Pencegahan Penipuan Social Engineering pada Massa 4.0
DOI:
https://doi.org/10.38035/jim.v2i1.232Keywords:
IT Strategy, Security, Trust, Human-computer interaction (HCI)Abstract
This paper intends to explore three social design related online protection issues facing organizations and develop techniques to stop human trickery in friendly design attacks. Twenty experts in Branch Security Information Structures took part in a three-round Delphi study to unify and refine the feeling of high quality. The three rounds move the individual towards a setting for guidelines against attacks with friendly plans in affiliates. Three basic problems: compromised data; inadequate training; and the lack of sophisticated training drives the three target areas to apply best practices against social plan attacks. The invention provides countermeasures by coordinating high-level training, techniques, cycles, and preparation into safety exercises. This study adds to the field of organizational security with an emphasis on trust and human creativity to examine counter-accommodation counter-accommodation attack plans. This paper adds to the set of underrepresented underrepresented social program monitoring implementation of social programs.
References
Aliyhafiz.com. (2020). SocialEngineering, Pengertian, Langkah-Langkah,DanCaraMenghindarinya.
Blacbkbourne N. (2016). The Dark Side of Social Engineering,. EDPACS, 53(8–9), 4.
Conteh N. Y. and Schmick P.J. (2016). Cybersecurity:risks, vulnerabilities andcountermeasures to prevent social engineering attacks. International Journal OfAdvanced Computer Research, 1(31–38).
Fadlil A, R. I. and N. A. (2020). Data Security for School Service Top-UpTransactions Based on AES Combination Blockchain Technology Modification,. Lontar Komputer, 11(155–166), 3.
Februariyanti, H. (2006). Standar danManajemen Keamanan Komputer. Teknologi InformasiDINAMIK, 11(134–142), 2.
Gondohanindijo, J. (2010). Pengamanan Sistem Berkas.
Hasanuddin W.Z.B. (2020). Improving Network Performanceof IP PBX Based Telecommunication System. Lontar Komputer, 11(101–113), 2.
Hasibuan, M. S. & Gultom, L. M. (2018). Analisis Serangan Deface MenggunakanBackdoor Shell Pada Website. Techno.COM, 415–423.
Herjanto, E., & Kristiningrum, E. (2006). KAJIAN STANDARBIDANG KEAMANAN. KAJIAN STANDARBIDANG KEAMANAN., 8(18–26), 1.
Hermawan, R. (2014). Analisis Konsep Dan Cara Kerja Serangan KomputerDistributed Denial Of Service (DDOS). Faktor Exacta, 5(1–14).
Junaedi D.I. (2017). “Antisipasi Dampak Social Engineering Pada Bisnis Perbankan,.” Ilmu-Ilmu Informatika Dan Manajemen STMIK, 11(1).
Lohani S. (2018). Social Engineering: Hacking into Humans,. 4th International Conferenceon Cyber Security (ICCS), 1(385–393), 2.
Nasution, M. I. P. (2008). Urgensi Keamanan Pada Sistem Informasi. Jurnal Iqra’, 2, 41–53.
Perwita, A. A. (2008). DinamikaKeamanan Dalam HubunganInternasional Dan ImplikasinyaBagiIndonesia. Universitas Katolik Parahyangan.
Rafizan O. (2011). “Analisis Penyerangan Social Engineering,.” 4th International Conferenceon Cyber Security (ICCS), 2(115–126).
S.D.A, M. (2009). "Social Engineering: Hacking the Wetware! Information SecurityJournal: A Global Perspective, 18(40–46), 1.
Seskoau. (2020). Prosedur TetapTentang Mata Pelajaran SeskoauYang Tidak Diikuti Oleh PasisNegaraSahabat. Markas BesarAngkatan Udara Sekolah Staf DanKomando.
Suherman, Widodo, P., & Gunawan, D. (2017). Efektivitas KeamananInformasi Dalam MenghadapiBahaya Social Engineering. JurnalProdi Peperangan Asimetris, 73–90, 1.
Susetyo, H. (2008). Menuju ParadigmaKeamananKomprehensifBerperspektif Keamanan Manusiadalam Kebijakan KeamananNasional. Lex Jurnalica, 1–2.
Velicia, V., Wisanjaya, I., & Widiatedja, I. (2015). Perlindungan HukumTerhadap Indonesia Dalam KasusPenyadapan Oleh Australia. Program Kekhususan HukumInternasional Dan Hukum Bisnis.
Downloads
Published
How to Cite
Issue
Section
License
You are free to:
- Share— copy and redistribute the material in any medium or format
- Adapt— remix, transform, and build upon the material for any purpose, even commercially.
The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution— You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions— You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
- You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.
- No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rightsmay limit how you use the material.