Security Analysis of Information Technology Infrastructure in Facing Cybersecurity Threats

Authors

  • Mohammad Omer Hoshmand Universitas Islam Negeri Syarif Hidayatullah Jakarta
  • Suci Ratnawati Universitas Islam Negeri Syarif Hidayatullah Jakarta
https://doi.org/10.58466/aicoms.v2i2.1253

Keywords:

Keamanan Infrastruktur TI, Ancaman Cybersecurity, Analisis Tren Cybersecurity

Abstract

In the ever-growing digital era, Information Technology (IT) infrastructure security has become an urgent need. Cybersecurity threats are increasingly complex and diverse, requiring organizations to adopt a proactive approach to protecting systems and data. This research aims to conduct an IT infrastructure security analysis and identify effective strategies in dealing with cyber security threats. The research method used is literature study, with a focus on the latest literature discussing cyber security, IT infrastructure and related technologies. The analysis was conducted to evaluate commonly used security frameworks and identify current trends, challenges and solutions in addressing cybersecurity threats. The research results show that successful IT infrastructure security requires a holistic approach that includes technical aspects, policies and human resource training. Regular software updates, implementation of advanced security technologies, and proactive monitoring can help reduce the risk of cyber threats. In addition, strict security policies and ongoing training for personnel are key to mitigating risks.

References

Ar Rahman, L. L. (2020). Implications of Defense Diplomacy on Cybersecurity in Context Security Politics. Jurnal Diplomasi Pertahanan, 6(2), 1. ISSN 2746-8496.

Kusumaatmadja, M. (1990). Keamanan Nasional Indonesia: Konsep, Strategi, dan Pelaksanaannya. Jakarta: Bina Aksara.

Vimy, T., Wiranto, S., Rudiyanto, R., Widodo, P., & Suwarno, P. (2022). Ancaman Serangan Siber pada Keamanan Nasional Indonesia. Jurnal Kewarganegaraan, 6(1)

Santoso, K. I. (2018). Memperkuat Pertahanan Siber Guna Meningkatkan Ketahanan Nasional. Lemhannas RI

Al-Masri, M. A. (2018). A Framework for Information Availability Management. Journal of Information Security, 6(1).

Andhika Gusni, R. S., Kraugusteeliana, & Pradnyana, I. W. W. (2021). Analisis Tata Kelola Keamanan Sistem Informasi Rumah Sakit Bhayangkara Sespima Polri Jakarta Menggunakan COBIT 2019. In Seminar Nasional Mahasiswa Ilmu Komputer dan Aplikasinya (SENAMIKA) (pp. 420). Jakarta, Indonesia: Universitas Pembangunan Nasional Veteran Jakarta. e-ISBN 978-623-93343-4-5.

Farizy, S., & Eriana, E. S. (2022). Keamanan Sistem Informasi. Tangerang Selatan: Unpam Press. ISBN: 978-623-6352-68-7.

Samal, A. K. (2018). A Security in Depth Framework for Enterprise Information Systems. ACM Transactions on Information Systems Security, 16(3).

Budi, E. (2021). Strategies For Strengthening Cyber Security To Achieve National Security in Society 5.0. Prosiding Seminar Nasional Sains Teknologi dan Inovasi Indonesia, Volume 3, 223-234. DOI: 10.54706/senastindo.v3.2021.141

Farizy, S., & Eriana, E. S. (2022). Keamanan Sistem Informasi. Tangerang Selatan: Unpam Press. ISBN: 978-623-6352-68-7.

Ginanjar, Y. (2022). Strategi Indonesia Membentuk Cyber Security dalam Menghadapi Ancaman Cyber Crime Melalui Badan Siber dan Sandi Negara. Jurnal Dinamika Global, 7(2). https://doi.org/10.36859/jdg.v7i02.1187

Whitman, M., & Mattord, H. (2018). Managing Information Security Risks: A Practical Approach. Pearson Education.

Anshori, F. A., Suprapto, & Perdanakusuma, A. R. (2019). Perencanaan Keamanan Informasi Berdasarkan Analisis Risiko Teknologi Informasi Menggunakan Metode OCTAVE dan ISO 27001 (Studi Kasus Bidang IT Kepolisian Daerah Banten). Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, 3(2), 1701-1707. http://j-ptiik.ub.ac.id.

