{"id":23764,"date":"2024-07-01T12:00:45","date_gmt":"2024-07-01T05:00:45","guid":{"rendered":"https:\/\/jakarta.telkomuniversity.ac.id\/cybersecurity-types-threats-and-prevention\/"},"modified":"2024-09-15T02:36:00","modified_gmt":"2024-09-14T19:36:00","slug":"cybersecurity-types-threats-and-prevention","status":"publish","type":"post","link":"https:\/\/jakarta.telkomuniversity.ac.id\/en\/cybersecurity-types-threats-and-prevention\/","title":{"rendered":"Cybersecurity: Types, Threats, and Prevention"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_custom_heading text=&#8221;Cybersecurity: Types, Threats, and Prevention&#8221; font_container=&#8221;tag:h1|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221;][vc_column_text css=&#8221;&#8221;]The flow of information has changed with technological advances in this era. Technological advances provide information that has an important role for every aspect of life, both individually and in groups. One of the advances that has had a great influence is the internet. The presence of the internet provides a huge flow of communication and information for the user community. Quoted from Febriharini (2016) Cyber is a virtual activity that connects or interacts with information and computer systems.     With the current flow of communication and information so large that one of the negative impacts that arise is Cyber Crime. Countering Cyber crime requires Cybersecurity (Ardiyanti 2014). Cybersecurity aims to protect systems and applications against viruses, ransomware attacks, and more.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;22152&#8243; img_size=&#8221;medium&#8221; add_caption=&#8221;yes&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_shadow_3d&#8221; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]The following are the types of cybersecurity according to <a href=\"https:\/\/www.ibm.com\/topics\/cybersecurity\">ibm.com<\/a>:<\/p>\n<p>1. Critical infrastructure security<br \/>2. Network security<br \/>3. Endpoint security<br \/>4. Application security<br \/>5. Cloud security<br \/>6. Information security<br \/>7. Mobile security[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_single_image image=&#8221;22154&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_border&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2>A. Types of threats in Cybersecurity<\/h2>\n<p>Here are the types of cybersecurity threats:<\/p>\n<ul>\n<li><a href=\"https:\/\/jakarta.telkomuniversity.ac.id\/apa-itu-malware\/\">Malware<\/a><br \/>Malware or malicious software consists of software code including ransomware, Trojans, and spyware.<\/li>\n<li><a href=\"https:\/\/jakarta.telkomuniversity.ac.id\/mengenal-ransomware-jenis-evolusi-cara-kerja-dan-penanganan\/\">Ransomeware<\/a><br \/>Ransomware is a type of malware that steals important data from individuals or groups in order to demand a ransom for that important data.<\/li>\n<li>Phising<br \/>Phishing attacks typically use emails, SMS, phone calls, or fake websites to trick users into sharing important data and inserting malware into it.<\/li>\n<li>Threats from within<br \/>Cybersecurity threats from internal circles themselves deliberately abuse their legitimate access to crime.<\/li>\n<li>Distributed denial of service (DDoS) threats<br \/>DDoS attacks aim to disable or log web applications, cloud services, and websites by sending a lot of spam.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_single_image image=&#8221;22168&#8243; img_size=&#8221;medium&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_shadow_3d&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h2>B. Prevention of using Cybersecurity<\/h2>\n<p>Here are some ways to prevent using Cybersecurity, including:<\/p>\n<p>1. Protect user accounts with passwords<br \/>A strong password usually consists of 12 characters and several elements such as numbers and symbols.<br \/>  2. Knowing attacks across various Vectors<br \/>Attacks can enter Linux, IoT, and Cloud systems.<br \/>3. Creating a Safe Environment<br \/>Every user&#8217;s environment has the possibility of being attacked by a Cyberattack. For example, ransomware against the government or industries that have profits.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;&#8221;]Febriharini MP. 2016. The existence of intellectual property rights against cyber law. \u2013 Jurnal Ilmiah<br \/>UNTAG Semarang. 5(1): 15-23.<br \/> Ardiyanti H. 2014. Cyber-security and its development challenges in Indonesia. <em>Politica.<\/em> 5(1): 95-110.<br \/> <br \/>\nhttps:\/\/www.ibm.com\/topics\/cybersecurity[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&#8221;&#8221;]<strong>Baca Juga: <a href=\"https:\/\/jakarta.telkomuniversity.ac.id\/manfaat-menggunakan-wifi-fiber-jaringan-internet-yang-andal\/\">Manfaat Menggunakan WiFi Fiber, Jaringan Internet yang Andal<\/a><\/strong>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_custom_heading text=&#8221;Cybersecurity: Types, Threats, and Prevention&#8221; font_container=&#8221;tag:h1|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221;][vc_column_text css=&#8221;&#8221;]The flow of information has changed with technological advances in this era. Technological advances provide information that has an important role for every aspect of life, both individually and in groups. One of the advances that has had a great influence is the internet. The presence [&hellip;]<\/p>\n","protected":false},"author":37,"featured_media":22133,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"wds_primary_category":0,"footnotes":""},"categories":[685],"tags":[822,821,820,823],"class_list":["post-23764","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education","tag-cyber-crime-en","tag-cybersecurity-en-2","tag-malware-en","tag-ransomware-en"],"_links":{"self":[{"href":"https:\/\/jakarta.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/posts\/23764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jakarta.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jakarta.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jakarta.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/jakarta.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/comments?post=23764"}],"version-history":[{"count":0,"href":"https:\/\/jakarta.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/posts\/23764\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jakarta.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/media\/22133"}],"wp:attachment":[{"href":"https:\/\/jakarta.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/media?parent=23764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jakarta.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/categories?post=23764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jakarta.telkomuniversity.ac.id\/en\/wp-json\/wp\/v2\/tags?post=23764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}