Peningkatan Keamanan Sistem Informasi Melalui Klasifikasi Serangan Terhadap Sistem Informasi
DOI:
https://doi.org/10.32815/jitika.v14i2.452Keywords:
klasifikasi, serangan, sistem informasi, keamananAbstract
Nowadays, many information systems were developed to ease human life. This massive explosion of information systems attracts many attackers to get the valued data inside the information systems. There are many interesting data was held inside the information systems from personal ID Card number to bank accounts. That's why security must be involved in information systems development in the first place. This research study attacks to information systems and classified it into information system components. As a result, there are many attacks on every information system components. This research also gives advises to securing the information system from every information systems components.
Downloads
References
Babate, A., Musa, M., Kida, A., & Saidu, M. (2015). State of Cyber Security: Emerging Threats Landscape. International Journal of Advanced Research in Computer Science & Technology, 113-119.
Agarwal, M., Biswas, S., & Nandi, S. (2018). An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack. International Journal of Wireless Information Networks.
Akamai. (2018). State of Te Internet: Security - Web Attack Report Infographic, 2018. Akamai.
AL-FEDAGHI, S., & Alsumait, O. (2019). Towards a conceptual foundation for physical security: Case study of an it department. International Journal of Safety and Security Engineering, 137-156.
Alves, T., & Morris, T. (2018). Hardware-based Cyber Threats. ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy, 259-266.
Bloom, G., Leontie, E., Narahari, B., & Simha, R. (2012). Hardware and Security: Vulnerabilities and Solutions. In S. K. Das, K. Kant, & N. Zhang, Handbook on Securing Cyber-Physical Critical Infrastructure (pp. 305-331). Elsevier.
Gens, D. (2018). OS-Level Attacks and Defenses : From Software to Hardware-Based Exploits. Technische Universität Darmstadt.
Group, A. P. (2020). Phishing Activity Trends Report, 4th Quarter 2019. APWG.
ID-SIRTII. (2018). Laporan Tahunan ID-SIRTII. ID-SIRTII.
Indonesia, P. (2008). Undang - Undang No. 11. Jakarta: Sekretariat Negara.
Jaafar, G. A., Abdullah, S. M., & Ismail, S. (2019). Review of recent detection methods for HTTP DDoS attack. Journal of Computer Networks and Communications, 1-10.
Kee, W. J., Kadir, M. A., Wahab, F. A., Mohamad, A. H., Mohamad, A. M., & Abidin, A. F. (2018). A Review on Spectre Attacks and Meltdown with its Mitigation Techniques. International Journal of Engineering & Technology 7, 209-213.
Kocher, P. H. (2019). Spectre attacks: Exploiting speculative execution. 2019 IEEE Symposium on Security and Privacy (SP), 1-19.
Kothari, H., Suwalka, A. K., & Kumar, D. (2019). Various Database Attacks, Approaches and Countermeasures To Database Security. International Journal of Advance Research in Computer Science and Management, 357-362.
Kovačić, S., Đulić, E., & Šehidić, A. (2017). Improving the Security of Access to Network Resources Using the 802.1x Standard in Wired and Wireless Environments. 22nd Internacionalna Naučno-Stručna Konferencija Informacione Tehnologije 2017.
Mohammed, D., & Mohammed, S. (2017). Survey of Information Security Risk Management Models. International Journal of Business, Humanities and Technology, 23-26.
Moustafa, K., & Lalia, S. (2019). Implementation of Web Browser Extension for Mitigating CSRF Attack. WorldCIST'19 2019. Advances in Intelligent Systems and Computing (pp. 867-880). Springer.
Niakanlahiji, A., & Jafarian, J. H. (2019). WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense. Security and Communication Networks Volume 2019, 1-13.
O.P, V., O.S, Y., & L.M., K. (2016). SQL Injection Prevention System. 2016 International Conference Radio Electronics & InfoCommunications.
O'Brien, J. A., & Marakas, G. M. (2017). Introduction to Information System. McGraw Hill.
Safianu, O., Twum, F., & Hayfron-Acquah, J. (2016). Information System Security Threats and Vulnerabilities: Evaluating the Human Factor in Data Protection. International Journal of Computer Applications, 8-14.
Salamatian, S., Huleihel, W., Beirami, A., Cohen, A., & Medard, M. (2019). Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization. IEEE Transactions on Information Forensics and Security, vol. 14, no. 9, 2288-2299.
Sharma, P. (2016). Database Security: Attacks and Techniques. International Journal of Scientific & Engineering Research, Volume 7, Issue 12, 313-318.
SophosLab. (2013). Security Threat Report. SophosLab.
Tang, A., Sethumadhavan, S., & Stolfo, S. (2017). CLKSCREW: Exposing the Perils of Security Oblivious Energy Management. 26th USENIX Security Symposium (pp. 1057-1074). Vancouver, BC, Canada: USENIX Association.
Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proceedings of the IEEE (pp. 1727-1765). IEEE.
Additional Files
Published
How to Cite
Issue
Section
License
Upon acceptance for publication, authors transfer copyright of their article to Jurnal Ilmiah Teknologi Informasi Asia. This includes the rights to reproduce, transmit, and translate the material in any form or medium.
While the editorial board endeavors to ensure accuracy, they accept no responsibility for the content of articles or advertisements. Liability rests solely with the respective authors and advertisers.
Website material is licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0). Under this license, users are free to share and adapt the material for any purpose, including commercial use, provided license terms are met. These freedoms are irrevocable by the licensor under such conditions.