TANTANGAN TERKINI DALAM KEAMANAN INFORMASI ANALISIS RESIKO DAN UPAYA PERLINDUNGAN

Authors

  • Parida Amalia Program Studi Manajemen, Fakultas Ekonomi dan Bisnis Islam Universitas Islam Negeri Sumatera Utara, Indonesia
  • Muhammad Irwan Padli Nasution Program Studi Manajemen, Fakultas Ekonomi dan Bisnis Islam Universitas Islam Negeri Sumatera Utara, Indonesia

DOI:

https://doi.org/10.59024/jise.v2i1.529

Abstract

Threats and attacks that can result in leaks of personal or sensitive data or reduced business performance have a significant impact on the security of networks and information systems. Insider attacks, eavesdropping, misconfiguration, missing functionality, confusion, man-in- attacks, virus attacks, denial of service attacks are some of the dangers that threaten your network security or threaten the security of your network. Attacks are possible. Influencing information systems. Companies risk losing information appropriate security measures, such as network and information system security. You can implement the right security solutions to predict and prevent various security risks and attacks. Confidentiality, integrity, and availability are three characteristics of security, and to determine which security technology best suits your organization's needs, you must first compare the various threats and attacks with the security technologies in use. Recommended security technologies intrusion detection systems (IDS), antivirus programs, and encryption systems. This is because this technology relies on predicting and protecting networks and information systems in many security elements.

References

Alabady, S. (2009). Design and Implementation of a Network Security Model for Cooperative Network. International Arab Journal of E- Technology, 1(2), 26–36.

Bays, L. R., Oliveira, R. R., Barcellos, M. P., Gaspary, L. P., & Mauro Madeira, E. R. (2015). Virtual network security: threats, countermeasures, and challenges. Journal of Internet Services and Applications, 6(1), 1–19. https://doi.org/10.1186/s13174-014-0015-z

Bhatia, P., & Sehrawat, R. (2014). Type of Security Threats and its Prevention. IJSRD- International Journal for Scientific Research & Development|, 2(08), 2321–0613. Retrieved from www.ijsrd.com

Choubey, R. K., & Hashmi, A. (2018). Cryptographic Techniques in Information Security, 3(1), 854–859.

Conteh, N. Y., & Schmick, P. J. (2016). Cybersecurity:risks, vulnerabilities and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research, 6(23), 31–38. https://doi.org/10.19101/ijacr.2016.623006Farooq, U. (2018). Network Security Challenges, (August), 2–7.

FatemehSoleimaniRoozbahani,&ReihanehAzad.https://doi.org/10.13140/RG.2.2.27478.34885

Downloads

Published

2023-12-23

How to Cite

Parida Amalia, & Muhammad Irwan Padli Nasution. (2023). TANTANGAN TERKINI DALAM KEAMANAN INFORMASI ANALISIS RESIKO DAN UPAYA PERLINDUNGAN. JURNAL EKONOMI BISNIS DAN MANAJEMEN, 2(1), 24–37. https://doi.org/10.59024/jise.v2i1.529

Issue

Section

Articles