[vc_empty_space][vc_empty_space]
Digital security reference model: A survey and proposal
Suhardia, Aziz B.a, Doss R.b, Yustianto P.a
a Institut Teknologi Bandung, School of Electrical Engineering and Informatics, Bandung, Indonesia
b Deakin University, School of Information Technology, Melbourne, Australia
[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2020 IEEE.This paper presents a survey and proposal of a digital security reference model. The proposed reference model consists of three layers: technology and engineering layer, management layer, and legal layer. The first layer focuses on technologies and engineering processes to build a secure digital system. Then, the second layer is all about management or organizational procedures. Finally, the last layer consists of compliance with existing laws and regulations. The correlation between each layer is, first, focusing on the technology and engineering layer to get anything to build an organization’s secure digital system. Then, create policies for all parties of the organizations. Last, make sure all of the technology used and procedures applied complied with the existing law. The last layer also has a role as if security breach success penetrates the two previous layers. The next is digital forensics to reveal the cyber incident and punish the criminals by the existing law. In general, this proposed reference model aims to guide organizations, companies, and governments in developing a secure digital system with a comprehensive perspective. In particular, the reference model has two use case actors, engineers, and researchers. For the engineer, this reference model guides to starting and developing a digital security system. There are five steps to creating a secure digital system using this reference model: preparation, specifications, system design, implementation, and evaluation. For the researcher, this reference model gives a comprehensive understanding. So the researcher gets a big picture of the secure digital system’s research field before starting the research. After it, the researcher determines which topic they want.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Digital security,Digital system,Engineering process,Laws and regulations,Management layer,Reference modeling,Research fields,Security breaches[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]A body of knowledge,Cybersecurity,Digital security,Information security,Legal layer,Managerial layer,Reference model,Technology layer[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICITSI50517.2020.9264912[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]