Analisis dan Peningkatan Keamanan Cyber: Studi Kasus Ancaman dan Solusi dalam Lingkungan Digital Untuk Mengamankan Objek Vital dan File

Authors

  • Edy Soesanto Universitas Bhayangkara Jakarta Raya
  • Achmad Romadhon Universitas Bhayangkara Jakarta Raya
  • Bima Dwi Mardika Universitas Bhayangkara Jakarta Raya
  • Moch Fahmi Setiawan Universitas Bhayangkara Jakarta Raya

DOI:

https://doi.org/10.47861/sammajiva.v1i2.226

Keywords:

Risk Management, Cybersecutity, Potential Threats

Abstract

The threat to vital objects and file security is rapidly evolving. Cybercriminals are becoming more cunning and skilled at exploiting security vulnerabilities in digital systems. In order to enhance cybersecurity, a thorough analysis of the threats faced in the digital environment and the applicable solutions is necessary. The objectives of this research are to analyze vital objects, identify key challenges in protecting them from cyber attacks, evaluate and propose measures and strategies to improve file security, and examine case studies related to threats and solutions in the digital environment.This research adopts a qualitative approach using interview and observation techniques. Potential cybercrime threats in Indonesia include hacking, cracking, cyber sabotage, and spyware. The risk management process involves identifying, assessing, treating, and controlling risks. To anticipate these threats, it is essential to have technology experts who support the development of advanced national defense systems and establish a cybersecurity command center.

 

 

References

Anderson, R., & Moore, T. (2019). Why Crypto Tokens Matter: How to Ensure Security in the Internet of Things. Harvard Business Review. Retrieved from https://hbr.org/2019/01/why-crypto-tokens-matter

Buchholz, R. A. (2019). Secure Coding in C and C++. CRC Press.

Connolly, L. Y., & Wall, D. S. (2019). The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures.Computers & Security,87, 101568.

Denning, D. E. (2016). The Ethics of Cyber Conflict. Journal of Military Ethics, 15(4), 299-314.

Dhillon, G., & Backhouse, J. (2001). Information system security management in the new millennium. Communications of the ACM, 44(4), 125-128.

Duffield, A., Whitty, M. T., & Greenhill, A. (2019). Cyber Threats and Cyber Self-Defence for the Individual. Computers & Security, 83, 259-273.

Fatani, A., Dahou, A., Al-Qaness, M. A., Lu, S., & Abd Elaziz, M. (2022). Advanced feature extraction and selection approach using deep learning and Aquila optimizer for IoT intrusion detection system.Sensors,22(1), 140.

Goel, S., & Chen, Y. (2019). Machine Learning for Cybersecurity. CRC Press.

Khan, K., & Malluhi, Q. M. (2017). Cybersecurity: The Essential Body of Knowledge. CRC Press.

Kuzmenko, O. V., Dotsenko, T. V., & Skrynka, L. O. (2021). Economic and Mathematical Modelling of the Effectiveness of the National System for Countering Cyber Fraud and Criminal Proceeds Legalisation Based on Survival Analysis Methods. Scientific Bulletin of Mukachevo State University. Series “Economics, 8(1), 144-153.

Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments.Energy Reports,7, 8176-8186.

Luiijf, E., & Nieuwenhuis, L. J. M. (2019). Cyber Security as Competitive Advantage. Journal of Cyber Policy, 4(2), 161-178.

Mitnick, K. D., & Simon, W. L. (2017). The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data. Little, Brown and Company.

Moore, T., & Chatterjee, S. (2018). The Quantified Employee: A Study of Employee Monitoring in the Digital Workplace. European Journal of Information Systems, 27(3), 251-267.

Ponemon Institute. (2020). Cost of a Data Breach Report 2020. Retrieved from https://www.ibm.com/security/data-breach

Sari, N. W. (2018). Kejahatan cyber dalam perkembangan teknologi informasi berbasis komputer. Jurnal Surya Kencana Data Dinamika Masalah Hukum dan Keadilan. 5(2): 577-592

Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W. W. Norton & Company.

Solms, R. V., & Solms, K. (2020). An Analysis of the Human Aspect of Cybersecurity in Organizations: An Exploratory Study. Computers & Security, 95, 101889.

Symantec Corporation. (2020). Internet Security Threat Report 2020. Retrieved from https://www.symantec.com/security-center/threat-report

Downloads

Published

2023-06-07

How to Cite

Edy Soesanto, Achmad Romadhon, Bima Dwi Mardika, & Moch Fahmi Setiawan. (2023). Analisis dan Peningkatan Keamanan Cyber: Studi Kasus Ancaman dan Solusi dalam Lingkungan Digital Untuk Mengamankan Objek Vital dan File. Sammajiva: Jurnal Penelitian Bisnis Dan Manajemen, 1(2), 172–191. https://doi.org/10.47861/sammajiva.v1i2.226

Most read articles by the same author(s)

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.