Pengenalan Cyber Security Sebagai Fundamental Keamanan Data Pada Era Digital

Authors

  • Yuda Samudra Universitas Pamulang
  • Amin Hidayat
  • Meidy Fajar Wahyu

Keywords:

cyber security, data security, cyber crime, digital era

Abstract

Cyber ​​crime is a relatively new crime, which is carried out by people who are experts or who have expertise in the field of computers and information technology. When viewed from the perspective of crime, crime through cyberspace (internet) can have an impact inside and outside the virtual world. The limited space and time in carrying out activities using the internet as a medium makes it difficult for an activity in cyberspace to be detected conventionally. In the case of cyber threats, based on data analysis of the ID-SIRTII (Indonesian Security Incident Response Team On Internet Infrastructure) traffic monitoring system, it was noted that the incidence of cyber attacks in Indonesia has reached one million incidents and will increase every day due to system and application weaknesses that do not exist. is known. Protecting digital assets is an important concern, as cyber attacks affect a company's performance and reputation. Many methods and techniques can be used to support the process of directing students to take advantage of great opportunities with the impact of the development of internet technology. One of the introductions to Cyber ​​Security and how to enter personal data on gadget devices that currently students are good at using these devices, but still lacks knowledge about data security. With the introduction of cyber security as fundamental data security in the digital era, it is hoped that students will have an awareness of the importance of personal data so that data does not occur by irresponsible people so as to harm various parties whose data is misused. So, this Community Service Activity aims to provide direction to students by conducting face-to-face counseling with students to introduce the importance of data security in the digital era and support understanding of cyber security and cyber crimes that occur in the current era. This activity is in the form of training materials and practices during the training. The material contains a basic introduction to the impact of training on the advancement of internet technology, how to implement data security, and the application of safe e-commerce usage for personal data security. In preparation for the training, the service team tested the application of data in the use of e-commerce as material which was then discussed during the training. The training was given in the form of a lecture followed by a question and answer session. Starting from the introduction of the impact of post-advancement internet technology, then they will be taught how to apply security data to digital products when transacting online, so that the way the data is known by many people, then students will also be provided with practices on how to use security systems on gadgets and understand how to flow. secure transactions on websites, e-commerce and games. The training was held in the Computer Lab of Madrasah Aliyah Negeri 1, South Tangerang City, so that students could immediately practice what they were learning in this training.

 

Keywords: Cyber Security, Keamanan Data, Era Digital, Data, Cyber Crime

References

Chotimah, H. C. (2019). Tata Kelola Keamanan Siber dan Diplomasi Siber Indonesia di Bawah Kelembagaan Badan Siber dan Sandi Negara [Cyber Security Governance and Indonesian Cyber Diplomacy by National Cyber and Encryption Agency]. Jurnal Politica Dinamika Masalah Politik Dalam Negeri dan Hubungan Internasional, 10(2), 113-128.

Ersya, M. P. (2017). Permasalahan Hukum dalam Menanggulangi Cyber Crime di Indonesia. Journal of Moral and Civic Education, 1(1), 50-62.

Kelrey, A. R., & Muzaki, A. (2019). Pengaruh Ethical Hacking Bagi Keamanan Data Perusahaan. Cyber Security dan Forensik Digital, 2(2), 77-81.

Kwarto, F., & Angsito, M. (2018). Pengaruh Cyber Crime Terhadap Cyber Security Compliance Di Sektor Keuangan. Jurnal Akuntansi Bisnis, 11(2).

McGuire, Mike, and Samantha Dowling, (2013) Cyber crime: A review of the evidence Chapter 4: Improving the cyber crime evidence base

Novianto, F. (2020). EVALUATION OF E-GOVERNMENT INFORMATION SECURITY USING THE DEFENSE IN DEPTH MODEL. Cyber Security dan Forensik Digital, 3(1), 14-19.

Ramadhan, I. (2019). Strategi Keamanan Cyber Security di Kawasan Asia Tenggara. Jurnal Asia Pacific Studies, 3(2), 181-192.

Sama, H., Licen, L., Saragi, J. S. D., Erline, M., Kelvin, K., Hartanto, Y., ... & Devalia, M. (2021). Studi Komparasi Framework NIST dan ISO 27001 sebagai Standar Audit dengan Metode Deskriptif Studi Pustaka. Rabit: Jurnal Teknologi Dan Sistem Informasi Univrab, 6(2), 116-121.

Yudha, F., & Panji, A. M. (2018). Perancangan aplikasi pengujian celah keamanan pada aplikasi berbasis web. Cyber Security Dan Forensik Digital, 1(1), 1-6.

Published

2023-01-02

How to Cite

Yuda Samudra, Amin Hidayat, & Meidy Fajar Wahyu. (2023). Pengenalan Cyber Security Sebagai Fundamental Keamanan Data Pada Era Digital . AMMA : Jurnal Pengabdian Masyarakat, 1(12), 1594–1601. Retrieved from https://journal.mediapublikasi.id/index.php/amma/article/view/1779