Pencegahan Penipuan Social Engineering pada Massa 4.0

Authors

  • Dimas Ryan Triwahono Universitas Bhayangkara Jakarta Raya, Manajemen
  • Achmad Fauzi Universitas Bhayangkara Jakarta Raya
  • Adzansyah Adzansyah Universitas Bhayangkara Jakarta Raya
  • Belva Yulivio Universitas Bhayangkara Jakarta Raya
  • Muhammad Yusuf Fito Universitas Bhayangkara Jakarta Raya
  • Reynaldo Ghifari Putra Yuntama Universitas Bhayangkara Jakarta Raya
  • Satrio Waliyudin Azhar Universitas Bhayangkara Jakarta Raya

DOI:

https://doi.org/10.38035/jim.v2i1.232

Keywords:

IT Strategy, Security, Trust, Human-computer interaction (HCI)

Abstract

This paper intends to explore three social design related online protection issues facing organizations and develop techniques to stop human trickery in friendly design attacks. Twenty experts in Branch Security Information Structures took part in a three-round Delphi study to unify and refine the feeling of high quality. The three rounds move the individual towards a setting for guidelines against attacks with friendly plans in affiliates. Three basic problems: compromised data; inadequate training; and the lack of sophisticated training drives the three target areas to apply best practices against social plan attacks. The invention provides countermeasures by coordinating high-level training, techniques, cycles, and preparation into safety exercises. This study adds to the field of organizational security with an emphasis on trust and human creativity to examine counter-accommodation counter-accommodation attack plans. This paper adds to the set of underrepresented underrepresented social program monitoring implementation of social programs.

References

Akbar, S., Rabi’, A., Minggu, D., &Mujahidin, I. (2019). FrequencyHopping Video Real Time UntukPengamanan Data PengintaianOperasi Inteligence TNI. JASIEK, 1(19–27), 3.
Aliyhafiz.com. (2020). SocialEngineering, Pengertian, Langkah-Langkah,DanCaraMenghindarinya.
Blacbkbourne N. (2016). The Dark Side of Social Engineering,. EDPACS, 53(8–9), 4.
Conteh N. Y. and Schmick P.J. (2016). Cybersecurity:risks, vulnerabilities andcountermeasures to prevent social engineering attacks. International Journal OfAdvanced Computer Research, 1(31–38).
Fadlil A, R. I. and N. A. (2020). Data Security for School Service Top-UpTransactions Based on AES Combination Blockchain Technology Modification,. Lontar Komputer, 11(155–166), 3.
Februariyanti, H. (2006). Standar danManajemen Keamanan Komputer. Teknologi InformasiDINAMIK, 11(134–142), 2.
Gondohanindijo, J. (2010). Pengamanan Sistem Berkas.
Hasanuddin W.Z.B. (2020). Improving Network Performanceof IP PBX Based Telecommunication System. Lontar Komputer, 11(101–113), 2.
Hasibuan, M. S. & Gultom, L. M. (2018). Analisis Serangan Deface MenggunakanBackdoor Shell Pada Website. Techno.COM, 415–423.
Herjanto, E., & Kristiningrum, E. (2006). KAJIAN STANDARBIDANG KEAMANAN. KAJIAN STANDARBIDANG KEAMANAN., 8(18–26), 1.
Hermawan, R. (2014). Analisis Konsep Dan Cara Kerja Serangan KomputerDistributed Denial Of Service (DDOS). Faktor Exacta, 5(1–14).
Junaedi D.I. (2017). “Antisipasi Dampak Social Engineering Pada Bisnis Perbankan,.” Ilmu-Ilmu Informatika Dan Manajemen STMIK, 11(1).
Lohani S. (2018). Social Engineering: Hacking into Humans,. 4th International Conferenceon Cyber Security (ICCS), 1(385–393), 2.
Nasution, M. I. P. (2008). Urgensi Keamanan Pada Sistem Informasi. Jurnal Iqra’, 2, 41–53.
Perwita, A. A. (2008). DinamikaKeamanan Dalam HubunganInternasional Dan ImplikasinyaBagiIndonesia. Universitas Katolik Parahyangan.
Rafizan O. (2011). “Analisis Penyerangan Social Engineering,.” 4th International Conferenceon Cyber Security (ICCS), 2(115–126).
S.D.A, M. (2009). "Social Engineering: Hacking the Wetware! Information SecurityJournal: A Global Perspective, 18(40–46), 1.
Seskoau. (2020). Prosedur TetapTentang Mata Pelajaran SeskoauYang Tidak Diikuti Oleh PasisNegaraSahabat. Markas BesarAngkatan Udara Sekolah Staf DanKomando.
Suherman, Widodo, P., & Gunawan, D. (2017). Efektivitas KeamananInformasi Dalam MenghadapiBahaya Social Engineering. JurnalProdi Peperangan Asimetris, 73–90, 1.
Susetyo, H. (2008). Menuju ParadigmaKeamananKomprehensifBerperspektif Keamanan Manusiadalam Kebijakan KeamananNasional. Lex Jurnalica, 1–2.
Velicia, V., Wisanjaya, I., & Widiatedja, I. (2015). Perlindungan HukumTerhadap Indonesia Dalam KasusPenyadapan Oleh Australia. Program Kekhususan HukumInternasional Dan Hukum Bisnis.

Published

2023-06-02

How to Cite

Ryan Triwahono, D. ., Fauzi, A. ., Adzansyah, A., Yulivio, B. ., Yusuf Fito, M. ., Ghifari Putra Yuntama, R. ., & Waliyudin Azhar, S. . (2023). Pencegahan Penipuan Social Engineering pada Massa 4.0. Jurnal Ilmu Multidisplin, 2(1), 68–74. https://doi.org/10.38035/jim.v2i1.232

Most read articles by the same author(s)

<< < 1 2 3 4