PERAN KESADARAN MANUSIA DALAM KEAMANAN INFORMASI DAN SOCIAL ENGINEERING

Authors

  • Mahendra Adhi Nugroho Universitas Negeri Yogyakarta
  • Sri Wulan Asih Universitas Negeri Yogyakarta
  • Anisah Novi Karunia Universitas Negeri Yogyakarta

DOI:

https://doi.org/10.53363/bureau.v4i1.401

Keywords:

Kesadaran Manusia, Keamanan Sistem Informasi, Keamanan Informasi, Social Engineering., Human Consciousness, Information System Security, Information Security, Information Technology

Abstract

Human understanding in managing information system security reflects efforts to protect computer and non-computer devices, facilities, data, and information from misuse by irresponsible parties. Information security aims to ensure the confidentiality, availability, and integrity of information resources in a company. Information system security involves day-to-day protection, referred to as information security, as well as operational preparation. This article aims to build a hypothesis regarding the influence between variables for subsequent research. This research uses qualitative methods with literature studies and is exploratory. The results of this literature review article show that (1) human awareness influences information system security, (2) information technology influences information system security, and (3) social engineering influences information system security

Downloads

Download data is not yet available.

References

Al-Khateeb, M., Al-Mousa, M. R., Al-Sherideh, A. S., Almajali, D., Asassfeh, M., & Khafajeh, H. (2023). Awareness model for minimizing the effects of social engineering attacks in web applications. International Journal of Data and Network Science, 7(2), 791–800. https://doi.org/10.5267/j.ijdns.2023.1.010

Alkhazi, B., Alshaikh, M., Alkhezi, S., & Labbaci, H. (2022). Assessment of the Impact of Information Security Awareness Training Methods on Knowledge, Attitude, and Behavior. IEEE Access, 10, 132132–132143. https://doi.org/10.1109/ACCESS.2022.3230286

Aulia, B. W., Rizki, M., Prindiyana, P., & Surgana, S. (2023). Peran Krusial Jaringan Komputer dan Basis Data dalam Era Digital. JUSTINFO | Jurnal Sistem Informasi Dan Teknologi Informasi, 1(1), 9–20. https://doi.org/10.33197/justinfo.vol1.iss1.2023.1253

Cheng, E. C. K., & Wang, T. (2022). Institutional Strategies for Cybersecurity in Higher Education Institutions. Information (Switzerland), 13(4). https://doi.org/10.3390/info13040192

Chetioui, K., Bah, B., Alami, A. O., & Bahnasse, A. (2021). Overview of Social Engineering Attacks on Social Networks. Procedia Computer Science, 198, 656–661. https://doi.org/10.1016/j.procs.2021.12.302

Faizal, M. A., Faizatul, Z., Asiyah, B. N., & Subagyo, R. (2023). Analisis Risiko Teknologi Informasi Pada Bank Syariah?: Identifikasi Ancaman Dan Tantangan Terkini. Jurnal Asy-Syarikah: Jurnal Lembaga Keuangan, Ekonomi Dan Bisnis Islam, 5(2), 87–100. https://doi.org/10.47435/asy-syarikah.v5i2.2022

Fajarino, A., Kunang, Y. N., Yudha, H. M., Negara, E. S., & Damayanti, N. R. (2023). Evaluasi dan Peningkatan Keamanan Pada Sistem Informasi Akademik Universitas XYZ Palembang. Jurnal Sains Komputer & Informatika (J-SAKTI), 7(September), 991–1005.

Hastuti, T., Djuyandi, Y., & Darmawan, W. B. (2021). Deteksi Dini Ancaman Social Engineering Hacker Terhadap Mata Pelajaran Rahasia Di Sekolah Staf Dan Komando Angkatan Udara. POLISTAAT: Jurnal Ilmu Sosial Dan Ilmu Politik, 4(2), 60–81. https://doi.org/10.23969/paradigmapolistaat.v4i1.4503

Hoshmand, M. O., Ratnawati, S., & Korespondensi, E. P. (2023). Analisis Keamanan Infrastruktur Teknologi Informasi dalam Menghadapi Ancaman Cybersecurity. Jurnal Sains Dan Teknologi, 5(2), 679–686.

