Ancaman dan Langkah Pengamanan Sistem Informasi Menggunakan Metode Systematic Literature Review
DOI:
https://doi.org/10.55606/juisik.v3i2.496Keywords:
Information Systems, Security Threats, Information System Security, PreventionAbstract
This research aims to analyze security threats that occur in information systems and ways to overcome them. The method used in this research is Systematic Literature Review, where articles related to security threats in information systems are collected and analyzed qualitatively. The results show that there are various kinds of security threats in information systems, such as hacking, sabotage, espionage, and others. These threats can damage data, steal information, or disrupt system integrity. To overcome these threats, prevention and treatment efforts are needed. Prevention is done to prevent damage, loss, or theft of data, while treatment is done if data has already been attacked. Some ways to improve information system security include improving HR knowledge related to cyber threats, implementing readiness certification, and adopting security domains from other countries. Mapping the types of cyberattacks and selecting appropriate security technologies are also important. Some other efforts include regular operating system updates, applying encryption to data, controlling access, using firewall technology, and implementing standard operating procedures (SOPs) and privacy policies. This research can serve as a guide in developing effective policies and measures in maintaining information system security.
References
Arianto, A. R., & Anggraini, G. (2019). MEMBANGUN PERTAHANAN DAN KEAMANAN SIBER NASIONAL INDONESIA GUNA MENGHADAPI ANCAMAN SIBER GLOBAL MELALUI INDONESIA SECURITY INCIDENT RESPONSE TEAM ON INTERNET INFRASTRUCTURE (ID-SIRTII). Jurnal Pertahanan & Bela Negara, 9(1), 13-29. http://download.garuda.kemdikbud.go.id/article.php?article=2421466&val=23123&title=MEMBANGUN%20PERTAHANAN%20DAN%20KEAMANAN%20SIBER%20NASIONAL%20INDONESIA%20GUNA%20MENGHADAPI%20ANCAMAN%20SIBER%20GLOBAL%20MELALUI%20INDONESIA%20SECURITY%20INCIDENT%20RESPONSE%
Babys, S.A.M. (n.d.). ANCAMAN PERANG SIBER DI ERA DIGITAL DAN SOLUSI KEAMANAN NASIONAL INDONESIA. JURNAL ORATIO DIRECTA, 3(1), 425-442. https://www.ejurnal.ubk.ac.id/index.php/oratio/article/view/163/116
Bustami, A., & Bahri, S. (2020). ncaman, Serangan dan Tindakan Perlindungan pada Keamanan Jaringan atau Sistem Informasi: Systematic Review. Jurnal Pendidikan dan Aplikasi Industri (UNISTEK), 7(2), 60-70. https://core.ac.uk/reader/337313970
Dwinanto, I., & Setyiani, H. (2021). IMPLEMENTASI KEAMANAN KOMPUTER PADA ASPEK CONFIDENTIALITY, INTEGRITY, AVAILABILITY (CIA) MENGGUNAKAN TOOLS LYNIS AUDIT SYSTE. Jurnal Maklumatika, 8(1), 35-46. https://maklumatika.i-tech.ac.id/index.php/maklumatika/article/view/117
Fachrezi, M. I., Cahyonno, A. D., & Tanaem, P. F. (2021). Manajemen Risiko Keamanan Aset Teknologi Informasi Menggunakan ISO 31000:2018 Diskominfo Kota Salatiga. Jurnal Teknik Informatika dan Sistem Informasi, 8(2), 764-773. https://jurnal.mdp.ac.id/index.php/jatisi/article/view/789
FAKTOR-FAKTOR YANG MEMPENGARUHI KEAMANAN SISTEM INFORMASI: KEAMANAN INFORMASI, TEKNOLOGI INFORMASI DAN NETWORK (LITERATURE REVIEW SIM). (2022). JEMSI: Jurnal Ekonomi Manajemen Sistem Informasi, 3(3), 564-573. https://doi.org/10.31933/jemsi.v3i5
