Keefektifan Metode Proteksi Data dalam Mengatasi Ancaman Cybersecurity

Authors

  • Arfan Dwi Madya Universitas Bhayangkara Jakarta Raya
  • Bagas Djoko Haryanto Universitas Bhayangkara Jakarta Raya
  • Devi Putri Ningsih Universitas Bhayangkara Jakarta Raya
  • Fried Sinlae Universitas Bhayangkara Jakarta Raya

DOI:

https://doi.org/10.60076/indotech.v1i3.236

Keywords:

Data protection, Cyber threats, Cybersecurity

Abstract

Information security has become a primary concern in the current digital era, where the threat of cyber attacks is on the rise. This article discusses the significant growth of internet users and its impact on the increasing incidence of cyber attacks, with a focus on the situation in Indonesia. Data indicates a drastic surge in cyber attacks in Indonesia, reaching approximately 190 million attempts in 2020. Recognizing the importance of a national cyber security strategy, this research aims to evaluate the effectiveness of data protection methods in addressing cybersecurity threats. The research methodology employs a qualitative descriptive approach to explore and understand the effectiveness of data protection methods. Data analysis is conducted holistically to comprehend the context and dynamics influencing the success of data protection methods in facing cybersecurity threats. The research findings emphasize the crucial role of cyber security in safeguarding data, privacy, and the smooth operation of services. Cyber threats encompass various types, including physical, logical, and operational threats. Human factors also pose a serious threat, including user errors and social engineering techniques. Data protection is identified as a key strategy in tackling cybersecurity threats. Measures such as malware detection, defense against DoS and phishing attacks, database security, data encryption, monitoring and response to attacks, as well as education and training, are highlighted as primary focuses for the banking sector

Downloads

Download data is not yet available.

References

B. Alhayani, H. J. Mohammed, I. Z. Chaloob, and J. S. Ahmed, “Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry,” in Materials Today: Proceedings, Elsevier BV, Mar. 2021, pp. 1–6. doi: 10.1016/j.matpr.2021.02.531.

M. Bada and J. R. C. Nurse, “The social and psychological impact of cyberattacks,” in Emerging Cyber Threats and Cognitive Vulnerabilities, Elsevier, 2019, pp. 73–92. doi: 10.1016/B978-0-12-816203-3.00004-6.

E. Budi, D. Wira, and A. Infantono, “Strategi Penguatan Cyber Security Guna Mewujudkan Keamanan Nasional di Era Society 5.0,” in Prosiding Seminar Nasional Sains Teknologi dan Inovasi Indonesia (SENASTINDO), Akademi Angkatan Udara, Dec. 2021, pp. 223–234. doi: 10.54706/senastindo.v3.2021.141.

P. I. D. C. Wulan, D. P. Perdana, A. A. Kurniawan, and R. Fauzi, “Sosialisasi Cyber Security Awareness untuk meningkatkan literasi digital di SMK N 2 Salatiga,” KACANEGARA Jurnal Pengabdian pada Masyarakat, vol. 5, no. 2, pp. 213–218, May 2022, doi: 10.28989/kacanegara.v5i2.1204.

N. A. A. Rahman, I. H. Sairi, N. A. M. Zizi, and F. Khalid, “The importance of cybersecurity education in school,” International Journal of Information and Education Technology, vol. 10, no. 5, pp. 378–382, May 2020, doi: 10.18178/ijiet.2020.10.5.1393.

A. T. Tunggal, “Why is Cybersecurity Important?” Accessed: Dec. 26, 2023. [Online]. Available: https://www.upguard.com/blog/cybersecurity-important

Y. Samudra, A. Hidayat, and M. F. Wahyu, “Pengenalan Cyber Security Sebagai Fundamental Keamanan Data Pada Era Digital,” AMMA : Jurnal Pengabdian Masyarakat, vol. 1, no. 12, pp. 1594–1601, 2023, [Online]. Available: https://journal.mediapublikasi.id/index.php/amma

K. N. Isnaini, D. F. Sulistiyani, and M. Sutrisno, “Data Security Awareness sebagai Upaya Peningkatan Literasi Tentang Cyber Attacks dan Threats,” JPMB: Jurnal Pemberdayaan Masyarakat Berkarakter , vol. 3, no. 2, pp. 121–132, 2020.

M. O. Hoshmand and S. Ratnawati, “Analisis Keamanan Infrastruktur Teknologi Informasi dalam Menghadapi Ancaman Cybersecurity,” AICOMS: Applied Information Technology and Computer Science, vol. 2, no. 2, pp. 9–18, 2023, [Online]. Available: https://jurnal.politap.ac.id/index.php/aicoms

D. Ghelani, T. Kian Hua, S. Kumar, and R. Koduru, “Cyber Security Threats, Vulnerabilities, and Security Solutions Models in Banking,” American Journal of Computer Science and Technology, pp. 1–10, 2022, doi: 10.22541/au.166385206.63311335/v1.

M. Z. Gunduz and R. Das, “Cyber-security on smart grid: Threats and potential solutions,” Elsevier - Computer Networks, vol. 169, Mar. 2020, doi: 10.1016/j.comnet.2019.107094.

H. Tao et al., “Economic perspective analysis of protecting big data security and privacy,” Future Generation Computer Systems, vol. 98, pp. 660–671, Sep. 2019, doi: 10.1016/j.future.2019.03.042

Downloads

Published

2023-12-28

How to Cite

Arfan Dwi Madya, Bagas Djoko Haryanto, Devi Putri Ningsih, & Fried Sinlae. (2023). Keefektifan Metode Proteksi Data dalam Mengatasi Ancaman Cybersecurity. Indonesian Journal of Education And Computer Science, 1(3), 127–135. https://doi.org/10.60076/indotech.v1i3.236