Peningkatan Keamanan Sistem Informasi Melalui Klasifikasi Serangan Terhadap Sistem Informasi

Penulis

  • Johan Ericka Wahyu Prakasa UIN Maulana Malik Ibrahim Malang

DOI:

https://doi.org/10.32815/jitika.v14i2.452

Kata Kunci:

klasifikasi, serangan, sistem informasi, keamanan

Abstrak

Semakin berkembangnya sistem informasi dewasa ini diikuti dengan peningkatan serangan terhadapsistem informasi. Hal ini disebabkan semakin banyak sistem informasi yang menyimpan data – data sensitif penggunanya seperti nomor telepon, Nomor Induk Kependudukan, tanggal lahir bahkan sampai nomor rekening bank. Data – data tersebut sangat rawan untuk di salah gunakan oleh pihak – pihak yang tidak bertanggung jawab. Maka keamanan merupakan salah satu faktor yang harus menjadi pertimbangan utama dalam pengembangan sistem informasi. Penelitian ini mempelajari berbagai teknik serangan kepada sistem informasi.Untuk memudahkan identifikasi, serangan serangan tersebut di klasifikasikan berdasarkan komponen penyusun sistem informasi. Hasil dari penelitian ini menunjukkan bahwa terdapat serangan yang ditujukan pada setiap komponen penyusun sistem informasi. Di akhir penelitian ini memberikan saran untuk meminimalisir dampak dari serangan serta untuk meningkatkan keamanan sistem informasi.

Unduhan

Data unduhan belum tersedia.

Referensi

Ali, M., Husain, D., & Sharma, M. (2017). A study on Emerging Cyber Technologies, Threats and Prevention in Information Security. IOSR Journal of Computer Engineering, 49-54.
Babate, A., Musa, M., Kida, A., & Saidu, M. (2015). State of Cyber Security: Emerging Threats Landscape. International Journal of Advanced Research in Computer Science & Technology, 113-119.
Agarwal, M., Biswas, S., & Nandi, S. (2018). An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack. International Journal of Wireless Information Networks.
Akamai. (2018). State of Te Internet: Security - Web Attack Report Infographic, 2018. Akamai.
AL-FEDAGHI, S., & Alsumait, O. (2019). Towards a conceptual foundation for physical security: Case study of an it department. International Journal of Safety and Security Engineering, 137-156.
Alves, T., & Morris, T. (2018). Hardware-based Cyber Threats. ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy, 259-266.
Bloom, G., Leontie, E., Narahari, B., & Simha, R. (2012). Hardware and Security: Vulnerabilities and Solutions. In S. K. Das, K. Kant, & N. Zhang, Handbook on Securing Cyber-Physical Critical Infrastructure (pp. 305-331). Elsevier.
Gens, D. (2018). OS-Level Attacks and Defenses : From Software to Hardware-Based Exploits. Technische Universität Darmstadt.
Group, A. P. (2020). Phishing Activity Trends Report, 4th Quarter 2019. APWG.
ID-SIRTII. (2018). Laporan Tahunan ID-SIRTII. ID-SIRTII.
Indonesia, P. (2008). Undang - Undang No. 11. Jakarta: Sekretariat Negara.
Jaafar, G. A., Abdullah, S. M., & Ismail, S. (2019). Review of recent detection methods for HTTP DDoS attack. Journal of Computer Networks and Communications, 1-10.
Kee, W. J., Kadir, M. A., Wahab, F. A., Mohamad, A. H., Mohamad, A. M., & Abidin, A. F. (2018). A Review on Spectre Attacks and Meltdown with its Mitigation Techniques. International Journal of Engineering & Technology 7, 209-213.
Kocher, P. H. (2019). Spectre attacks: Exploiting speculative execution. 2019 IEEE Symposium on Security and Privacy (SP), 1-19.
Kothari, H., Suwalka, A. K., & Kumar, D. (2019). Various Database Attacks, Approaches and Countermeasures To Database Security. International Journal of Advance Research in Computer Science and Management, 357-362.
Kovačić, S., Đulić, E., & Šehidić, A. (2017). Improving the Security of Access to Network Resources Using the 802.1x Standard in Wired and Wireless Environments. 22nd Internacionalna Naučno-Stručna Konferencija Informacione Tehnologije 2017.
Mohammed, D., & Mohammed, S. (2017). Survey of Information Security Risk Management Models. International Journal of Business, Humanities and Technology, 23-26.
Moustafa, K., & Lalia, S. (2019). Implementation of Web Browser Extension for Mitigating CSRF Attack. WorldCIST'19 2019. Advances in Intelligent Systems and Computing (pp. 867-880). Springer.
Niakanlahiji, A., & Jafarian, J. H. (2019). WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense. Security and Communication Networks Volume 2019, 1-13.
O.P, V., O.S, Y., & L.M., K. (2016). SQL Injection Prevention System. 2016 International Conference Radio Electronics & InfoCommunications.
O'Brien, J. A., & Marakas, G. M. (2017). Introduction to Information System. McGraw Hill.
Safianu, O., Twum, F., & Hayfron-Acquah, J. (2016). Information System Security Threats and Vulnerabilities: Evaluating the Human Factor in Data Protection. International Journal of Computer Applications, 8-14.
Salamatian, S., Huleihel, W., Beirami, A., Cohen, A., & Medard, M. (2019). Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization. IEEE Transactions on Information Forensics and Security, vol. 14, no. 9, 2288-2299.
Sharma, P. (2016). Database Security: Attacks and Techniques. International Journal of Scientific & Engineering Research, Volume 7, Issue 12, 313-318.
SophosLab. (2013). Security Threat Report. SophosLab.
Tang, A., Sethumadhavan, S., & Stolfo, S. (2017). CLKSCREW: Exposing the Perils of Security Oblivious Energy Management. 26th USENIX Security Symposium (pp. 1057-1074). Vancouver, BC, Canada: USENIX Association.
Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proceedings of the IEEE (pp. 1727-1765). IEEE.

Unduhan

Diterbitkan

2020-05-05

Cara Mengutip

Prakasa, J. E. W. (2020). Peningkatan Keamanan Sistem Informasi Melalui Klasifikasi Serangan Terhadap Sistem Informasi. Jurnal Ilmiah Teknologi Informasi Asia, 14(2), 75–84. https://doi.org/10.32815/jitika.v14i2.452