Security Analysis of Information Technology Infrastructure in Facing Cybersecurity Threats
Keywords:
Keamanan Infrastruktur TI, Ancaman Cybersecurity, Analisis Tren CybersecurityAbstract
In the ever-growing digital era, Information Technology (IT) infrastructure security has become an urgent need. Cybersecurity threats are increasingly complex and diverse, requiring organizations to adopt a proactive approach to protecting systems and data. This research aims to conduct an IT infrastructure security analysis and identify effective strategies in dealing with cyber security threats. The research method used is literature study, with a focus on the latest literature discussing cyber security, IT infrastructure and related technologies. The analysis was conducted to evaluate commonly used security frameworks and identify current trends, challenges and solutions in addressing cybersecurity threats. The research results show that successful IT infrastructure security requires a holistic approach that includes technical aspects, policies and human resource training. Regular software updates, implementation of advanced security technologies, and proactive monitoring can help reduce the risk of cyber threats. In addition, strict security policies and ongoing training for personnel are key to mitigating risks.
References
Ar Rahman, L. L. (2020). Implications of Defense Diplomacy on Cybersecurity in Context Security Politics. Jurnal Diplomasi Pertahanan, 6(2), 1. ISSN 2746-8496.
Kusumaatmadja, M. (1990). Keamanan Nasional Indonesia: Konsep, Strategi, dan Pelaksanaannya. Jakarta: Bina Aksara.
Vimy, T., Wiranto, S., Rudiyanto, R., Widodo, P., & Suwarno, P. (2022). Ancaman Serangan Siber pada Keamanan Nasional Indonesia. Jurnal Kewarganegaraan, 6(1)
Santoso, K. I. (2018). Memperkuat Pertahanan Siber Guna Meningkatkan Ketahanan Nasional. Lemhannas RI
Al-Masri, M. A. (2018). A Framework for Information Availability Management. Journal of Information Security, 6(1).
Andhika Gusni, R. S., Kraugusteeliana, & Pradnyana, I. W. W. (2021). Analisis Tata Kelola Keamanan Sistem Informasi Rumah Sakit Bhayangkara Sespima Polri Jakarta Menggunakan COBIT 2019. In Seminar Nasional Mahasiswa Ilmu Komputer dan Aplikasinya (SENAMIKA) (pp. 420). Jakarta, Indonesia: Universitas Pembangunan Nasional Veteran Jakarta. e-ISBN 978-623-93343-4-5.
Farizy, S., & Eriana, E. S. (2022). Keamanan Sistem Informasi. Tangerang Selatan: Unpam Press. ISBN: 978-623-6352-68-7.
Samal, A. K. (2018). A Security in Depth Framework for Enterprise Information Systems. ACM Transactions on Information Systems Security, 16(3).
Budi, E. (2021). Strategies For Strengthening Cyber Security To Achieve National Security in Society 5.0. Prosiding Seminar Nasional Sains Teknologi dan Inovasi Indonesia, Volume 3, 223-234. DOI: 10.54706/senastindo.v3.2021.141
Farizy, S., & Eriana, E. S. (2022). Keamanan Sistem Informasi. Tangerang Selatan: Unpam Press. ISBN: 978-623-6352-68-7.
Ginanjar, Y. (2022). Strategi Indonesia Membentuk Cyber Security dalam Menghadapi Ancaman Cyber Crime Melalui Badan Siber dan Sandi Negara. Jurnal Dinamika Global, 7(2). https://doi.org/10.36859/jdg.v7i02.1187
Whitman, M., & Mattord, H. (2018). Managing Information Security Risks: A Practical Approach. Pearson Education.
Anshori, F. A., Suprapto, & Perdanakusuma, A. R. (2019). Perencanaan Keamanan Informasi Berdasarkan Analisis Risiko Teknologi Informasi Menggunakan Metode OCTAVE dan ISO 27001 (Studi Kasus Bidang IT Kepolisian Daerah Banten). Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, 3(2), 1701-1707. http://j-ptiik.ub.ac.id.
Nurdin, I. M., & Budiman, M. A. (2021). Implementasi Manajemen Risiko dalam Meningkatkan Keamanan Informasi. Jurnal Manajemen Risiko, 3(2), Desember 2021.
Nugraheni, A. F. D., & Nurcahyani, I. S. R. (2022). Penerapan Manajemen Risiko Keamanan Informasi dalam Organisasi. Jurnal Ilmiah Teknologi Informasi dan Komunikasi, 16(2), November 2022.
Najib, W. (2020). Tinjauan Ancaman dan Solusi Keamanan pada Teknologi Internet of Things (Review on Security Threat and Solution of Internet of Things Technology). Jurnal Nasional Teknik Elektro dan Teknologi Informasi, 9(4), 375. ISSN 2301-4156.
Sanjaya, B. R., Efrianti, D., Ali, M., Prasetyo, T., Mukhtadi, M., Widasari, Y. K., & Khumairoh, Z. (2022). Pengembangan Cyber Security dalam Menghadapi Cyber Warfare di Indonesia. Journal of Advanced Research in Defense and Security Studies, 1(1), 19-34. Available online at: https://ejournal.hakhara-institute.org/index.php/JARDS
Creswell, J. W., & Plano Clark, V. L. (1993). Qualitative Research: A Review of the Methods and Techniques. Journal of Social Work Education, 29(3), Fall 1993.
Ramadhani, M. R. (2020). Analisis Kesadaran Cybersecurity Pada Pengguna Media Sosial Di Indonesia. Yogyakarta: Fakultas Teknologi Industri UII.
Rahmawati, C. (2019). Tantangan Dan Ancaman Keamanan Siber Indonesia Di Era Revolusi Industri 4.0. Seminar Nasional Sains Teknologi dan Inovasi Indonesia (SENASTINDO AAU), Vol. 1(1), 299-306. ISSN 2685-8991.
Farizy, S., & Eriana, E. S. (2022). Keamanan Sistem Informasi. Tangerang Selatan: Unpam Press. ISBN: 978-623-6352-68-7.
Budi, E. (2021). Strategies For Strengthening Cyber Security To Achieve National Security in Society 5.0. Prosiding Seminar Nasional Sains Teknologi dan Inovasi Indonesia, Volume 3, 223-234. DOI: 10.54706/senastindo.v3.2021.141.
Turki, Ž., de Soto, B. G., Mantha, B. R. K., Maciel, A., & Georgescu, A. (2022). "A Systemic Framework for Addressing Cybersecurity in Construction." Automation in Construction, 133, 103988. https://doi.org/10.1016/j.autcon.2021.103988
Mahendra, V. (2023). Perancangan Kerangka Kerja Keamanan Siber Menggunakan NIST Cybersecurity Framework dan CIS Controls. Universitas Bina Nusantara, Jakarta.
Tanque, M., & Foxwell, H. J. (2023). Risiko Dunia Maya pada Platform IoT dan Solusi Zero Trust. Kemajuan Komputer, 131, 79-148. https://doi.org/10.1016/bs.adcom.2023.04.003
TI. Haullussy, C. A. F. (2019). Audit Sistem Informasi Pelayanan Menggunakan Framework COBIT 4.1: Studi Kasus di Dinas Perpustakaan dan Kearsipan Kota Salatiga. Artikel Ilmiah. Universitas Kristen Satya Wacana, Salatiga
Aptika. (2016, March 10). Kebijakan Keamanan dan Pertahanan Siber. Aptika. https://aptika.kominfo.go.id/2016/03/kebijakan-keamanan-dan-pertahanan-siber/