Nurdin, I. M., & Budiman, M. A. (2021). Implementasi Manajemen Risiko dalam Meningkatkan Keamanan Informasi. Jurnal Manajemen Risiko, 3(2), Desember 2021.

Nugraheni, A. F. D., & Nurcahyani, I. S. R. (2022). Penerapan Manajemen Risiko Keamanan Informasi dalam Organisasi. Jurnal Ilmiah Teknologi Informasi dan Komunikasi, 16(2), November 2022.

Najib, W. (2020). Tinjauan Ancaman dan Solusi Keamanan pada Teknologi Internet of Things (Review on Security Threat and Solution of Internet of Things Technology). Jurnal Nasional Teknik Elektro dan Teknologi Informasi, 9(4), 375. ISSN 2301-4156.

Sanjaya, B. R., Efrianti, D., Ali, M., Prasetyo, T., Mukhtadi, M., Widasari, Y. K., & Khumairoh, Z. (2022). Pengembangan Cyber Security dalam Menghadapi Cyber Warfare di Indonesia. Journal of Advanced Research in Defense and Security Studies, 1(1), 19-34. Available online at: https://ejournal.hakhara-institute.org/index.php/JARDS

Creswell, J. W., & Plano Clark, V. L. (1993). Qualitative Research: A Review of the Methods and Techniques. Journal of Social Work Education, 29(3), Fall 1993.

Ramadhani, M. R. (2020). Analisis Kesadaran Cybersecurity Pada Pengguna Media Sosial Di Indonesia. Yogyakarta: Fakultas Teknologi Industri UII.

Rahmawati, C. (2019). Tantangan Dan Ancaman Keamanan Siber Indonesia Di Era Revolusi Industri 4.0. Seminar Nasional Sains Teknologi dan Inovasi Indonesia (SENASTINDO AAU), Vol. 1(1), 299-306. ISSN 2685-8991.

Farizy, S., & Eriana, E. S. (2022). Keamanan Sistem Informasi. Tangerang Selatan: Unpam Press. ISBN: 978-623-6352-68-7.

Budi, E. (2021). Strategies For Strengthening Cyber Security To Achieve National Security in Society 5.0. Prosiding Seminar Nasional Sains Teknologi dan Inovasi Indonesia, Volume 3, 223-234. DOI: 10.54706/senastindo.v3.2021.141.

Turki, Ž., de Soto, B. G., Mantha, B. R. K., Maciel, A., & Georgescu, A. (2022). "A Systemic Framework for Addressing Cybersecurity in Construction." Automation in Construction, 133, 103988. https://doi.org/10.1016/j.autcon.2021.103988

Mahendra, V. (2023). Perancangan Kerangka Kerja Keamanan Siber Menggunakan NIST Cybersecurity Framework dan CIS Controls. Universitas Bina Nusantara, Jakarta.

Tanque, M., & Foxwell, H. J. (2023). Risiko Dunia Maya pada Platform IoT dan Solusi Zero Trust. Kemajuan Komputer, 131, 79-148. https://doi.org/10.1016/bs.adcom.2023.04.003

TI. Haullussy, C. A. F. (2019). Audit Sistem Informasi Pelayanan Menggunakan Framework COBIT 4.1: Studi Kasus di Dinas Perpustakaan dan Kearsipan Kota Salatiga. Artikel Ilmiah. Universitas Kristen Satya Wacana, Salatiga

Aptika. (2016, March 10). Kebijakan Keamanan dan Pertahanan Siber. Aptika. https://aptika.kominfo.go.id/2016/03/kebijakan-keamanan-dan-pertahanan-siber/

Published

2023-12-13

How to Cite

Omer Hoshmand, M. ., & Ratnawati , S. . (2023). Security Analysis of Information Technology Infrastructure in Facing Cybersecurity Threats. Applied Information Technology and Computer Science (AICOMS), 2(2), 9-18. https://doi.org/10.58466/aicoms.v2i2.1253

Issue

Section

Artikel