Ancaman dan Langkah Pengamanan Sistem Informasi Menggunakan Metode Systematic Literature Review

Authors

  • Achmad Mukhlis Universitas Pembangunan “Veteran” Jawa Timur
  • Baiq Laila Alfila Universitas Pembangunan “Veteran” Jawa Timur
  • Aliya Zhafira Wastuyana Universitas Pembangunan “Veteran” Jawa Timur

DOI:

https://doi.org/10.55606/juisik.v3i2.496

Keywords:

Information Systems, Security Threats, Information System Security, Prevention

Abstract

This research aims to analyze security threats that occur in information systems and ways to overcome them. The method used in this research is Systematic Literature Review, where articles related to security threats in information systems are collected and analyzed qualitatively. The results show that there are various kinds of security threats in information systems, such as hacking, sabotage, espionage, and others. These threats can damage data, steal information, or disrupt system integrity. To overcome these threats, prevention and treatment efforts are needed. Prevention is done to prevent damage, loss, or theft of data, while treatment is done if data has already been attacked. Some ways to improve information system security include improving HR knowledge related to cyber threats, implementing readiness certification, and adopting security domains from other countries. Mapping the types of cyberattacks and selecting appropriate security technologies are also important. Some other efforts include regular operating system updates, applying encryption to data, controlling access, using firewall technology, and implementing standard operating procedures (SOPs) and privacy policies. This research can serve as a guide in developing effective policies and measures in maintaining information system security.

References

Arianto, A. R., & Anggraini, G. (2019). MEMBANGUN PERTAHANAN DAN KEAMANAN SIBER NASIONAL INDONESIA GUNA MENGHADAPI ANCAMAN SIBER GLOBAL MELALUI INDONESIA SECURITY INCIDENT RESPONSE TEAM ON INTERNET INFRASTRUCTURE (ID-SIRTII). Jurnal Pertahanan & Bela Negara, 9(1), 13-29. http://download.garuda.kemdikbud.go.id/article.php?article=2421466&val=23123&title=MEMBANGUN%20PERTAHANAN%20DAN%20KEAMANAN%20SIBER%20NASIONAL%20INDONESIA%20GUNA%20MENGHADAPI%20ANCAMAN%20SIBER%20GLOBAL%20MELALUI%20INDONESIA%20SECURITY%20INCIDENT%20RESPONSE%

Babys, S.A.M. (n.d.). ANCAMAN PERANG SIBER DI ERA DIGITAL DAN SOLUSI KEAMANAN NASIONAL INDONESIA. JURNAL ORATIO DIRECTA, 3(1), 425-442. https://www.ejurnal.ubk.ac.id/index.php/oratio/article/view/163/116

Bustami, A., & Bahri, S. (2020). ncaman, Serangan dan Tindakan Perlindungan pada Keamanan Jaringan atau Sistem Informasi: Systematic Review. Jurnal Pendidikan dan Aplikasi Industri (UNISTEK), 7(2), 60-70. https://core.ac.uk/reader/337313970

Dwinanto, I., & Setyiani, H. (2021). IMPLEMENTASI KEAMANAN KOMPUTER PADA ASPEK CONFIDENTIALITY, INTEGRITY, AVAILABILITY (CIA) MENGGUNAKAN TOOLS LYNIS AUDIT SYSTE. Jurnal Maklumatika, 8(1), 35-46. https://maklumatika.i-tech.ac.id/index.php/maklumatika/article/view/117

Fachrezi, M. I., Cahyonno, A. D., & Tanaem, P. F. (2021). Manajemen Risiko Keamanan Aset Teknologi Informasi Menggunakan ISO 31000:2018 Diskominfo Kota Salatiga. Jurnal Teknik Informatika dan Sistem Informasi, 8(2), 764-773. https://jurnal.mdp.ac.id/index.php/jatisi/article/view/789

FAKTOR-FAKTOR YANG MEMPENGARUHI KEAMANAN SISTEM INFORMASI: KEAMANAN INFORMASI, TEKNOLOGI INFORMASI DAN NETWORK (LITERATURE REVIEW SIM). (2022). JEMSI: Jurnal Ekonomi Manajemen Sistem Informasi, 3(3), 564-573. https://doi.org/10.31933/jemsi.v3i5

Hariyadi, D., & Nastiti, F.E. (2021). Analisis Keamanan Sistem InformasiMenggunakan Sudomy dan OWASP ZAP di Universitas Duta Bangsa Surakarta. urnal Komtika (Komputasi danInformatika), 5(1), -42. http://journal.unimma.ac.id/index.php/komtika/article/view/5134

