Analisis Keamanan Layanan, Sistem Operasi, Kriptografi, dan Steganografi dalam Pengelolaan Informasi Modern

Authors

  • Akhsanul Khairi Siregar Universitas Malikussaleh, Indonesia Author
  • M. Rifqy Pasha Universitas Malikussaleh, Indonesia Author
  • Alif Asrovi Universitas Malikussaleh, Indonesia Author
  • Fanni Rahmadayani Universitas Malikussaleh, Indonesia Author
  • Muhammad Raihan Azhari Universitas Malikussaleh, Indonesia Author

DOI:

https://doi.org/10.62671/jikum.v2i1.139

Keywords:

keamanan informasi, sistem operasi, kriptografi, steganografi, layanan digital

Abstract

The rapid advancement of digital technology has significantly increased the need for stronger information security systems, particularly in digital services, operating systems, and data protection mechanisms such as cryptography and steganography. This study aims to analyze the role of service security, operating system security, cryptographic techniques, and steganographic methods in maintaining the confidentiality, integrity, and availability of information in the modern digital environment. The methodology used in this research is a literature review by examining scientific journals, reference books, and international security standards published between 2018 and 2024. The results indicate that service security protects communication processes and data exchange through authentication, authorization, and encryption. Operating system security supports access control management and minimizes exploitation risks through system hardening and regular security updates. Cryptography safeguards the confidentiality and integrity of data using symmetric and asymmetric algorithms, while steganography adds an extra layer of protection by concealing information within digital media. The study concludes that integrating these four security components can create a multilayered defense system that is more effective in mitigating cyber threats and ensuring comprehensive information protection.

References

ADDIN Mendeley Bibliography CSL_BIBLIOGRAPHY Adebayo, O. S., Olusegun Ganiyu, S., Bukie Osang, F., Sule Ajiboye, S., Olamilekan, K. M., & Abdulazeez, L. (2022). Data Privacy System Using Steganography and Cryptography. International Journal of Mathematical Sciences and Computing, 8(2), 37–45. https://doi.org/10.5815/ijmsc.2022.02.04

Atanda, O. G., ADENIYI, A. E., ADEBIYI, M. O., ODUMEH, V., & AROBA, O. J. (2024). Building a Robust Data Shield: Implementing a Cryptography and Steganography Security Model. 1–28. https://www.researchsquare.com/article/rs-4689651/v1

Blackledge, J. (2011). Cryptography Using Steganography : New Algorithms and Applications Cryptography and Steganography : https://doi.org/10.21427/D7ZS63

Ikeagwu, C. P., Ejiofor, V. E., Eze, O. E., & Akawuku, G. (2025). Survey of Cryptography models for Security of Computer-based Integrated School Information Management System. Research Output Journal of Engineering and Scientific Research, 4(1), 60–70. https://doi.org/10.59298/rojesr/2025/4.1.6070

Mathe, R., Atukuri, V. R., & Devireddy, S. K. (2012). Securing Information : Cryptography and Steganography. International Journal of Computer Science and Information Technologies, 3(3), 4251–4255.

Nurrochim, A. (2025). Syntax Literate : Jurnal Ilmiah Indonesia Implementasi Kriptografi AES dan Steganografi Untuk Keamanan Data Customer dan Transaksi di PT Guna Bangun Jaya ( LEMKRA ) Agus Nurrochim kerugian untuk setiap jenis catatan data yang bocor , yang menegaskan betap. 10(10), 8100–8117.

Ozighor, E. R., & Izegbu, I. (2020). Information Protection Against Security Threats in an Insecure Environment using Cryptography and Steganography. Global Scientific Journal - Computer Science and Engineering Journal, 8(5), 1671–1692.

Rahman, R., Mulyadi, & Imran, A. (2024). Optimalisasi Keamanan Data Pada Sistem Operasi Windows Melalui Penerapan Teknologi Kriptografi Modern. Jurnal Sistem Informasi Dan Ilmu Komputer, 2(3), 146–166.

Rakhmadi Rahman, Khumaedi Khumaedi, & Nugrah Surya Pratama. (2024). Peningkatan Keamanan Data dengan Kriptografi Modern pada Sistem Operasi. Jurnal Sistem Informasi Dan Ilmu Komputer, 2(4), 01–08. https://doi.org/10.59581/jusiik-widyakarya.v2i3.3995

S, S. (2013). Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A New Technique to Hide Information File with an Image). IOSR Journal of Computer Engineering, 15(3), 17–25. https://doi.org/10.9790/0661-1531725

Downloads

Published

2026-01-02

How to Cite

Siregar , A. K. ., Pasha , M. R. ., Asrovi , A. ., Rahmadayani , F. ., & Azhari, M. R. . (2026). Analisis Keamanan Layanan, Sistem Operasi, Kriptografi, dan Steganografi dalam Pengelolaan Informasi Modern. JIKUM: Jurnal Ilmu Komputer, 2(1), 6-12. https://doi.org/10.62671/jikum.v2i1.139

How to Cite

Siregar , A. K. ., Pasha , M. R. ., Asrovi , A. ., Rahmadayani , F. ., & Azhari, M. R. . (2026). Analisis Keamanan Layanan, Sistem Operasi, Kriptografi, dan Steganografi dalam Pengelolaan Informasi Modern. JIKUM: Jurnal Ilmu Komputer, 2(1), 6-12. https://doi.org/10.62671/jikum.v2i1.139