{"id":569,"date":"2025-08-12T19:05:09","date_gmt":"2025-08-12T19:05:09","guid":{"rendered":"https:\/\/online.binus.ac.id\/information-systems\/?p=569"},"modified":"2025-08-13T01:13:36","modified_gmt":"2025-08-13T01:13:36","slug":"569","status":"publish","type":"post","link":"https:\/\/online.binus.ac.id\/information-systems\/2025\/08\/12\/569\/","title":{"rendered":"Cybersecurity: Ancaman dan Strategi Perlindungan di Era Digital"},"content":{"rendered":"<p style=\"text-align: justify\"><span data-contrast=\"auto\">Hai Binusian\u2026<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify\"><span data-contrast=\"auto\">Saat ini banyak sekali informasi terkait keamanan dan ancaman data pribadi.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify\"><span data-contrast=\"auto\">Era digital telah membawa kemudahan luar biasa dalam komunikasi, perdagangan, pendidikan, dan berbagai aspek kehidupan. Namun, perkembangan ini juga membuka peluang bagi meningkatnya ancaman keamanan siber (<\/span><i><span data-contrast=\"auto\">cybersecurity threats<\/span><\/i><span data-contrast=\"auto\">). Menurut laporan Cybersecurity Ventures (2023), kerugian global akibat kejahatan siber diproyeksikan mencapai USD 10,5 triliun per tahun pada 2025. Oleh karena itu, strategi perlindungan siber menjadi krusial bagi individu, organisasi, dan negara.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><span data-contrast=\"auto\">Beberapa ancaman Cybersecurity di Era Digital antara lain:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">Malware, yaitu perangkat lunak berbahaya yang dirancang untuk merusak, mencuri, atau mengganggu data dan sistem. Bentuknya termasuk virus, trojan, dan ransomware (Symantec, 2020).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Phishing. Upaya penipuan untuk mendapatkan informasi sensitif melalui email atau pesan palsu yang terlihat sah (Jakobsson &amp; Myers, 2007).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Serangan DDoS (Distributed Denial of Service). Membanjiri server dengan lalu lintas palsu sehingga layanan menjadi tidak tersedia bagi pengguna yang sah (Mirkovic &amp; Reiher, 2004).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Data Breach. Kebocoran data sensitif akibat peretasan atau kelalaian keamanan, yang dapat merugikan organisasi secara finansial maupun reputasi (Ponemon Institute, 2022).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Social Engineering. Manipulasi psikologis terhadap individu untuk mendapatkan akses ke sistem atau informasi tanpa harus meretas teknologi (Mitnick &amp; Simon, 2002).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/li>\n<\/ol>\n<p style=\"text-align: justify\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><span data-contrast=\"auto\">Untuk menangani hal itu, terdapat beberapa strategi Perlindungan Cybersecurity yang dapat dilakukan, yaitu:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">Peningkatan Kesadaran dan Edukasi<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">: <span class=\"TextRun SCXW258902754 BCX0\" lang=\"EN-ID\" xml:lang=\"EN-ID\" data-contrast=\"auto\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW258902754 BCX0\">Pelatihan<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW258902754 BCX0\">keamanan<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW258902754 BCX0\">siber<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW258902754 BCX0\">bagi<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW258902754 BCX0\">karyawan<\/span><span class=\"NormalTextRun SCXW258902754 BCX0\"> dan <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW258902754 BCX0\">pengguna<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW258902754 BCX0\">untuk<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW258902754 BCX0\">mengenali<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW258902754 BCX0\">ancaman<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW258902754 BCX0\">seperti<\/span><span class=\"NormalTextRun SCXW258902754 BCX0\"> phishing dan malware.<\/span><\/span><span class=\"EOP SCXW258902754 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:709,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/span><\/li>\n<li><span data-contrast=\"auto\">Penggunaan Multi-Factor Authentication (MFA)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">: <span class=\"TextRun SCXW135837785 BCX0\" lang=\"EN-ID\" xml:lang=\"EN-ID\" data-contrast=\"auto\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135837785 BCX0\">Menambahkan<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135837785 BCX0\">lapisan<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135837785 BCX0\">keamanan<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135837785 BCX0\">ekstra<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135837785 BCX0\">selain<\/span><span class=\"NormalTextRun SCXW135837785 BCX0\"> kata <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW135837785 BCX0\">sandi<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135837785 BCX0\">untuk<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135837785 BCX0\">mengakses<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW135837785 BCX0\">sistem<\/span><span class=\"NormalTextRun SCXW135837785 BCX0\"> (Microsoft, 2021).<\/span><\/span><span class=\"EOP SCXW135837785 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:709,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/span><\/li>\n<li><span data-contrast=\"auto\">Penerapan Keamanan Jaringan: <span class=\"TextRun SCXW59378669 BCX0\" lang=\"EN-ID\" xml:lang=\"EN-ID\" data-contrast=\"auto\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW59378669 BCX0\">Menggunakan<\/span><span class=\"NormalTextRun SCXW59378669 BCX0\"> firewall, VPN, dan <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW59378669 BCX0\">sistem<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW59378669 BCX0\">deteksi<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW59378669 BCX0\">intrusi<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW59378669 BCX0\">untuk<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW59378669 BCX0\">melindungi<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW59378669 BCX0\">infrastruktur<\/span><span class=\"NormalTextRun SCXW59378669 BCX0\"> TI.