Analisis Pelanggaran Keamanan Siber pada Bisnis Menggunakan Metode Digital Forensik
Keywords:
Cybersecurity, Digital Forensics, Online Business, Incident AnalysisAbstract
The rapid advancement of information technology has significantly accelerated the growth of online businesses; however, it has concurrently increased the risks associated with cybersecurity. Online enterprises face serious challenges from threats such as customer data theft, unauthorized access to transaction systems, phishing attacks, and the misuse or manipulation of digital information. This study aims to conduct a comprehensive analysis of cybersecurity breach incidents in online business environments by employing digital forensic methods as the primary approach for the identification, collection, and analysis of digital evidence. The investigative process follows a systematic procedure, including stages of identification, preservation, collection, analysis, and presentation of evidence, in accordance with established principles of digital forensics. The findings demonstrate that the application of digital forensic techniques is highly effective in revealing attack patterns, tracing the sources of cyber threats, detecting vulnerabilities, and ensuring the integrity and confidentiality of transaction data and customer information. These results provide a valuable foundation for developing robust strategies to respond to cybersecurity incidents, enhance preventive measures, and strengthen overall information security systems in online business operations.
References
Aghili, S., Khaleghi, A. & Dehghantanha, A., 2020. Network Attacks Classification for Network Forensics Investigation. Journal of Cybersecurity and Digital Forensics, 8(2), pp.45–60.
Baryamureeba, V. & Tushabe, F., 2004. The Enhanced Digital Investigation Process Model. Digital Forensics Research Workshop, pp.1–12.
Bejtlich, R., 2013. The Practice of Network Security Monitoring: Understanding Incident Detection and Response. 2nd ed. Boston: No Starch Press.
Casey, E., 2011. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. 3rd ed. Waltham: Academic Press.
Chandola, V., Banerjee, A. & Kumar, V., 2020. Anomaly Detection for Cybersecurity: A Machine Learning Perspective. ACM Computing Surveys, 50(3), pp.1–36.
ENISA, 2022. ENISA Threat Landscape 2022. [online] Available at: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022 [Accessed 30 December 2025].
Grispos, G., Storer, T. & Glisson, W., 2014. Using Anti-Forensics Techniques to Avoid Detection of Malicious Activities in Digital Investigations. Computers & Security, 45, pp.91–106.
Kshetri, N., 2017. Cybersecurity Issues in E-Commerce. In: N. Kshetri, ed. The Economics of Cybersecurity. Cham: Springer, pp.13–28.
Kumar, S., Sharma, P. & Singh, R., 2021. Cybersecurity in Online Businesses: Threats, Challenges, and Digital Forensic Approaches. Journal of Information Security, 12(3), pp.112–126.
Laudon, K.C. & Traver, C.G., 2020. E-commerce 2020: Business, Technology, Society. 16th ed. Boston: Pearson.
Nelson, B., Phillips, A. & Steuart, C., 2014. Guide to Computer Forensics and Investigations. 5th ed. Boston: Cengage Learning.
Raghavan, S. & Parthasarathy, S., 2019. Digital Forensics for Cybersecurity. New York: Springer.
Raghavan, S. & Thuraisingham, B., 2019. Digital Forensics for Network and Database Security. Springer.
Von Solms, R. & Van Niekerk, J., 2013. From Information Security to Cyber Security. Computers & Security, 38, pp.97–102.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Ahmad Albar, Tata Sutabri

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

PUBLICATION ETHICS
FOCUS AND SCOPE
EDITORIAL TEAM
REVIEW PROCESS
CONTACT US
AUTHOR GUIDELINES




