Keefektifan Metode Proteksi Data dalam Mengatasi Ancaman Cybersecurity
DOI:
https://doi.org/10.60076/indotech.v1i3.236Keywords:
Data protection, Cyber threats, CybersecurityAbstract
Information security has become a primary concern in the current digital era, where the threat of cyber attacks is on the rise. This article discusses the significant growth of internet users and its impact on the increasing incidence of cyber attacks, with a focus on the situation in Indonesia. Data indicates a drastic surge in cyber attacks in Indonesia, reaching approximately 190 million attempts in 2020. Recognizing the importance of a national cyber security strategy, this research aims to evaluate the effectiveness of data protection methods in addressing cybersecurity threats. The research methodology employs a qualitative descriptive approach to explore and understand the effectiveness of data protection methods. Data analysis is conducted holistically to comprehend the context and dynamics influencing the success of data protection methods in facing cybersecurity threats. The research findings emphasize the crucial role of cyber security in safeguarding data, privacy, and the smooth operation of services. Cyber threats encompass various types, including physical, logical, and operational threats. Human factors also pose a serious threat, including user errors and social engineering techniques. Data protection is identified as a key strategy in tackling cybersecurity threats. Measures such as malware detection, defense against DoS and phishing attacks, database security, data encryption, monitoring and response to attacks, as well as education and training, are highlighted as primary focuses for the banking sector
Downloads
References
B. Alhayani, H. J. Mohammed, I. Z. Chaloob, and J. S. Ahmed, “Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry,” in Materials Today: Proceedings, Elsevier BV, Mar. 2021, pp. 1–6. doi: 10.1016/j.matpr.2021.02.531.
M. Bada and J. R. C. Nurse, “The social and psychological impact of cyberattacks,” in Emerging Cyber Threats and Cognitive Vulnerabilities, Elsevier, 2019, pp. 73–92. doi: 10.1016/B978-0-12-816203-3.00004-6.
E. Budi, D. Wira, and A. Infantono, “Strategi Penguatan Cyber Security Guna Mewujudkan Keamanan Nasional di Era Society 5.0,” in Prosiding Seminar Nasional Sains Teknologi dan Inovasi Indonesia (SENASTINDO), Akademi Angkatan Udara, Dec. 2021, pp. 223–234. doi: 10.54706/senastindo.v3.2021.141.
P. I. D. C. Wulan, D. P. Perdana, A. A. Kurniawan, and R. Fauzi, “Sosialisasi Cyber Security Awareness untuk meningkatkan literasi digital di SMK N 2 Salatiga,” KACANEGARA Jurnal Pengabdian pada Masyarakat, vol. 5, no. 2, pp. 213–218, May 2022, doi: 10.28989/kacanegara.v5i2.1204.
N. A. A. Rahman, I. H. Sairi, N. A. M. Zizi, and F. Khalid, “The importance of cybersecurity education in school,” International Journal of Information and Education Technology, vol. 10, no. 5, pp. 378–382, May 2020, doi: 10.18178/ijiet.2020.10.5.1393.
A. T. Tunggal, “Why is Cybersecurity Important?” Accessed: Dec. 26, 2023. [Online]. Available: https://www.upguard.com/blog/cybersecurity-important
Y. Samudra, A. Hidayat, and M. F. Wahyu, “Pengenalan Cyber Security Sebagai Fundamental Keamanan Data Pada Era Digital,” AMMA : Jurnal Pengabdian Masyarakat, vol. 1, no. 12, pp. 1594–1601, 2023, [Online]. Available: https://journal.mediapublikasi.id/index.php/amma
K. N. Isnaini, D. F. Sulistiyani, and M. Sutrisno, “Data Security Awareness sebagai Upaya Peningkatan Literasi Tentang Cyber Attacks dan Threats,” JPMB: Jurnal Pemberdayaan Masyarakat Berkarakter , vol. 3, no. 2, pp. 121–132, 2020.
M. O. Hoshmand and S. Ratnawati, “Analisis Keamanan Infrastruktur Teknologi Informasi dalam Menghadapi Ancaman Cybersecurity,” AICOMS: Applied Information Technology and Computer Science, vol. 2, no. 2, pp. 9–18, 2023, [Online]. Available: https://jurnal.politap.ac.id/index.php/aicoms
D. Ghelani, T. Kian Hua, S. Kumar, and R. Koduru, “Cyber Security Threats, Vulnerabilities, and Security Solutions Models in Banking,” American Journal of Computer Science and Technology, pp. 1–10, 2022, doi: 10.22541/au.166385206.63311335/v1.
M. Z. Gunduz and R. Das, “Cyber-security on smart grid: Threats and potential solutions,” Elsevier - Computer Networks, vol. 169, Mar. 2020, doi: 10.1016/j.comnet.2019.107094.
H. Tao et al., “Economic perspective analysis of protecting big data security and privacy,” Future Generation Computer Systems, vol. 98, pp. 660–671, Sep. 2019, doi: 10.1016/j.future.2019.03.042
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Arfan Dwi Madya, Bagas Djoko Haryanto, Devi Putri Ningsih

This work is licensed under a Creative Commons Attribution 4.0 International License.


















