Evaluasi Sistem Keamanan Komputer: Analisis Ancaman, Kriptografi, dan Perlindungan Data Modern

Authors

  • Zul Fadly Universitas Malikussaleh, Indonesia Author
  • Zulkarnaen Lubis Universitas Malikussaleh, Indonesia Author
  • Dendy Rivaldo Alwisyah Universitas Malikussaleh, Indonesia Author
  • Dedy Munandar Universitas Malikussaleh, Indonesia Author
  • Muhammad Riski Afriyansyah Universitas Malikussaleh, Indonesia Author

DOI:

https://doi.org/10.62671/jikum.v2i1.138

Keywords:

computer security, cryptography, malware, firewall, steganography

Abstract

Computer security plays a crucial role in protecting the confidentiality, integrity, and availability of digital information in modern computing environments. This study evaluates key computer security components through an analysis of threat models, operating system security mechanisms, cryptographic approaches, and modern data protection techniques. The research reviews user management, firewall configuration, system updates, and layered defense strategies, as well as the characteristics and propagation of contemporary malware such as ransomware, spyware, and network-based attacks. Classical and modern cryptographic methods, hashing functions, digital signatures, and steganography are also examined as essential elements in ensuring secure information processing. Using a descriptive qualitative method supported by literature studies and system observations, the findings indicate that effective computer security requires a multilayered approach supported by consistent system maintenance and increased user awareness to mitigate evolving cyber threats.

References

Bishop, M. (2019). Computer Security: Art and Science (2nd ed.). Addison-Wesley Professional.

Conti, M., Dragoni, N., & Lesyk, V. (2018). A Survey of Ransomware Prevention and Mitigation Solutions. ACM Computing Surveys (CSUR), 51(1), 1–36. https://doi.org/10.1145/3214301

Ilham, D. N., Hardisal, H., Balkhaya, B., Candra, R. A., & Sipahutar, E. (2019). Heart Rate Monitoring and Stimulation with the Internet of Thing-Based (IoT) Alquran Recitation. SinkrOn, 4(1), 221. https://doi.org/10.33395/sinkron.v4i1.10392

Ilham, D. N., Satria, E., Anugreni, F., Candra, R. A., & Kusumo, H. N. R. A. (2021). Rain Monitoring System for Nutmeg Drying Based on Internet of Things. Journal of Computer Networks, Architecture, and High-Performance Computing, 3(1), 52–57. https://doi.org/10.47709/cnahpc.v3i1.933

Katz, J., & Lindell, Y. (2020). Introduction to Modern Cryptography (3rd ed.). CRC Press. https://doi.org/10.1201/9781351133036

Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (2018). Handbook of Applied Cryptography. CRC Press.

Pfleeger, C. P., & Pfleeger, S. L. (2015). Security in Computing (5th ed.). Prentice Hall.

Richardson, R. (2021). Ransomware: The mounting threat to global cybersecurity. Computer Fraud & Security, 2021(11), 13–15. https://doi.org/10.1016/S1361-3723(21)00118-2

Schneier, B. (2017). Applied Cryptography: Protocols, Algorithms, and Source Code in C (20th Anniv. Ed.). Wiley.

Stallings, W. (2020). Cryptography and Network Security: Principles and Practice (8th ed.). Pearson.

Sutherland, I., Read, H., & Xynos, K. (2018). Forensic Analysis of Ransomware Families. Journal of Information Security and Applications, 39, 1–12. https://doi.org/10.1016/j.jisa.2018.01.002

Whitman, M. E., & Mattord, H. J. (2021). Principles of Information Security (7th ed.). Cengage Learning.

Downloads

Published

2026-01-02

How to Cite

Fadly, Z., Lubis, Z. ., Alwisyah, D. R. ., Munandar, D. ., & Afriyansyah, M. R. . (2026). Evaluasi Sistem Keamanan Komputer: Analisis Ancaman, Kriptografi, dan Perlindungan Data Modern. JIKUM: Jurnal Ilmu Komputer, 2(1), 1-5. https://doi.org/10.62671/jikum.v2i1.138

How to Cite

Fadly, Z., Lubis, Z. ., Alwisyah, D. R. ., Munandar, D. ., & Afriyansyah, M. R. . (2026). Evaluasi Sistem Keamanan Komputer: Analisis Ancaman, Kriptografi, dan Perlindungan Data Modern. JIKUM: Jurnal Ilmu Komputer, 2(1), 1-5. https://doi.org/10.62671/jikum.v2i1.138