OPTIMALISASI INFRASTRUKTUR KEAMANAN TEKNOLOGI INFRASTRUKTUR DALAM MENGHADAPI ANCAMAN CYBERSECURITY
Keywords:
Cyber Security, Information Technology Infrastructure, Security Strategy, Cyber ThreatsAbstract
The rapid increase in the use of digital technology has triggered an increase in cyber threats that are increasingly sophisticated and diverse. This research identifies various types of cyber threats, from malware to DDoS attacks, and analyzes their significant impact on organizations, including financial and reputational losses. In addition, this research also evaluates various cybersecurity strategies that can be implemented, such as risk management, layered security, automation, and user awareness. The results of this research present a comprehensive framework that integrates technology, policy, and user awareness to build effective cyber defenses. The research also identified recent trends in the cyber threat landscape, such as increasingly sophisticated ransomware attacks and the use of artificial intelligence by cybercriminals. Further research is needed to evaluate the effectiveness of the proposed cybersecurity strategies in the context of different industry sectors and organizational sizes.
References
Nabila Aulia Agustin and Refania Meilani Firdos, “Studi Literatur : Ancaman Cybercrime di Indonesia dan Pentingnya Pemahaman akan Fenomena Kejahatan Digital,” J. Mhs. Tek. Inform., vol. 3, no. 1, pp. 126–131, 2024, doi: 10.35473/jamastika.v3i1.2841.
E. Ketaren, “Cybercrime, Cyber Space, Dan Cyber Law,” J. TIMES, vol. 5, no. 2, pp. 35–42, 2017, doi: 10.51351/jtm.5.2.2016556.
S. Parulian, D. A. Pratiwi, and M. Cahya Yustina, “Ancaman dan Solusi Serangan Siber di Indonesia,” Telecommun. Networks, Electron. Comput. Technol., vol. 1, no. 2, pp. 85–92, 2021.
M. Z. Rizaldi, R. D. Putra, and A. Ul Hosnah, “Analisis Kasus Cybercrime Dengan Studi Kasus Hacker Bjorka Terhadap Pembocoran Data,” JUSTITIA J. Ilmu Huk. dan Hum., vol. 6, no. 2, p. 619, 2023, doi: 10.31604/justitia.v6i2.619-627.
M. Naseer et al., “Malware Detection: Issues and Challenges,” in Journal of Physics: Conference Series, IOP Publishing Ltd, Apr. 2021. doi: 10.1088/1742-6596/1807/1/012011.
M. Thakur, “Cyber Security Threats and Counter Measures in Digital Age,” J. Appl. Sci. Educ., vol. 04, no. 042, pp. 1–20, 2024, doi: 10.54060/a2zjourna.
M. A. Hama Saeed, “Malware in Computer Systems: Problems and Solutions,” IJID (International J. Informatics Dev., vol. 9, no. 1, p. 1, Apr. 2020, doi: 10.14421/ijid.2020.09101.
E. G. Dada, J. Stephen Bassi, Y. J. Hurcha, and A. H. Alkali, “Performance Evaluation of Machine Learning Algorithms for Detection and Prevention of Malware Attacks,” vol. 21, no. 3, pp. 18–27, doi: 10.9790/0661-2103011827.
J. H. Park, S. K. Singh, M. M. Salim, A. E. L. Azzaoui, and J. H. Park, “Ransomware-based Cyber Attacks: A Comprehensive Survey,” J. Internet Technol., vol. 23, no. 7, pp. 1557–1564, 2022, doi: 10.53106/160792642022122307010.
E. Ginting, M. Pardomuan Sinaga, M. Rizal Nurdin, M. Dimas Putra, P. Studi Sistem Informasi, and K. Kunci, “ANALISIS ANCAMAN PHISING TERHADAP LAYANAN ONLINE PERBANKAN (STUDI KASUS PADA BANK BRI) PHISING THREAT ANALYSIS OF ONLINE BANKING SERVICES (CASE STUDY ON BANK BRI),” 2023.
S. Wani, M. Imthiyas, H. Almohamedh, K. M. Alhamed, S. Almotairi, and Y. Gulzar, “Distributed denial of service (Ddos) mitigation using blockchain—a comprehensive insight,” Symmetry, vol. 13, no. 2. MDPI AG, pp. 1–21, Feb. 2021. doi: 10.3390/sym13020227.
