Analisis Keamanan Komputer dalam Melindungi Data dari Serangan Siber
DOI:
https://doi.org/10.62671/jikum.v2i1.157Keywords:
computer security, cyber attacks, malware, firewall, data encryptionAbstract
The rapid advancement of information technology has made humans increasingly dependent on computer systems in various aspects of daily life. However, this situation is also accompanied by an increased risk of security threats, such as digital attacks that can disrupt system operations and cause data breaches. Computer security becomes a crucial element to maintain the confidentiality, integrity, and accessibility of information. This study aims to examine the concept of computer security, various types of common threats, and protection strategies that can be implemented to protect data from cyber threats. The research approach applied is a literature review through examination of academic journals, books, and articles related to computer security. The research findings reveal that the implementation of security mechanisms such as antivirus software, firewalls, data encryption, and increasing user awareness can reduce the risk of cyber attacks. The conclusion of this study is that computer security needs to be implemented comprehensively, both from technical and non-technical sides, so that the system is maximally protected.
References
Kurniawan, Y., & Prasetyo, A. (2018). Analisis ancaman dan mekanisme keamanan sistem informasi. Jurnal Informatika dan Sistem Informasi, 4(1), 45–53. https://doi.org/10.36987/jisi.v4i1.512
Nugroho, Y., & Prabowo, H. (2020). Analisis keamanan sistem informasi berbasis jaringan komputer. Jurnal Teknologi dan Sistem Komputer, 8(2), 101–108. https://doi.org/10.14710/jtsiskom.8.2.2020.101-108
Putra, R. A., & Siregar, M. (2019). Penerapan firewall dan enkripsi untuk meningkatkan keamanan data. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 3(3), 412–419. https://doi.org/10.29207/resti.v3i3.1287
Raharjo, B. (2016). Keamanan informasi pada sistem komputer dan jaringan. Jurnal Teknologi Informasi dan Ilmu Komputer, 3(2), 85–94. https://doi.org/10.25126/jtiik.20163285
Santoso, B., & Hidayat, R. (2021). Studi serangan malware dan upaya pencegahannya pada sistem komputer. Jurnal Ilmiah Teknologi Informasi, 9(1), 25–33. https://doi.org/10.33096/jiti.v9i1.742
Stallings, W. (2018). Network security essentials: Applications and standards (6th ed.). Pearson Education.
Whitman, M. E., & Mattord, H. J. (2019). Principles of information security (6th ed.). Cengage Learning.
Al-Ahmad, A., & Mohammad, A. (2020). A survey on intrusion detection systems in computer networks. International Journal of Computer Applications, 176(25), 1–6. https://doi.org/10.5120/ijca2020920430
Behl, A., & Behl, K. (2017). Cyberwar: The next threat to national security and what to do about it. Oxford University Press.
Scarfone, K., & Mell, P. (2012). Guide to intrusion detection and prevention systems (IDPS). National Institute of Standards and Technology (NIST). https://doi.org/10.6028/NIST.SP.800-94