Herdiana, Y., Munawar, Z., & Putri, N. I. (2021). Mitigasi Ancaman Resiko Keamanan Siber di Masa Pandemi Covid-19. Jurnal ICT: Information Communication & Technology, 20(1), 42-52. http://ejournal.ikmi.ac.id/index.php/jict-ikmi/article/view/58

Laksono, A. C., & Prayudi, Y. (2021). p-ISSN : 2502-5724; e-ISSN : 2541-5735 9Threat Modeling Menggunakan Pendekatan STRIDEdan DREADuntuk Mengetahui Risiko dan Mitigasi Keamananpada Sistem Informasi Akademik. Jurnal Sistem dan Teknologi Informasi Indonesia, 6(1), 9-21. http://jurnal.unmuhjember.ac.id/index.php/JUSTINDO/article/view/3944/3023

Lusiana, & Suryani, M. (2014). Metode SLR untuk Mengidentifikasi Isu-Isu dalam Software Engineering. SATIN: Sains dan Teknologi Informasi, 3(1), 1-11. http://bpm.stmik-amik-riau.ac.id/index.php/satin/article/view/347#:~:text=Dengan%20metode%20SLR%20isu-isu%20yang%20berhubungan%20dalam%20software,to%20solve%20the%20problem%E2%80%9D%20%28bagaimana%20memecahkan%20masalah%20tersebut%29

Munawar, Z., & Putri, N.I. (2020). KEAMANAN JARINGAN KOMPUTER PADA ERA BIG DATA. Jurnal Sistem Informasi, 2(1), 14-20. https://unibba.ac.id/ejournal/index.php/j-sika/article/view/275

Primawanti, H., & Pangestu, S. (2020). DIPLOMASI SIBER INDONESIA DALAM MENINGKATKAN KEAMANAN SIBER MELALUI ASSOCIATION OF SOUTH EAST ASIAN NATION (ASEAN) REGIONAL FORUM. Jurnal Ilmiah Hubungan Internasional, 2(2), 1-15. https://journal2.unfari.ac.id/index.php/globalmind/article/view/89

Putri, N.I., Musadad, D.Z., Munawar, Z., & Komalasari, R. (2021). STRATEGI DAN PENINGKATAN KEAMANAN PADA KOMPUTASI AWAN. Jurnal Sistem Informasi, 3(1). https://ejournal.unibba.ac.id/index.php/j-sika/article/view/533

Rahmawati, C. (2019). Tantangan Dan Ancaman Keamanan Siber Indonesia Di Era Revolusi Industri 4.0. Seminar Nasional Sains Teknologi dan Inovasi Indonesia (SENASTINDO AAU, 1(1), 299-306. https://aau.e-journal.id/senastindo/article/view/116

Rumlus, M.H., & Hartadi, H. (n.d.). KEBIJAKAN PENANGGULANGAN PENCURIAN DATA PRIBADI DALAM MEDIA ELEKTRONIK. Jurnal HAM, 11(2), 285-299. https://ejournal.balitbangham.go.id/index.php/ham/article/view/1059

Tumalun, B. (2018). UPAYA PENANGGULANGAN KEJAHATAN KOMPUTER DALAM SISTEM ELEKTRONIK MENURUT PASAL 30 UNDANG-UNDANG NOMOR 11 TAHUN 2008. Lex Et Societatis, VI(2), 24-31. https://ejournal.unsrat.ac.id/index.php/lexetsocietatis/article/view/19950

Yel, M.B., & Nasution, M.K. (2022). KEAMANAN INFORMASI DATA PRIBADI PADA MEDIA SOSIAL. Jurnal Informatika Kaputama (JIK), 6(1), 92-101. https://jurnal-backup.kaputama.ac.id/index.php/JIK/article/view/768

Yuliana, Y., Mooduto, H. A., & Hadi, R. (n.d.). Deteksi Ancaman Keamanan Pada Server dan Jaringan Menggunakan OSSEC. Jurnal Ilmiah Teknologi Sistem Informasi, 3(1), 8-15. https://jurnal-itsi.org/index.php/jitsi/article/view/58

Downloads

Published

2023-06-20

How to Cite

Achmad Mukhlis, Baiq Laila Alfila, & Aliya Zhafira Wastuyana. (2023). Ancaman dan Langkah Pengamanan Sistem Informasi Menggunakan Metode Systematic Literature Review. Jurnal Ilmiah Sistem Informasi Dan Ilmu Komputer, 3(2), 143–152. https://doi.org/10.55606/juisik.v3i2.496

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.