Hwang, I., Wakefield, R., Kim, S., & Kim, T. (2021). Security Awareness: The First Step in Information Security Compliance Behavior. Journal of Computer Information Systems, 61(4), 345–356. https://doi.org/10.1080/08874417.2019.1650676

Ikhwan, A., & Hendri, R. (2022). Analisis Perencanaan Strategs Sistem Informasi Dan Teknologi Informasi Menggunakan Framework Ward Dan Peppard Studi Kasus: Fakultas Komputer Umitra Indonesia. Jurnal Teknologi Dan Informatika (JEDA), 1(1), 1–12. https://doi.org/10.57084/jeda.v1i1.950

Katsikeas, S., Johnson, P., Ekstedt, M., & Lagerström, R. (2021). Research communities in cyber security: A comprehensive literature review. In Computer Science Review (Vol. 42). Elsevier Ireland Ltd. https://doi.org/10.1016/j.cosrev.2021.100431

Kelrey, A. R., & Muzaki, A. (2019). Pengaruh Ethical Hacking Bagi Keamanan Data Perusahaan. Cyber Security Dan Forensik Digital, 2(2), 77–81. https://doi.org/10.14421/csecurity.2019.2.2.1625

Khando, K., Gao, S., Islam, S. M., & Salman, A. (2021). Enhancing employees information security awareness in private and public organisations: A systematic literature review. Computers and Security, 106. https://doi.org/10.1016/j.cose.2021.102267

Kurniawan, E., Trianantha Jaya, I. G. N., Purnama, E., Winahyu, A., Aribowo, K., & Surya, A. (2024). Penerapan Sistem Informasi Pemasaran (SIP) pada Products and Services Layanan Unggulan Kardiovaskular di Rumah Sakit X. COMSERVA?: Jurnal Penelitian Dan Pengabdian Masyarakat, 3(10), 4145–4157. https://doi.org/10.59141/comserva.v3i10.1227

Mihal?ová, B., Korauš, A., Šišulák, S., Gallo, P., & Luká?, J. (2023). The risks of misusing social networks in the context of hybrid threat. Entrepreneurship and Sustainability Issues, 10(4), 357–371. https://doi.org/10.9770/jesi.2023.10.4(22)

Mikuleti?, S., Vrhovec, S., Skela-Savi?, B., & Žvanut, B. (2024). Security and Privacy Oriented Information Security Culture (ISC): Explaining Unauthorized Access to Healthcare data by Nursing Employees. Computers & Security, 136.

Nehemia, Phillip, J., Hendrayana, & Rifky, M. (2024). Tantangan Dan Manfaat AI Dalam Perlindungan Data Kantor?: Mengoptimalkan Keamanan Informasi. Jurnal Transformasi Bisnis Digital, 1(3), 13–27.

Niffari, H. (2020). Perlindungan Data Pribadi Sebagai Bagian Dari Hak Asasi Manusia Atas Perlindungan Diri Pribadi (Suatu Tinjauan Komparatif Dengan Peraturan Perundang-Undangan Di Negara Lain). Jurnal Hukum Dan Bisnis (Selisik), 6(1), 1–14. https://doi.org/10.35814/selisik.v6i1.1699

Nurdiansyah, A., Pratiwi, A., & Kaunaini, B. (2022). Literature Review Pengaruh Kepercayaan , Kemudahan dan Kepuasan. Jurnal Ilmu Multidisiplin, 1(1), 297–303.

Nurul, S., Shynta Anggrainy, & Siska Aprelyani. (2022). Faktor-Faktor Yang Mempengaruhi Keamanan Sistem Informasi: Keamanan Informasi, Teknologi Informasi Dan Network (Literature Review Sim). Jurnal Ekonomi Manajemen Sistem Informasi, 3(5), 564–573. https://doi.org/10.31933/jemsi.v3i5.992

Ramadhani, A. (2018). Keamanan Informasi. Nusantara - Journal of Information and Library Studies, 1(1), 39. https://doi.org/10.30999/n-jils.v1i1.249

Renaldy, A., Fauzi, A., Shabrina, A. N., & Ramadhan, H. N. (2023). Peran Sistem Informasi dan Teknologi Informasi Terhadap Peningkatan Keamanan Informasi Perusahaan. Jurnal Ilmu Multidisiplin, 2(1), 15–22.

