Evaluasi Sistem Keamanan Komputer: Analisis Ancaman, Kriptografi, dan Perlindungan Data Modern
DOI:
https://doi.org/10.62671/jikum.v2i1.138Keywords:
computer security, cryptography, malware, firewall, steganographyAbstract
Computer security plays a crucial role in protecting the confidentiality, integrity, and availability of digital information in modern computing environments. This study evaluates key computer security components through an analysis of threat models, operating system security mechanisms, cryptographic approaches, and modern data protection techniques. The research reviews user management, firewall configuration, system updates, and layered defense strategies, as well as the characteristics and propagation of contemporary malware such as ransomware, spyware, and network-based attacks. Classical and modern cryptographic methods, hashing functions, digital signatures, and steganography are also examined as essential elements in ensuring secure information processing. Using a descriptive qualitative method supported by literature studies and system observations, the findings indicate that effective computer security requires a multilayered approach supported by consistent system maintenance and increased user awareness to mitigate evolving cyber threats.
References
Bishop, M. (2019). Computer Security: Art and Science (2nd ed.). Addison-Wesley Professional.
Conti, M., Dragoni, N., & Lesyk, V. (2018). A Survey of Ransomware Prevention and Mitigation Solutions. ACM Computing Surveys (CSUR), 51(1), 1–36. https://doi.org/10.1145/3214301
Ilham, D. N., Hardisal, H., Balkhaya, B., Candra, R. A., & Sipahutar, E. (2019). Heart Rate Monitoring and Stimulation with the Internet of Thing-Based (IoT) Alquran Recitation. SinkrOn, 4(1), 221. https://doi.org/10.33395/sinkron.v4i1.10392
Ilham, D. N., Satria, E., Anugreni, F., Candra, R. A., & Kusumo, H. N. R. A. (2021). Rain Monitoring System for Nutmeg Drying Based on Internet of Things. Journal of Computer Networks, Architecture, and High-Performance Computing, 3(1), 52–57. https://doi.org/10.47709/cnahpc.v3i1.933
Katz, J., & Lindell, Y. (2020). Introduction to Modern Cryptography (3rd ed.). CRC Press. https://doi.org/10.1201/9781351133036
Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (2018). Handbook of Applied Cryptography. CRC Press.
Pfleeger, C. P., & Pfleeger, S. L. (2015). Security in Computing (5th ed.). Prentice Hall.
Richardson, R. (2021). Ransomware: The mounting threat to global cybersecurity. Computer Fraud & Security, 2021(11), 13–15. https://doi.org/10.1016/S1361-3723(21)00118-2
Schneier, B. (2017). Applied Cryptography: Protocols, Algorithms, and Source Code in C (20th Anniv. Ed.). Wiley.
Stallings, W. (2020). Cryptography and Network Security: Principles and Practice (8th ed.). Pearson.
Sutherland, I., Read, H., & Xynos, K. (2018). Forensic Analysis of Ransomware Families. Journal of Information Security and Applications, 39, 1–12. https://doi.org/10.1016/j.jisa.2018.01.002
Whitman, M. E., & Mattord, H. J. (2021). Principles of Information Security (7th ed.). Cengage Learning.



