Mitigasi Ancaman Resiko Keamanan Siber Di Masa Pandemi Covid-19

Yudi Herdiana, Zen Munawar, Novianti Indah Putri

Abstract

Mitigasi keamanan siber diperlukan sebagai perlindungan dari pencurian dan gangguan pada sistem informasi, perangkat lunak dan perangkat keras.  Meningkatnya kecemasan yang disebabkan oleh pandemi meningkatkan kemungkinan serangan siber berhasil sesuai dengan peningkatan jumlah dan jangkauan serangan siber. Peningkatan tingkat serangan siber memiliki dampak yang lebih luas. Penelitian ini mempelajari masalah keamanan siber yang terjadi selama masa pandemi Covid-19. Penelitian ini menganalisis kondisi saat ini dan tindakan kejahatan siber serta serangan jenis serangan siber secara. Penelitian ini juga telah menyediakan berbagai pendekatan praktis mitigasi risiko serangan siber untuk organisasi. Penting bagi organisasi untuk meningkatkan perlindungan data dan aset penting mereka dengan menerapkan pendekatan komprehensif terhadap keamanan siber. Pada bagian kesimpulan, disampaikan beberapa teknik untuk mendeteksi dan menghindari ancaman ini bahkan setelah pandemi direkomendasikan sehingga kerusakan yang disebabkan oleh kejahatan siber dapat dikurangi. Untuk penelitian di masa depan, keamanan siber perlu dikembangkan dengan integrasi teknologi terkini, seperti Artificial Intelligence, Blockchain, Internet of Things, dan masih banyak lagi

Keywords

Keamanan Komputer; Sistem Komputer; Pendemi COVID-19; Keamanan Siber

Full Text:

PDF

References

R. Komalasari, “Manfaat Teknologi Informasi dan Komunikasi di Masa Pandemi Covid 19,†Temat. Teknol. Inf. Dan Komun., vol. 7, no. 1, pp. 38–50, 2020.

Z. Munawar, “Keamanan Pada E-Commerce Usaha Kecil dan Menengah,†Temat. - J. Teknol. Inf. dan Komun., vol. 5, no. 1 SE-Articles, Jun. 2018.

S. Furnell and J. N. Shah, “Home working and cyber security – an outbreak of unpreparedness?,†Comput. Fraud Secur., vol. 2020, no. 8, pp. 6–12, 2020.

N. I. Munawar, Zen and Putri, “Keamanan Jaringan Komputer Pada Era Big Data,†J-SIKA| J. Sist. Inf. Karya Anak Bangsa, vol. 02, no. 01, pp. 14–20, 2020.

S. Hakak, W. Z. Khan, M. Imran, K. K. R. Choo, and M. Shoaib, “Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies,†in IEEE Access, 2020, vol. 8, pp. 124134–124144.

C. Cimpanu, “Czech hospital hit by cyberattack while in the midst of a COVID-19 outbreak,†2020. [Online]. Available: https://www.zdnet.com/article/czech-hospital-hit-by-cyber-attack-while-in-the-midst-of-a-covid-19-outbreak/.

S. Lyngaas, “Hackers target senior executives at German company procuring PPE,†2020. [Online]. Available: https://www.cyberscoop.com/germany-ppe-coronavirus-hackers-ibm/.

A. Alshamrani, S. Myneni, A. Chowdhary, and D. Huang, “A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities,†IEEE Commun. Surv. Tutorials, vol. 21, no. 2, pp. 1851–1877, 2019.

L. Xiao, D. Xu, N. B. Mandayam, and H. V. Poor, “Attacker-Centric View of a Detection Game against Advanced Persistent Threats,†IEEE Trans. Mob. Comput., vol. 17, no. 11, pp. 2512–2523, 2018.

N. C. S. C. (NCSC) and C. and I. S. A. (CISA), “Advisory: COVID- 19 exploited by malicious cyber actors.†[Online]. Available: https://www.ncsc.gov.uk/news/covid-19-exploited-by-cyber-actors-advisory. [Accessed: 11-Nov-2021].

World Economic Forum, COVID19 Risks Outlook: A Preliminary Mapping and Its Implications, no. May. 2020.

S. S. Sjouwerman, “Q1 2020 Coronavirus-Related Phishing Email Attacks Are Up 600%,†2020. [Online]. Available: https://blog.knowbe4.com/%0Aq1-2020-coronavirus-related-phishing-email-attacks-are-up-600. [Accessed: 11-Nov-2020].

C. P. Service, “Cybercrime - prosecution guidance,†2020. [Online]. Available: https://www.cps.gov.uk/legal-guidance/cybercrime-prosecution-guidance. [Accessed: 01-Jan-2021].

UK. National Cyber Security Centre, “Advisory: APT29 targets COVID-19 vaccine development Version 1.1,†2020, no. July.

F. Malecki, “Overcoming the security risks of remote working,†Comput. Fraud Secur., vol. 2020, no. 7, pp. 10–12, 2020.

Y. Herdiana, “Manajemen Resiko Kemanan E-Commerce,†Tematik, vol. 5, no. 1, pp. 17–39, 2018.

S. S. Bhuyan et al., “Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations,†J. Med. Syst., vol. 44, no. 5, 2020.

S. E. Institute, CERT Resilience Management Model (CERT-RMM) Version 1.2, no. February. 2016.

Z. Munawar, N. Suryana, Z. B. Sa’aya, and Y. Herdiana, “Framework With An Approach To The User As An Evaluation For The Recommender Systems,†in 2020 Fifth International Conference on Informatics and Computing (ICIC), 2020, pp. 1–5.

Z. Munawar, B. Siswoyo, and N. S. Herman, “Machine learning approach for analysis of social media,†ADRI Int. Journal. Information. Technol., vol. 1, pp. 5–8, 2017.

Refbacks

  • There are currently no refbacks.