Penanganan bukti digital dapat menjadi bukti adanya tekad bahwa kejahatan telah dilakukan atau mungkin memberikan hubungan antara kejahatan dan korban atau kejahatan dan pelakunya [3].…”
Section: Pendahuluanunclassified
“…They are forensics policy, security policy, model and trusted management system, trusted computing, secure channel communication, and the human factor [8]. Work related to classifying trust in two broader senses has been studied where in a socio-economic strand, trust needs to address standards and interoperable technology with the impact of policy and legal issues relative to cyber trust [9].…”
Section: Related Workmentioning
confidence: 99%