Peningkatan Keamanan Sistem Informasi Melalui Klasifikasi Serangan Terhadap Sistem Informasi
DOI:
https://doi.org/10.32815/jitika.v14i2.452Keywords:
klasifikasi, serangan, sistem informasi, keamananAbstract
Nowadays, many information systems were developed to ease human life. This massive explosion of information systems attracts many attackers to get the valued data inside the information systems. There are many interesting data was held inside the information systems from personal ID Card number to bank accounts. That's why security must be involved in information systems development in the first place. This research study attacks to information systems and classified it into information system components. As a result, there are many attacks on every information system components. This research also gives advises to securing the information system from every information systems components.
Downloads
References
Babate, A., Musa, M., Kida, A., & Saidu, M. (2015). State of Cyber Security: Emerging Threats Landscape. International Journal of Advanced Research in Computer Science & Technology, 113-119.
Agarwal, M., Biswas, S., & Nandi, S. (2018). An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack. International Journal of Wireless Information Networks.
Akamai. (2018). State of Te Internet: Security - Web Attack Report Infographic, 2018. Akamai.
AL-FEDAGHI, S., & Alsumait, O. (2019). Towards a conceptual foundation for physical security: Case study of an it department. International Journal of Safety and Security Engineering, 137-156.
Alves, T., & Morris, T. (2018). Hardware-based Cyber Threats. ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy, 259-266.
Bloom, G., Leontie, E., Narahari, B., & Simha, R. (2012). Hardware and Security: Vulnerabilities and Solutions. In S. K. Das, K. Kant, & N. Zhang, Handbook on Securing Cyber-Physical Critical Infrastructure (pp. 305-331). Elsevier.
Gens, D. (2018). OS-Level Attacks and Defenses : From Software to Hardware-Based Exploits. Technische Universität Darmstadt.
Group, A. P. (2020). Phishing Activity Trends Report, 4th Quarter 2019. APWG.
ID-SIRTII. (2018). Laporan Tahunan ID-SIRTII. ID-SIRTII.
Indonesia, P. (2008). Undang - Undang No. 11. Jakarta: Sekretariat Negara.
Jaafar, G. A., Abdullah, S. M., & Ismail, S. (2019). Review of recent detection methods for HTTP DDoS attack. Journal of Computer Networks and Communications, 1-10.
Kee, W. J., Kadir, M. A., Wahab, F. A., Mohamad, A. H., Mohamad, A. M., & Abidin, A. F. (2018). A Review on Spectre Attacks and Meltdown with its Mitigation Techniques. International Journal of Engineering & Technology 7, 209-213.
Kocher, P. H. (2019). Spectre attacks: Exploiting speculative execution. 2019 IEEE Symposium on Security and Privacy (SP), 1-19.
Kothari, H., Suwalka, A. K., & Kumar, D. (2019). Various Database Attacks, Approaches and Countermeasures To Database Security. International Journal of Advance Research in Computer Science and Management, 357-362.
Kovačić, S., Đulić, E., & Šehidić, A. (2017). Improving the Security of Access to Network Resources Using the 802.1x Standard in Wired and Wireless Environments. 22nd Internacionalna Naučno-Stručna Konferencija Informacione Tehnologije 2017.
Mohammed, D., & Mohammed, S. (2017). Survey of Information Security Risk Management Models. International Journal of Business, Humanities and Technology, 23-26.
Moustafa, K., & Lalia, S. (2019). Implementation of Web Browser Extension for Mitigating CSRF Attack. WorldCIST'19 2019. Advances in Intelligent Systems and Computing (pp. 867-880). Springer.
Niakanlahiji, A., & Jafarian, J. H. (2019). WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense. Security and Communication Networks Volume 2019, 1-13.
O.P, V., O.S, Y., & L.M., K. (2016). SQL Injection Prevention System. 2016 International Conference Radio Electronics & InfoCommunications.
O'Brien, J. A., & Marakas, G. M. (2017). Introduction to Information System. McGraw Hill.
Safianu, O., Twum, F., & Hayfron-Acquah, J. (2016). Information System Security Threats and Vulnerabilities: Evaluating the Human Factor in Data Protection. International Journal of Computer Applications, 8-14.
Salamatian, S., Huleihel, W., Beirami, A., Cohen, A., & Medard, M. (2019). Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization. IEEE Transactions on Information Forensics and Security, vol. 14, no. 9, 2288-2299.
Sharma, P. (2016). Database Security: Attacks and Techniques. International Journal of Scientific & Engineering Research, Volume 7, Issue 12, 313-318.
SophosLab. (2013). Security Threat Report. SophosLab.
Tang, A., Sethumadhavan, S., & Stolfo, S. (2017). CLKSCREW: Exposing the Perils of Security Oblivious Energy Management. 26th USENIX Security Symposium (pp. 1057-1074). Vancouver, BC, Canada: USENIX Association.
Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proceedings of the IEEE (pp. 1727-1765). IEEE.
Downloads
Published
How to Cite
Issue
Section
License
Penulis mengirimkan naskah dan pengertian bahwa jika diterima untuk proses dipublikasi, hak cipta dari artikel tersebut akan diberikan kepada jurnal ilmiah teknologi informasi asia. Jurnal ilmiah teknologi informasi asia (Jitika) dan Lp2m Stmik Asia Malang sebagai penerbit jurnal, komponen Hak cipta mencakup hak untuk mereproduksi dan mengirimkan artikel dalam semua bentuk dan media, termasuk cetak ulang, foto, mikrofilm, dan reproduksi serupa lainnya, serta terjemahannya.
Jurnal ilmiah teknologi infomasi asia, dan Lp2m ITB Asia Malang, beserta jajaran para redaksi berusaha keras untuk memastikan bahwa tidak ada data, opini, atau pernyataan yang salah atau menyesatkan ketika dipublikasikan di jurnal Jitika, dengan kondisi apapun, isi artikel dan iklan yang diterbitkan di Jurnal ilmiah teknologi infomasi asia adalah murni merupakan tanggung jawab masing-masing penulis dan pengiklan. Pengguna situs web ini akan dilisensikan dengan menggunakan materi dari situs web ini setelah Lisensi Internasional Creative Commons Attribution 4.0. Tidak ada biaya yang dibebankan. Silakan gunakan materi yang sesuai.
Anda bebas untuk:
Bagikan - salin dan sebarkan materi dalam media atau format apa pun.
Adaptasi - remix, transformasikan, dan bangun berdasarkan materi untuk tujuan apa pun, bahkan secara komersial.
Pemberi lisensi tidak dapat mencabut kebebasan ini selama Anda mengikuti ketentuan lisensi