Analisis Keamanan Jaringan dan Perlindungan Data Terhadap Serangan Siber di Perusahaan Luar Sekolah
(1) Universitas Pendidikan Indonesia Kampus Daerah Purwakarta, Indonesia
(2) Universitas Pendidikan Indonesia Kampus Daerah Purwakarta, Indonesia
(*) Corresponding Author
Abstract
Threats to vital objects and file security are growing rapidly. Cybercriminals are becoming more cunning and skilled at exploiting security vulnerabilities in digital systems. To improve cybersecurity, a thorough analysis of the threats faced in the digital environment and applicable solutions is required. The aim of this research is to analyze vital objects, identify the main challenges in protecting them from cyber attacks on personal data in Out-of-School companies. The research method uses a qualitative approach using interview and observation techniques. Potential cybercrime threats in Indonesia include hacking, cracking, cyber sabotage and spyware. The risk management process involves identifying, assessing, addressing and controlling risks. To anticipate these threats, technological experts are needed to support the development of advanced national defense systems and establish a cyber security command center.
Full Text:
PDFReferences
Y. A. Piliang, “Posmodernisme Dan Ekstasi Komunikasi,” Mediator: Jurnal Komunikasi, Vol. 2, No. 2, 2001.
S. Kemp, “Digital 2021: The Latest Insights Into The ‘State Of Digital’ - We Are Social Uk.” Accessed: Mar. 01, 2024. [Online]. Available: Https://Wearesocial.Com/Uk/Blog/2021/01/Digital-2021-The-Latest-Insights-Into-The-State-Of-Digital/
N. W. Sari, “Kejahatan Cyber Dalam Perkembangan Teknologi Informasi Berbasis Komputer,” Jurnal Surya Kencana Dua: Dinamika Masalah Hukum Dan Keadilan, Vol. 5, No. 2, Pp. 577–593, 2018.
J. W. Creswell And J. D. Creswell, Research Design Qualitative, Quantitative, And Mixed Methods Approaches, No. 2. Sage, 2004. [Online]. Available: Https://Eur-Lex.Europa.Eu/Legal-Content/Pt/Txt/Pdf/?Uri=Celex:32016r0679&From=Pt%0ahttp://Eur-Lex.Europa.Eu/Lexuriserv/Lexuriserv.Do?Uri=Celex:52012pc0011:Pt:Not
Sugiyono, Metode Penelitian Kuantitatif, Kualitatif, Dan R&D ( 2nd Ed). 2019.
P. A. Adler, The Sage Handbook Of Qualitative Research, 5th Ed. Sage, 1994.
N. Muhadjir, Metodologi Penelitian Kualitatif, 3rd Ed. Rakesarasin, 1996.
S. Azwar, Metode Penelitian. Pustaka Pelajar, 1998.
S. Arikunto, Prosedur Penelitian. Pt. Rineka Cipta, 2016.
A. H. Hanafi, Metodologi Penelitian Bahasa: Untuk Penelitian, Tesis, Dan Disertasi. Diadit Media Press, 2011.
L. Siagian, A. Budiarto, And Simatupang, “The Role Of Cyber Security In Overcome Negative Contents To Realize National Information Resilience,” Jurnal Peperangan Asimetris, Vol. 4, No. 3, Pp. 1–18, 2018.
I. Rahmawati, “The Analysis Of Cyber Crime Threat Risk Management To Increase Cyber Defense,” Jurnal Pertahanan Dan Bela Negara, Vol. 7, No. 2, Pp. 55–70, 2017, [Online]. Available: Https://News.Detik.Com/
M. A. Lingga And B. P. Jatmiko, “Penyalahgunaan Data Pribadi Konsumen Sudah Masuk Katagori Gawat Darurat.” Accessed: Mar. 01, 2024. [Online]. Available: Https://Money.Kompas.Com/Read/2019/07/27/201200426/Penyalahgunaan-Data-Pribadi-Konsumen-Sudah-Masuk-Katagori-Gawat-Darurat#Google_Vignette
D. Napitupulu, “Kajian Peran Cyber Law Dalam Memperkuat Keamanan Sistem Informasi Nasional,” Deviance Jurnal Kriminologi, Vol. 1, No. 1, Pp. 100–113, 2017.
DOI: https://doi.org/10.30645/kesatria.v5i2.372
DOI (PDF): https://doi.org/10.30645/kesatria.v5i2.372.g369
Refbacks
- There are currently no refbacks.
Published Papers Indexed/Abstracted By: