TANTANGAN TERKINI DALAM KEAMANAN INFORMASI ANALISIS RESIKO DAN UPAYA PERLINDUNGAN
DOI:
https://doi.org/10.59024/jise.v2i1.529Abstract
Threats and attacks that can result in leaks of personal or sensitive data or reduced business performance have a significant impact on the security of networks and information systems. Insider attacks, eavesdropping, misconfiguration, missing functionality, confusion, man-in- attacks, virus attacks, denial of service attacks are some of the dangers that threaten your network security or threaten the security of your network. Attacks are possible. Influencing information systems. Companies risk losing information appropriate security measures, such as network and information system security. You can implement the right security solutions to predict and prevent various security risks and attacks. Confidentiality, integrity, and availability are three characteristics of security, and to determine which security technology best suits your organization's needs, you must first compare the various threats and attacks with the security technologies in use. Recommended security technologies intrusion detection systems (IDS), antivirus programs, and encryption systems. This is because this technology relies on predicting and protecting networks and information systems in many security elements.
References
Alabady, S. (2009). Design and Implementation of a Network Security Model for Cooperative Network. International Arab Journal of E- Technology, 1(2), 26–36.
Bays, L. R., Oliveira, R. R., Barcellos, M. P., Gaspary, L. P., & Mauro Madeira, E. R. (2015). Virtual network security: threats, countermeasures, and challenges. Journal of Internet Services and Applications, 6(1), 1–19. https://doi.org/10.1186/s13174-014-0015-z
Bhatia, P., & Sehrawat, R. (2014). Type of Security Threats and its Prevention. IJSRD- International Journal for Scientific Research & Development|, 2(08), 2321–0613. Retrieved from www.ijsrd.com
Choubey, R. K., & Hashmi, A. (2018). Cryptographic Techniques in Information Security, 3(1), 854–859.
Conteh, N. Y., & Schmick, P. J. (2016). Cybersecurity:risks, vulnerabilities and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research, 6(23), 31–38. https://doi.org/10.19101/ijacr.2016.623006Farooq, U. (2018). Network Security Challenges, (August), 2–7.
FatemehSoleimaniRoozbahani,&ReihanehAzad.https://doi.org/10.13140/RG.2.2.27478.34885
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Parida Amalia, Muhammad Irwan Padli Nasution
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.