Keamanan Siber (Cybersecurity)

Cybersecurity: Types, Threats, and Prevention

The flow of information has changed with technological advances in this era. Technological advances provide information that has an important role for every aspect of life, both individually and in groups. One of the advances that has had a great influence is the internet. The presence of the internet provides a huge flow of communication and information for the user community. Quoted from Febriharini (2016) Cyber is a virtual activity that connects or interacts with information and computer systems. With the current flow of communication and information so large that one of the negative impacts that arise is Cyber Crime. Countering Cyber crime requires Cybersecurity (Ardiyanti 2014). Cybersecurity aims to protect systems and applications against viruses, ransomware attacks, and more.

Cyber Attack Protection

The following are the types of cybersecurity according to ibm.com:

1. Critical infrastructure security
2. Network security
3. Endpoint security
4. Application security
5. Cloud security
6. Information security
7. Mobile security

Ancaman Cybersecurity

A. Types of threats in Cybersecurity

Here are the types of cybersecurity threats:

  • Malware
    Malware or malicious software consists of software code including ransomware, Trojans, and spyware.
  • Ransomeware
    Ransomware is a type of malware that steals important data from individuals or groups in order to demand a ransom for that important data.
  • Phising
    Phishing attacks typically use emails, SMS, phone calls, or fake websites to trick users into sharing important data and inserting malware into it.
  • Threats from within
    Cybersecurity threats from internal circles themselves deliberately abuse their legitimate access to crime.
  • Distributed denial of service (DDoS) threats
    DDoS attacks aim to disable or log web applications, cloud services, and websites by sending a lot of spam.
Warning Cybercrime

B. Prevention of using Cybersecurity

Here are some ways to prevent using Cybersecurity, including:

1. Protect user accounts with passwords
A strong password usually consists of 12 characters and several elements such as numbers and symbols.
2. Knowing attacks across various Vectors
Attacks can enter Linux, IoT, and Cloud systems.
3. Creating a Safe Environment
Every user’s environment has the possibility of being attacked by a Cyberattack. For example, ransomware against the government or industries that have profits.

Febriharini MP. 2016. The existence of intellectual property rights against cyber law. – Jurnal Ilmiah
UNTAG Semarang. 5(1): 15-23.
Ardiyanti H. 2014. Cyber-security and its development challenges in Indonesia. Politica. 5(1): 95-110.

https://www.ibm.com/topics/cybersecurity

Leave a Reply

Your email address will not be published. Required fields are marked *