Analisis dan Peningkatan Keamanan Cyber: Studi Kasus Ancaman dan Solusi dalam Lingkungan Digital Untuk Mengamankan Objek Vital dan File
DOI:
https://doi.org/10.47861/sammajiva.v1i2.226Keywords:
Risk Management, Cybersecutity, Potential ThreatsAbstract
The threat to vital objects and file security is rapidly evolving. Cybercriminals are becoming more cunning and skilled at exploiting security vulnerabilities in digital systems. In order to enhance cybersecurity, a thorough analysis of the threats faced in the digital environment and the applicable solutions is necessary. The objectives of this research are to analyze vital objects, identify key challenges in protecting them from cyber attacks, evaluate and propose measures and strategies to improve file security, and examine case studies related to threats and solutions in the digital environment.This research adopts a qualitative approach using interview and observation techniques. Potential cybercrime threats in Indonesia include hacking, cracking, cyber sabotage, and spyware. The risk management process involves identifying, assessing, treating, and controlling risks. To anticipate these threats, it is essential to have technology experts who support the development of advanced national defense systems and establish a cybersecurity command center.
References
Anderson, R., & Moore, T. (2019). Why Crypto Tokens Matter: How to Ensure Security in the Internet of Things. Harvard Business Review. Retrieved from https://hbr.org/2019/01/why-crypto-tokens-matter
Buchholz, R. A. (2019). Secure Coding in C and C++. CRC Press.
Connolly, L. Y., & Wall, D. S. (2019). The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures.Computers & Security,87, 101568.
Denning, D. E. (2016). The Ethics of Cyber Conflict. Journal of Military Ethics, 15(4), 299-314.
Dhillon, G., & Backhouse, J. (2001). Information system security management in the new millennium. Communications of the ACM, 44(4), 125-128.
Duffield, A., Whitty, M. T., & Greenhill, A. (2019). Cyber Threats and Cyber Self-Defence for the Individual. Computers & Security, 83, 259-273.
Fatani, A., Dahou, A., Al-Qaness, M. A., Lu, S., & Abd Elaziz, M. (2022). Advanced feature extraction and selection approach using deep learning and Aquila optimizer for IoT intrusion detection system.Sensors,22(1), 140.
Goel, S., & Chen, Y. (2019). Machine Learning for Cybersecurity. CRC Press.
Khan, K., & Malluhi, Q. M. (2017). Cybersecurity: The Essential Body of Knowledge. CRC Press.
Kuzmenko, O. V., Dotsenko, T. V., & Skrynka, L. O. (2021). Economic and Mathematical Modelling of the Effectiveness of the National System for Countering Cyber Fraud and Criminal Proceeds Legalisation Based on Survival Analysis Methods. Scientific Bulletin of Mukachevo State University. Series “Economics, 8(1), 144-153.
Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments.Energy Reports,7, 8176-8186.
Luiijf, E., & Nieuwenhuis, L. J. M. (2019). Cyber Security as Competitive Advantage. Journal of Cyber Policy, 4(2), 161-178.
Mitnick, K. D., & Simon, W. L. (2017). The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data. Little, Brown and Company.
Moore, T., & Chatterjee, S. (2018). The Quantified Employee: A Study of Employee Monitoring in the Digital Workplace. European Journal of Information Systems, 27(3), 251-267.
Ponemon Institute. (2020). Cost of a Data Breach Report 2020. Retrieved from https://www.ibm.com/security/data-breach
Sari, N. W. (2018). Kejahatan cyber dalam perkembangan teknologi informasi berbasis komputer. Jurnal Surya Kencana Data Dinamika Masalah Hukum dan Keadilan. 5(2): 577-592
Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W. W. Norton & Company.
Solms, R. V., & Solms, K. (2020). An Analysis of the Human Aspect of Cybersecurity in Organizations: An Exploratory Study. Computers & Security, 95, 101889.
Symantec Corporation. (2020). Internet Security Threat Report 2020. Retrieved from https://www.symantec.com/security-center/threat-report