PENGARUH ETHICAL HACKING BAGI KEAMANAN DATA PERUSAHAAN
DOI:
https://doi.org/10.14421/csecurity.2019.2.2.1625Keywords:
Ethical Hacking, Keamanan Informasi, Confidentiality, Integrity, AvailabilityAbstract
Melindungi aset digital merupakan perhatian yang penting bagi perusahaan, karena serangan siber memengaruhi kinerja bisnis dan reputasi sebuah perusahaan. Tiga konsep dasar keamanan yang penting untuk informasi di internet adalah kerahasiaan (confidentiality), integritas (integrity), dan ketersediaan (availability). Konsep yang berkaitan dengan orang-orang yang menggunakan informasi itu adalah authentication, authorization, dan nonrepudiation. Keamanan informasi menjadi suatu hal yang mahal pada saat ini, sehingga ethical hacking diperlukan untuk menjamin sebuah sistem informasi perusahaan tersebut cukup handal. Dengan begitu dapat menjaga reputasi perusahaan tersebuat di mata pelangannya.
References
Ellis, S. R. (2017). Ethical Hacking. Computer and Information Security Handbook. Elsevier Inc. https://doi.org/10.1016/B978-0-12-803843-7.00030-2
EC¬Council. 2008. Module I: Introduction to Ethical Hacking, Ethical Hacking and Countermeasures Version 6
Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). ScienceDirect Procedia Computer Science Exploring Data Security Issues and Solutions in Cloud Computing. Procedia Computer Science, 125(2009), 691–697. https://doi.org/10.1016/j.procs.2017.12.089
Pesante, L. (2008). Introduction to Information Security, (January), 1–3. Retrieved from https://www.us-cert.gov/sites/default/files/publications/infosecuritybasics.pdf
Torten, R., Reaiche, C., & Boyle, S. (2018). US CR. Computers & Security. https://doi.org/10.1016/j.cose.2018.08.007
Whitman, M. E. (2016). Principles of Information Security Fifth Edition.
‘The Global Risks Report 2019’. World Economic Forum. www.wefo- rum.org/reports/the-global-risks- report-2019. [Accessed 04-Aug 2019]
‘UK small businesses targeted with 65,000 attempted cyber attacks per day’. Hiscox. www.hiscoxgroup.com/news/press- releases/2018/18-10-18. [Accessed 04-Aug 2019]
‘2019 Internet Security Threat Report’. Symantec. www.symantec.com/security- centre/threat-report. [Accessed 04-Aug 2019]
Touhill, Gregory. ‘Challenges on Cyber security Landscape Demand Strong Leadership’. ISACA, 20 Mar 2019. www. isaca.org/Knowledge-Centre/Blog/ Lists/Posts/Post.aspx?ID=1154. [Accessed 04-Aug 2019]
Downloads
Published
How to Cite
Issue
Section
License
Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Under the following terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.