Analisis Pola Penyebaran dan Dampak Virus Trojan Horse terhadap Keamanan Sistem Komputer

Authors

  • Gilang Akbar Hadikosyah Universitas Malikussaleh, Indonesia Author
  • Nurul Firzatul Zannah Universitas Malikussaleh, Indonesia Author
  • Sara Yulistia Universitas Malikussaleh, Indonesia Author
  • M Rizky Febrian Universitas Malikussaleh, Indonesia Author
  • Fhadli Maulana Universitas Malikussaleh, Indonesia Author
  • Rianda Sulthan Universitas Malikussaleh, Indonesia Author

DOI:

https://doi.org/10.62671/jikum.v2i1.153

Keywords:

Trojan Horse, computer virus, system security, malware, cyber threat

Abstract

The rapid advancement of information technology has significantly increased the use of computer systems in daily activities. Alongside these developments, cyber threats have also grown, one of the most prevalent being the Trojan Horse virus. Trojan Horse is a type of malware that disguises itself as a legitimate program in order to deceive users and gain unauthorized access to computer systems. This study aims to analyze the patterns of Trojan Horse virus propagation, examine its impacts on computer system security, and identify effective prevention and mitigation strategies. The research method used is a literature review by analyzing books, scientific journals, and credible online sources related to Trojan Horse malware and information system security. The results show that Trojan Horse viruses commonly spread through email attachments, malicious downloads, fake software, and social engineering techniques. The impacts include data theft, system performance degradation, unauthorized remote access, and disruption of organizational operations. Therefore, comprehensive security measures combining technical controls and user awareness are essential to minimize Trojan Horse attacks.

References

Boyarchuk, O., Mariani, S., Ortolani, S., & Vigna, G. (2023). Keeping Up with the Emotets: Tracking a Multi-infrastructure Botnet. Digital Threats: Research and Practice, 4(3). https://doi.org/10.1145/3594554

Damanik, A. R., Seta, H. B., & Theresiawati, T. (2023). Analisis Trojan Dan Spyware Menggunakan Metode Hybrid Analysis. Jurnal Ilmiah Matrik, 25(1), 89–97. https://doi.org/10.33557/jurnalmatrik.v25i1.2327

Departement for Science, I. and T. (2025). Cyber Security Breaches Survey 2025. https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2025/cyber-security-breaches-survey-2025

Faul, C., Robinson, J., Carey, J., McArdle, O., Ryan, L., Woods, R., & McClean, B. (2022). Effect of the Cyberattack Targeting the Irish Health System in May 2021 on Radiation Treatment at St. Luke’s Radiation Oncology Network. Advances in Radiation Oncology, 7(5), 100993. https://doi.org/10.1016/j.adro.2022.100993

Grammatikakis, K. P., Koufos, I., Kolokotronis, N., Vassilakis, C., & Shiaeles, S. (2021). Understanding and mitigating banking trojans: From Zeus to emotet. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience, CSR 2021, July, 121–128. https://doi.org/10.1109/CSR51186.2021.9527960

Harahap, A. H. H., Andani, C. D., Christie, A., Nurhaliza, D., & Fauzi, A. (2023). Pentingnya Peranan CIA Triad Dalam Keamanan Informasi dan Data Untuk Pemangku Kepentingan atau Stakholder. Jurnal Manajemen Dan Pemasaran Digital, 1(2), 73–83. https://doi.org/10.38035/jmpd.v1i2.34

IBM. (2024). Cost of a Data Breach Report Table of contents. IBM Report.

Kour, R., Karim, R., Dersin, P., & Venkatesh, N. (2024). Cybersecurity for Industry 5.0: trends and gaps. Frontiers in Computer Science, 6(July). https://doi.org/10.3389/fcomp.2024.1434436

Maulana, M. S. (2022). Laporan Riset Mendalam: Analisis Komprehensif tentang Trojan Pengenalan dan Sejarah Trojan. https://www.researchgate.net/publication/394511234

Xiao, W., Xu, X., Chen, J., Zhang, H., & Zhang, Y. (2025).

Downloads

Published

2026-01-02

How to Cite

Hadikosyah, G. A., Zannah, N. F. ., Yulistia, S., Febrian, M. R. ., Maulana, F. ., & Sulthan, R. . (2026). Analisis Pola Penyebaran dan Dampak Virus Trojan Horse terhadap Keamanan Sistem Komputer. JIKUM: Jurnal Ilmu Komputer, 2(1), 47-52. https://doi.org/10.62671/jikum.v2i1.153

How to Cite

Hadikosyah, G. A., Zannah, N. F. ., Yulistia, S., Febrian, M. R. ., Maulana, F. ., & Sulthan, R. . (2026). Analisis Pola Penyebaran dan Dampak Virus Trojan Horse terhadap Keamanan Sistem Komputer. JIKUM: Jurnal Ilmu Komputer, 2(1), 47-52. https://doi.org/10.62671/jikum.v2i1.153