Mitigasi Ancaman Resiko Keamanan Siber Di Masa Pandemi Covid-19
Abstract
Keywords
Full Text:
PDFReferences
R. Komalasari, “Manfaat Teknologi Informasi dan Komunikasi di Masa Pandemi Covid 19,†Temat. Teknol. Inf. Dan Komun., vol. 7, no. 1, pp. 38–50, 2020.
Z. Munawar, “Keamanan Pada E-Commerce Usaha Kecil dan Menengah,†Temat. - J. Teknol. Inf. dan Komun., vol. 5, no. 1 SE-Articles, Jun. 2018.
S. Furnell and J. N. Shah, “Home working and cyber security – an outbreak of unpreparedness?,†Comput. Fraud Secur., vol. 2020, no. 8, pp. 6–12, 2020.
N. I. Munawar, Zen and Putri, “Keamanan Jaringan Komputer Pada Era Big Data,†J-SIKA| J. Sist. Inf. Karya Anak Bangsa, vol. 02, no. 01, pp. 14–20, 2020.
S. Hakak, W. Z. Khan, M. Imran, K. K. R. Choo, and M. Shoaib, “Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies,†in IEEE Access, 2020, vol. 8, pp. 124134–124144.
C. Cimpanu, “Czech hospital hit by cyberattack while in the midst of a COVID-19 outbreak,†2020. [Online]. Available: https://www.zdnet.com/article/czech-hospital-hit-by-cyber-attack-while-in-the-midst-of-a-covid-19-outbreak/.
S. Lyngaas, “Hackers target senior executives at German company procuring PPE,†2020. [Online]. Available: https://www.cyberscoop.com/germany-ppe-coronavirus-hackers-ibm/.
A. Alshamrani, S. Myneni, A. Chowdhary, and D. Huang, “A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities,†IEEE Commun. Surv. Tutorials, vol. 21, no. 2, pp. 1851–1877, 2019.
L. Xiao, D. Xu, N. B. Mandayam, and H. V. Poor, “Attacker-Centric View of a Detection Game against Advanced Persistent Threats,†IEEE Trans. Mob. Comput., vol. 17, no. 11, pp. 2512–2523, 2018.
N. C. S. C. (NCSC) and C. and I. S. A. (CISA), “Advisory: COVID- 19 exploited by malicious cyber actors.†[Online]. Available: https://www.ncsc.gov.uk/news/covid-19-exploited-by-cyber-actors-advisory. [Accessed: 11-Nov-2021].
World Economic Forum, COVID19 Risks Outlook: A Preliminary Mapping and Its Implications, no. May. 2020.
S. S. Sjouwerman, “Q1 2020 Coronavirus-Related Phishing Email Attacks Are Up 600%,†2020. [Online]. Available: https://blog.knowbe4.com/%0Aq1-2020-coronavirus-related-phishing-email-attacks-are-up-600. [Accessed: 11-Nov-2020].
C. P. Service, “Cybercrime - prosecution guidance,†2020. [Online]. Available: https://www.cps.gov.uk/legal-guidance/cybercrime-prosecution-guidance. [Accessed: 01-Jan-2021].
UK. National Cyber Security Centre, “Advisory: APT29 targets COVID-19 vaccine development Version 1.1,†2020, no. July.
F. Malecki, “Overcoming the security risks of remote working,†Comput. Fraud Secur., vol. 2020, no. 7, pp. 10–12, 2020.
Y. Herdiana, “Manajemen Resiko Kemanan E-Commerce,†Tematik, vol. 5, no. 1, pp. 17–39, 2018.
S. S. Bhuyan et al., “Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations,†J. Med. Syst., vol. 44, no. 5, 2020.
S. E. Institute, CERT Resilience Management Model (CERT-RMM) Version 1.2, no. February. 2016.
Z. Munawar, N. Suryana, Z. B. Sa’aya, and Y. Herdiana, “Framework With An Approach To The User As An Evaluation For The Recommender Systems,†in 2020 Fifth International Conference on Informatics and Computing (ICIC), 2020, pp. 1–5.
Z. Munawar, B. Siswoyo, and N. S. Herman, “Machine learning approach for analysis of social media,†ADRI Int. Journal. Information. Technol., vol. 1, pp. 5–8, 2017.
Refbacks
- There are currently no refbacks.