Keamanan Informasi dalam Sistem Informasi Modern: Analisis Ancaman dan Upaya Pengamanan Berdasarkan Studi Literatur
DOI:
https://doi.org/10.62671/jikum.v2i1.141Keywords:
Keamanan Informasi, Keamanan Sistem Informasi, Jaringan, Ancaman Siber, KriptografiAbstract
Information security is a critical aspect of modern information systems, as information assets are vulnerable to various cyber threats that may compromise confidentiality, integrity, and availability. Attacks such as phishing, malware, ransomware, data breaches, and network-based attacks continue to increase and pose serious risks to organizations and individuals. This study aims to examine the concepts, threats, and protection strategies in information security based on scientific literature. The research method used is a literature review by analyzing 20 references published between 2020 and 2025 related to information security, information system security, network security, cryptography, and risk management. The results indicate that effective information security requires an integrated approach involving technical controls, security policies, risk management, and user awareness.
References
ENISA. (2023). ENISA Threat Landscape 2023. European Union Agency for Cybersecurity.
ISO/IEC. (2022). ISO/IEC 27001: Information Security Management Systems. ISO.
NIST. (2020). Cybersecurity Framework Version 1.1. National Institute of Standards and Technology.
Rahardjo, B. (2020). Keamanan informasi sebagai aset strategis organisasi. Jurnal Teknologi Informasi, 7(1), 1–10.
Nugroho, A. (2021). Implementasi ISO/IEC 27001 dalam sistem manajemen keamanan informasi. Jurnal Sistem Informasi, 17(2), 101–110. Shinta Nurul, A., Anggrainy, S., & Aprelyani, S. (2022). Faktor-faktor yang mempengaruhi keamanan sistem informasi. JEMSI, 3(5), 564–571.
Kaspersky. (2021). IT Security Risks Survey Report. Kaspersky Lab.
IBM Security. (2022). Cost of a Data Breach Report. IBM Corporation.
Cisco. (2023). Cybersecurity Threat Trends Report. Cisco Systems.
Microsoft. (2024). Digital Defense Report. Microsoft Corporation.
Alasmary, W., et al. (2021). Measuring cyber security awareness. Computers & Security, 104, 102211.
Alzahrani, A., & Alomar, N. (2020). Cybersecurity challenges. Journal of Information Security, 11(3), 145–160.
Behl, A., & Behl, K. (2022). Cybersecurity and cyberwar. Technological Forecasting and Social Change, 175, 121347.
Conti, M., et al. (2021). A survey on man-in-the-middle attacks. IEEE Communications Surveys & Tutorials, 23(3), 2021–2048.
Kumar, S., & Somani, G. (2020). Security issues in cloud computing. Journal of Cloud Computing, 9(1), 1–14.
Nguyen, T., et al. (2023). Network intrusion detection using ML. IEEE Access, 11, 55632–55645.
Rahman, A., et al. (2024). Cyber threat intelligence. Future Internet, 16(2), 45.
Singh, J., et al. (2021). Ransomware attacks and mitigation. Journal of Cyber Security Technology, 5(2), 65–82.
Sarker, I. H. (2021). Cybersecurity data science. Computers & Security, 102, 102166.
Zhao, R., et al. (2025). Advances in information security management. Information Systems Frontiers, 27(1), 1–15.