<\/span><\/span><span class=\"EOP SCXW59378669 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:709,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/span><\/li>\n<li><span data-contrast=\"auto\">Pembaruan Sistem dan Patch Management: <span class=\"NormalTextRun SpellingErrorV2Themed SCXW169259072 BCX0\">Memastikan<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW169259072 BCX0\">semua<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW169259072 BCX0\">perangkat<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW169259072 BCX0\">lunak<\/span><span class=\"NormalTextRun SCXW169259072 BCX0\"> dan <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW169259072 BCX0\">sistem<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW169259072 BCX0\">operasi<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW169259072 BCX0\">diperbarui<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW169259072 BCX0\">untuk<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW169259072 BCX0\">menutup<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW169259072 BCX0\">celah<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW169259072 BCX0\">keamanan<\/span><span class=\"NormalTextRun SCXW169259072 BCX0\">.<\/span><\/span><\/li>\n<li><span data-contrast=\"auto\">Enkripsi Data: <span class=\"TextRun SCXW254332698 BCX0\" lang=\"EN-ID\" xml:lang=\"EN-ID\" data-contrast=\"auto\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW254332698 BCX0\">Mengamankan<\/span><span class=\"NormalTextRun SCXW254332698 BCX0\"> data <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW254332698 BCX0\">saat<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW254332698 BCX0\">dikirim<\/span><span class=\"NormalTextRun SCXW254332698 BCX0\"> dan <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW254332698 BCX0\">disimpan<\/span><span class=\"NormalTextRun SCXW254332698 BCX0\">, <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW254332698 BCX0\">sehingga<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW254332698 BCX0\">tidak<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW254332698 BCX0\">dapat<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW254332698 BCX0\">dibaca<\/span><span class=\"NormalTextRun SCXW254332698 BCX0\"> oleh <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW254332698 BCX0\">pihak<\/span><span class=\"NormalTextRun SCXW254332698 BCX0\"> yang <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW254332698 BCX0\">tidak<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW254332698 BCX0\">berwenang<\/span><span class=\"NormalTextRun SCXW254332698 BCX0\">.<\/span><\/span><span class=\"EOP SCXW254332698 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:709,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/span><\/li>\n<\/ol>\n<p style=\"text-align: justify\"><span data-contrast=\"auto\">Jadi, di era digital, ancaman keamanan siber semakin kompleks dan canggih. Perlindungan yang efektif memerlukan kombinasi teknologi, kebijakan, dan kesadaran manusia. Organisasi yang proaktif dalam menerapkan strategi keamanan siber akan lebih siap menghadapi ancaman di masa depan.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify\"><b><span data-contrast=\"auto\">Referensi<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ol>\n<li style=\"text-align: justify\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-contrast=\"auto\">Cybersecurity Ventures. (2023). 2023 Official Cybercrime Report.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:720,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify\"><span data-contrast=\"auto\">Jakobsson, M., &amp; Myers, S. (2007). Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. Wiley.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:720,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify\"><span data-contrast=\"auto\">Microsoft. (2021). Multi-Factor Authentication Guidance.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:720,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify\"><span data-contrast=\"auto\">Mirkovic, J., &amp; Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39\u201353.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:720,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify\"><span data-contrast=\"auto\">Mitnick, K. D., &amp; Simon, W. L. (2002). The Art of Deception: Controlling the Human Element of Security. Wiley.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:720,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify\"><span data-contrast=\"auto\">Ponemon<\/span><span data-contrast=\"auto\"> Institute. (2022). <\/span><i><span data-contrast=\"auto\">Cost of a Data Breach Report<\/span><\/i><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:720,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify\"><span data-contrast=\"auto\">Symantec. (2020). Internet Security Threat Report<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:0,&quot;335559740&quot;:360,&quot;335559991&quot;:720,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}\">\u00a0<\/span><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Hai Binusian\u2026\u00a0 Saat ini banyak sekali informasi terkait keamanan dan ancaman data pribadi.\u00a0 Era digital telah membawa kemudahan luar biasa dalam komunikasi, perdagangan, pendidikan, dan berbagai aspek kehidupan. Namun, perkembangan ini juga membuka peluang bagi meningkatnya ancaman keamanan siber (cybersecurity threats). Menurut laporan Cybersecurity Ventures (2023), kerugian global akibat kejahatan siber diproyeksikan mencapai USD 10,5 [&hellip;]<\/p>\n","protected":false},"author":703,"featured_media":570,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[10,29,9,11,14],"class_list":["post-569","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-article","tag-binus-online","tag-cyber-security","tag-information-systems","tag-kuliah-fleksibel-karir-meningkat","tag-transformasi-digital"],"_links":{"self":[{"href":"https:\/\/online.binus.ac.id\/information-systems\/wp-json\/wp\/v2\/posts\/569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/online.binus.ac.id\/information-systems\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/online.binus.ac.id\/information-systems\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/online.binus.ac.id\/information-systems\/wp-json\/wp\/v2\/users\/703"}],"replies":[{"embeddable":true,"href":"https:\/\/online.binus.ac.id\/information-systems\/wp-json\/wp\/v2\/comments?post=569"}],"version-history":[{"count":2,"href":"https:\/\/online.binus.ac.id\/information-systems\/wp-json\/wp\/v2\/posts\/569\/revisions"}],"predecessor-version":[{"id":572,"href":"https:\/\/online.binus.ac.id\/information-systems\/wp-json\/wp\/v2\/posts\/569\/revisions\/572"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/online.binus.ac.id\/information-systems\/wp-json\/wp\/v2\/media\/570"}],"wp:attachment":[{"href":"https:\/\/online.binus.ac.id\/information-systems\/wp-json\/wp\/v2\/media?parent=569"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/online.binus.ac.id\/information-systems\/wp-json\/wp\/v2\/categories?post=569"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/online.binus.ac.id\/information-systems\/wp-json\/wp\/v2\/tags?post=569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}