Peningkatan Keamanan Sistem Informasi Melalui Klasifikasi Serangan Terhadap Sistem Informasi

Authors

  • Johan Ericka Wahyu Prakasa UIN Maulana Malik Ibrahim Malang

DOI:

https://doi.org/10.32815/jitika.v14i2.452

Keywords:

klasifikasi, serangan, sistem informasi, keamanan

Abstract

Nowadays, many information systems were developed to ease human life. This massive explosion of information systems attracts many attackers to get the valued data inside the information systems. There are many interesting data was held inside the information systems from personal ID Card number to bank accounts. That's why security must be involved in information systems development in the first place. This research study attacks to information systems and classified it into information system components. As a result, there are many attacks on every information system components. This research also gives advises to securing the information system from every information systems components.

Downloads

Download data is not yet available.

References

Ali, M., Husain, D., & Sharma, M. (2017). A study on Emerging Cyber Technologies, Threats and Prevention in Information Security. IOSR Journal of Computer Engineering, 49-54.
Babate, A., Musa, M., Kida, A., & Saidu, M. (2015). State of Cyber Security: Emerging Threats Landscape. International Journal of Advanced Research in Computer Science & Technology, 113-119.
Agarwal, M., Biswas, S., & Nandi, S. (2018). An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack. International Journal of Wireless Information Networks.
Akamai. (2018). State of Te Internet: Security - Web Attack Report Infographic, 2018. Akamai.
AL-FEDAGHI, S., & Alsumait, O. (2019). Towards a conceptual foundation for physical security: Case study of an it department. International Journal of Safety and Security Engineering, 137-156.
Alves, T., & Morris, T. (2018). Hardware-based Cyber Threats. ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy, 259-266.
Bloom, G., Leontie, E., Narahari, B., & Simha, R. (2012). Hardware and Security: Vulnerabilities and Solutions. In S. K. Das, K. Kant, & N. Zhang, Handbook on Securing Cyber-Physical Critical Infrastructure (pp. 305-331). Elsevier.
Gens, D. (2018). OS-Level Attacks and Defenses : From Software to Hardware-Based Exploits. Technische Universität Darmstadt.
Group, A. P. (2020). Phishing Activity Trends Report, 4th Quarter 2019. APWG.
ID-SIRTII. (2018). Laporan Tahunan ID-SIRTII. ID-SIRTII.
Indonesia, P. (2008). Undang - Undang No. 11. Jakarta: Sekretariat Negara.
Jaafar, G. A., Abdullah, S. M., & Ismail, S. (2019). Review of recent detection methods for HTTP DDoS attack. Journal of Computer Networks and Communications, 1-10.
Kee, W. J., Kadir, M. A., Wahab, F. A., Mohamad, A. H., Mohamad, A. M., & Abidin, A. F. (2018). A Review on Spectre Attacks and Meltdown with its Mitigation Techniques. International Journal of Engineering & Technology 7, 209-213.
Kocher, P. H. (2019). Spectre attacks: Exploiting speculative execution. 2019 IEEE Symposium on Security and Privacy (SP), 1-19.
Kothari, H., Suwalka, A. K., & Kumar, D. (2019). Various Database Attacks, Approaches and Countermeasures To Database Security. International Journal of Advance Research in Computer Science and Management, 357-362.
Kovačić, S., Đulić, E., & Šehidić, A. (2017). Improving the Security of Access to Network Resources Using the 802.1x Standard in Wired and Wireless Environments. 22nd Internacionalna Naučno-Stručna Konferencija Informacione Tehnologije 2017.
Mohammed, D., & Mohammed, S. (2017). Survey of Information Security Risk Management Models. International Journal of Business, Humanities and Technology, 23-26.
Moustafa, K., & Lalia, S. (2019). Implementation of Web Browser Extension for Mitigating CSRF Attack. WorldCIST'19 2019. Advances in Intelligent Systems and Computing (pp. 867-880). Springer.
Niakanlahiji, A., & Jafarian, J. H. (2019). WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense. Security and Communication Networks Volume 2019, 1-13.
O.P, V., O.S, Y., & L.M., K. (2016). SQL Injection Prevention System. 2016 International Conference Radio Electronics & InfoCommunications.
O'Brien, J. A., & Marakas, G. M. (2017). Introduction to Information System. McGraw Hill.
Safianu, O., Twum, F., & Hayfron-Acquah, J. (2016). Information System Security Threats and Vulnerabilities: Evaluating the Human Factor in Data Protection. International Journal of Computer Applications, 8-14.
Salamatian, S., Huleihel, W., Beirami, A., Cohen, A., & Medard, M. (2019). Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization. IEEE Transactions on Information Forensics and Security, vol. 14, no. 9, 2288-2299.
Sharma, P. (2016). Database Security: Attacks and Techniques. International Journal of Scientific & Engineering Research, Volume 7, Issue 12, 313-318.
SophosLab. (2013). Security Threat Report. SophosLab.
Tang, A., Sethumadhavan, S., & Stolfo, S. (2017). CLKSCREW: Exposing the Perils of Security Oblivious Energy Management. 26th USENIX Security Symposium (pp. 1057-1074). Vancouver, BC, Canada: USENIX Association.
Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proceedings of the IEEE (pp. 1727-1765). IEEE.

Published

2020-05-05