Pelatihan Keamanan Siber Dasar Untuk Pelajar Dan Guru Di Sekolah Menengah

Authors

  • Tati Suprapti STMIK IKMI Cirebon
  • Umi Hayati STMIK IKMI Cirebon
  • Alwan Azhar STMIK IKMI Cirebon
  • Andi Ardiansyah STMIK IKMI Cirebon

Keywords:

Keamanan Siber, Pelajar, Guru, Sekolah Menengah, Perlindungan Data, Ancaman Digital, Pencegahan

Abstract

Cybersecurity is an effort that aims to protect computer systems, networks, software, and data from various digital threats such as hacking, malware, phishing, ransomware, and other attacks that can cause both material and non-material losses. In the rapidly growing digital era, especially in educational environments such as secondary schools, awareness of the importance of cybersecurity is crucial. Students and teachers who use digital devices in the teaching and learning process are often easy targets for cyber criminals who are looking for loopholes to exploit security vulnerabilities. A basic understanding of cybersecurity needs to be instilled in students and teachers so that they can identify potential threats and implement appropriate preventive measures. This article aims to provide practical guidance in recognizing common types of cyber threats, such as phishing attacks that masquerade as legitimate sites or messages, malware that infiltrates through infected software, and ransomware attacks that encrypt data for ransom. In addition, the article also outlines a number of prevention strategies that students and teachers can implement, including the use of strong passwords, regular software updates, and managing privacy on social media. By understanding the basic concepts of cybersecurity and adopting best practices in protecting digital data and devices, it is hoped that students and teachers can reduce the risks that may arise from unsafe digital activities. Furthermore, effective cybersecurity implementation can create a safer and more conducive learning environment for all parties involved.

References

Anderson, R. (2008). Security Engineering: A Guide to Building Dependable Distributed Systems (2nd ed.). Wiley.

Bishop, M. (2005). Introduction to Computer Security. Addison-Wesley.

Laudon, K. C., & Laudon, J. P. (2016). Management Information Systems: Managing the Digital Firm (14th ed.). Pearson.

Pfleeger, C. P., & Pfleeger, S. L. (2007). Security in Computing (4th ed.). Prentice Hall.

Schneier, B. (2015). Applied Cryptography: Protocols, Algorithms, and Source Code in C (20th Anniversary ed.). Wiley.

Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson.

Whitman, M. E., & Mattord, H. J. (2018). Principles of Information Security (6th ed.). Cengage Learning.

McAfee, Inc. (2020). Cybersecurity Report: The Hidden Costs of Cybercrime. McAfee.

Kaspersky Lab. (2021). Global IT Security Risks Survey. Kaspersky Lab.

NIST. (2020). Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1). National Institute of Standards and Technology.

Published

2023-05-31

How to Cite

Suprapti, T. ., Hayati, U. ., Azhar, A., & Ardiansyah, A. . (2023). Pelatihan Keamanan Siber Dasar Untuk Pelajar Dan Guru Di Sekolah Menengah. AMMA : Jurnal Pengabdian Masyarakat, 2(4), 528–533. Retrieved from https://journal.mediapublikasi.id/index.php/amma/article/view/5218

Similar Articles

<< < 56 57 58 59 60 61 

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)