Hariyadi, D., & Nastiti, F.E. (2021). Analisis Keamanan Sistem InformasiMenggunakan Sudomy dan OWASP ZAP di Universitas Duta Bangsa Surakarta. urnal Komtika (Komputasi danInformatika), 5(1), -42. http://journal.unimma.ac.id/index.php/komtika/article/view/5134
Herdiana, Y., Munawar, Z., & Putri, N. I. (2021). Mitigasi Ancaman Resiko Keamanan Siber di Masa Pandemi Covid-19. Jurnal ICT: Information Communication & Technology, 20(1), 42-52. http://ejournal.ikmi.ac.id/index.php/jict-ikmi/article/view/58
Laksono, A. C., & Prayudi, Y. (2021). p-ISSN : 2502-5724; e-ISSN : 2541-5735 9Threat Modeling Menggunakan Pendekatan STRIDEdan DREADuntuk Mengetahui Risiko dan Mitigasi Keamananpada Sistem Informasi Akademik. Jurnal Sistem dan Teknologi Informasi Indonesia, 6(1), 9-21. http://jurnal.unmuhjember.ac.id/index.php/JUSTINDO/article/view/3944/3023
Lusiana, & Suryani, M. (2014). Metode SLR untuk Mengidentifikasi Isu-Isu dalam Software Engineering. SATIN: Sains dan Teknologi Informasi, 3(1), 1-11. http://bpm.stmik-amik-riau.ac.id/index.php/satin/article/view/347#:~:text=Dengan%20metode%20SLR%20isu-isu%20yang%20berhubungan%20dalam%20software,to%20solve%20the%20problem%E2%80%9D%20%28bagaimana%20memecahkan%20masalah%20tersebut%29
Munawar, Z., & Putri, N.I. (2020). KEAMANAN JARINGAN KOMPUTER PADA ERA BIG DATA. Jurnal Sistem Informasi, 2(1), 14-20. https://unibba.ac.id/ejournal/index.php/j-sika/article/view/275
Primawanti, H., & Pangestu, S. (2020). DIPLOMASI SIBER INDONESIA DALAM MENINGKATKAN KEAMANAN SIBER MELALUI ASSOCIATION OF SOUTH EAST ASIAN NATION (ASEAN) REGIONAL FORUM. Jurnal Ilmiah Hubungan Internasional, 2(2), 1-15. https://journal2.unfari.ac.id/index.php/globalmind/article/view/89
Putri, N.I., Musadad, D.Z., Munawar, Z., & Komalasari, R. (2021). STRATEGI DAN PENINGKATAN KEAMANAN PADA KOMPUTASI AWAN. Jurnal Sistem Informasi, 3(1). https://ejournal.unibba.ac.id/index.php/j-sika/article/view/533
Rahmawati, C. (2019). Tantangan Dan Ancaman Keamanan Siber Indonesia Di Era Revolusi Industri 4.0. Seminar Nasional Sains Teknologi dan Inovasi Indonesia (SENASTINDO AAU, 1(1), 299-306. https://aau.e-journal.id/senastindo/article/view/116
Rumlus, M.H., & Hartadi, H. (n.d.). KEBIJAKAN PENANGGULANGAN PENCURIAN DATA PRIBADI DALAM MEDIA ELEKTRONIK. Jurnal HAM, 11(2), 285-299. https://ejournal.balitbangham.go.id/index.php/ham/article/view/1059
Tumalun, B. (2018). UPAYA PENANGGULANGAN KEJAHATAN KOMPUTER DALAM SISTEM ELEKTRONIK MENURUT PASAL 30 UNDANG-UNDANG NOMOR 11 TAHUN 2008. Lex Et Societatis, VI(2), 24-31. https://ejournal.unsrat.ac.id/index.php/lexetsocietatis/article/view/19950
Yel, M.B., & Nasution, M.K. (2022). KEAMANAN INFORMASI DATA PRIBADI PADA MEDIA SOSIAL. Jurnal Informatika Kaputama (JIK), 6(1), 92-101. https://jurnal-backup.kaputama.ac.id/index.php/JIK/article/view/768
Yuliana, Y., Mooduto, H. A., & Hadi, R. (n.d.). Deteksi Ancaman Keamanan Pada Server dan Jaringan Menggunakan OSSEC. Jurnal Ilmiah Teknologi Sistem Informasi, 3(1), 8-15. https://jurnal-itsi.org/index.php/jitsi/article/view/58
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Jurnal ilmiah Sistem Informasi dan Ilmu Komputer
This work is licensed under a Creative Commons Attribution 4.0 International License.