: Information Security, Risk Ana TANTANGAN TERKINI DALAM KEAMANAN INFORMASI ANALISIS RESIKO DAN UPAYA PERLINDUNGAN

TANTANGAN TERKINI DALAM KEAMANAN INFORMASI ANALISIS RESIKO DAN UPAYA PERLINDUNGAN

Authors

  • parida amalia putri
  • Muhammad Irwan Padli Nasution Universitas Islam Negeri Sumatera Utara

DOI:

https://doi.org/10.54964/manajemen.v9i2.378

Keywords:

: Information Security, Risk Analysis and Protection Efforts

Abstract

Threats and attacks that can result in leaks of personal or sensitive data or reduced business performance have a significant impact on the security of networks and information systems. Insider attacks, eavesdropping, misconfiguration, missing functionality, confusion, man-in- attacks, virus attacks, denial of service attacks are some of the dangers that threaten your network security or threaten the security of your network. Attacks are possible. Influencing information systems. Companies risk losing information appropriate security measures, such as network and information system security. You can implement the right security solutions to predict and prevent various security risks and attacks. Confidentiality, integrity, and availability are three characteristics of security, and to determine which security technology best suits your organization's needs, you must first compare the various threats and attacks with the security technologies in use. Recommended security technologies intrusion detection systems (IDS), antivirus programs, and encryption systems. This is because this technology relies on predicting and protecting networks and information systems in many security elements.

 

References

Alabady, S. (2009). Design and Implementation of a Network Security Model for Cooperative Network. International Arab Journal of E- Technology, 1(2), 26–36.

Bays, L. R., Oliveira, R. R., Barcellos, M. P., Gaspary, L. P., & Mauro Madeira, E. R. (2015). Virtual network security: threats, countermeasures, and challenges. Journal of Internet Services and Applications, 6(1), 1–19. https://doi.org/10.1186/s13174-014-0015-z

Bhatia, P., & Sehrawat, R. (2014). Type of Security Threats and its Prevention. IJSRD- International Journal for Scientific Research & Development|, 2(08), 2321–0613. Retrieved from www.ijsrd.com

Choubey, R. K., & Hashmi, A. (2018). Cryptographic Techniques in Information Security, 3(1), 854–859.

Conteh, N. Y., & Schmick, P. J. (2016). Cybersecurity:risks, vulnerabilities and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research, 6(23), 31–38. https://doi.org/10.19101/ijacr.2016.623006Farooq, U. (2018). Network Security Challenges, (August), 2–7.

https://doi.org/10.13140/RG.2.2.27478.34885 Fatemeh Soleimani Roozbahani, & Reihaneh Azad.

Published

05-02-2024

How to Cite

amalia, parida, & Nasution, M. I. P. (2024). : Information Security, Risk Ana TANTANGAN TERKINI DALAM KEAMANAN INFORMASI ANALISIS RESIKO DAN UPAYA PERLINDUNGAN: TANTANGAN TERKINI DALAM KEAMANAN INFORMASI ANALISIS RESIKO DAN UPAYA PERLINDUNGAN. Jurnal Manajemen, 9(2), 40–54. https://doi.org/10.54964/manajemen.v9i2.378