A. Mallik, “MAN-IN-THE-MIDDLE-ATTACK: UNDERSTANDING IN SIMPLE WORDS,” 2018.
T. Aprilia et al., “Pengaruh Keamanan Two Factor Authentication Terhadap Pencurian Data (Cyber Crime) Pada Media Sosial,” Pengaruh Keamanan Two Factor, vol. 2, no. 5, pp. 449–458, 2024, doi: 10.5281/zenodo.11496678.
M. Alghawazi, D. Alghazzawi, and S. Alarifi, “Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review,” J. Cybersecurity Priv., vol. 2, no. 4, pp. 764–777, Dec. 2022, doi: 10.3390/jcp2040039.
B. Pal, T. Daniel, R. Chatterjee, T. Ristenpart, and C. Tech, “Beyond Credential Stuffing: Password Similarity Models using Neural Networks.”
G. Mochammad Husein and R. V. Imbar, “Analisis Manajemen Risiko Teknologi Informasi Penerapan Pada Document Management System di PT. JABAR TELEMATIKA (JATEL),” J. Tek. Inform. dan Sist. Inf., vol. 1, no. 2, pp. 75–87, 2015, doi: 10.28932/jutisi.v1i2.368.
S. N. Adzimi, H. A. Alfasih, F. N. G. Ramadhan, S. N. Neyman, and A. Setiawan, “Implementasi Konfigurasi Firewall dan Sistem Deteksi Intrusi menggunakan Debian,” J. Internet Softw. Eng., vol. 1, no. 4, p. 12, 2024, doi: 10.47134/pjise.v1i4.2681.
A. Zulfikar and Y. Akbar, “Automation of Mikrotik Router Setting Configuration Backup Using Ansible with Network DevOps Method Otomasi Backup Konfigurasi Settingan Router Mikrotik Menggunakan Ansible dengan Metode Network DevOps,” vol. 5, no. January, pp. 57–66, 2025.
G. D. Putra, S. Sumaryono, and W. Widyawan, “Rancang Bangun Identity and Access Management IoT Berbasis KSI dan Permissioned Blockchain,” J. Nas. Tek. Elektro dan Teknol. Inf., vol. 7, no. 4, pp. 384–390, 2018, doi: 10.22146/jnteti.v7i4.455.
M. Souppaya, K. Stine, M. Simos, S. Sweeney, and K. Scarfone, “Critical Cybersecurity Hygiene: Patching the Enterprise,” Natl. Inst. Stand. Technol., 2020, [Online]. Available: https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/ch-pe-project-description-final.pdf
G. González-Granadillo, S. González-Zarzosa, and R. Diaz, “Security information and event management (SIEM): Analysis, trends, and usage in critical infrastructures[Gestión de eventos e información de seguridad (SIEM): análisis, tendencias y uso en infraestructuras críticas],” Sensors, vol. 21, no. 14, pp. 1–28, 2021.
C. V. M. Kaliu, A. Mewengkang, and J. R. Batmetan, “Analisis Manajemen Insiden IT pada Sistem Informasi Akademik Universitas Negeri Manado,” Edutik J. Pendidik. Teknol. Inf. dan Komun., vol. 2, no. 6, pp. 940–949, 2022, doi: 10.53682/edutik.v2i6.6463.
T. Tan, H. Sama, T. Wibowo, G. Wijaya, and ..., “Kesadaran Keamanan Siber pada Kalangan Mahasiswa Universitas di Kota Batam,” J. Teknol. dan …, vol. 14, no. September, pp. 163–173, 2024, doi: 10.34010/jati.v14i2.
M. Pajak and P. Zirman, “Faculty of Economic, Riau University,” vol. 4, no. 1, pp. 294–308, 2013.
D. Herlinudinkhaji, “Evaluasi Layanan Teknologi Informasi ITIL Versi 3 Domain Service Desain pada Universitas Selamat Sri Kendal,” Walisongo J. Inf. Technol., vol. 1, no. 1, p. 61, 2019, doi: 10.21580/wjit.2019.1.1.4005.