Rohan, R., Pal, D., Hautamäki, J., Funilkul, S., Chutimaskul, W., & Thapliyal, H. (2023). A systematic literature review of cybersecurity scales assessing information security awareness. Heliyon, 9(3). https://doi.org/10.1016/j.heliyon.2023.e14234

Safitri, E. M., Ameilindra, Z., & Yulianti, R. (2020). Analisis Teknik Social Engineering Sebagai Ancaman Dalam Keamanan Sistem Informasi: Studi Literatur. Jurnal Ilmiah Teknologi Informasi Dan Robotika, 2(2), 21–26. https://doi.org/10.33005/jifti.v2i2.26

Sholikah, H., Ardianto, Y. T., & Prasetya, D. A. (2022). Pengaruh Kualitas Sistem Informasi Sumber Daya Manusia, Pelatihan dan Pengembangan terhadap Kinerja Karyawan melalui Disiplin Kerja pada PT. Era Mulia Abadi Sejahtera. Jurnal Teknologi Dan Manajemen Informatika, 8(2), 125–133. https://doi.org/10.26905/jtmi.v8i2.8239

Susanto, T. D., & Maulana, M. D. (2024). Evaluating the Influence of Attitude versus Knowledge and Individual Factor versus Intervention Factor on Information Security Awareness in Local Government. Procedia Computer Science, 234, 1428–1434. https://doi.org/10.1016/j.procs.2024.03.142

Syafitri, W., Shukur, Z., Mokhtar, U. A., Sulaiman, R., & Ibrahim, M. A. (2022). Social Engineering Attacks Prevention: A Systematic Literature Review. IEEE Access, 10, 39325–39343. https://doi.org/10.1109/ACCESS.2022.3162594

Tejay, G. P. S., & Mohammed, Z. A. (2023). Cultivating security culture for information security success: A mixed-methods study based on anthropological perspective. Information & Management, 60(3).

Wijatmoko, T. E. (2020). Evaluasi Keamanan Informasi Menggunakan Indeks Keamanan Informasi (Kami) Pada Kantor Wilayah Kementerian Hukum Dan Ham Diy. Cyber Security Dan Forensik Digital, 3(1), 1–6. https://doi.org/10.14421/csecurity.2020.3.1.1951

Wijaya, A. R., Siregar, M., & Kartika, D. (2023). Perencanaan Strategis Sistem Informasi sebagai Pendukung Optimalisasi Layanan Pendidikan di Sekolah Dasar. Dirasisi, 1(1), 1–18.

Wiradharma, G., Ainun, A. N. A., Vransisca Kissya, Agustiana, E., & Irawan, D. (2023). Komunikasi dan Negosiasi Bisnis. Cendikia Mulia Mandiri.

Zulaeha, S., & Sari, A. P. (2020). Analisis Faktor-Faktor yang Mempengaruhi Kinerja Sistem Informasi Akuntansi pada PT. Sinar Galesong Mandiri. Jurnal Ilmu Akuntansi, 2(1), 1–11.

Al-Khateeb, M., Al-Mousa, M. R., Al-Sherideh, A. S., Almajali, D., Asassfeh, M., & Khafajeh, H. (2023). Awareness model for minimizing the effects of social engineering attacks in web applications. International Journal of Data and Network Science, 7(2), 791–800. https://doi.org/10.5267/j.ijdns.2023.1.010

Alkhazi, B., Alshaikh, M., Alkhezi, S., & Labbaci, H. (2022). Assessment of the Impact of Information Security Awareness Training Methods on Knowledge, Attitude, and Behavior. IEEE Access, 10, 132132–132143. https://doi.org/10.1109/ACCESS.2022.3230286

Aulia, B. W., Rizki, M., Prindiyana, P., & Surgana, S. (2023). Peran Krusial Jaringan Komputer dan Basis Data dalam Era Digital. JUSTINFO | Jurnal Sistem Informasi Dan Teknologi Informasi, 1(1), 9–20. https://doi.org/10.33197/justinfo.vol1.iss1.2023.1253

Cheng, E. C. K., & Wang, T. (2022). Institutional Strategies for Cybersecurity in Higher Education Institutions. Information (Switzerland), 13(4). https://doi.org/10.3390/info13040192

Chetioui, K., Bah, B., Alami, A. O., & Bahnasse, A. (2021). Overview of Social Engineering Attacks on Social Networks. Procedia Computer Science, 198, 656–661. https://doi.org/10.1016/j.procs.2021.12.302

Faizal, M. A., Faizatul, Z., Asiyah, B. N., & Subagyo, R. (2023). Analisis Risiko Teknologi Informasi Pada Bank Syariah?: Identifikasi Ancaman Dan Tantangan Terkini. Jurnal Asy-Syarikah: Jurnal Lembaga Keuangan, Ekonomi Dan Bisnis Islam, 5(2), 87–100. https://doi.org/10.47435/asy-syarikah.v5i2.2022

Fajarino, A., Kunang, Y. N., Yudha, H. M., Negara, E. S., & Damayanti, N. R. (2023). Evaluasi dan Peningkatan Keamanan Pada Sistem Informasi Akademik Universitas XYZ Palembang. Jurnal Sains Komputer & Informatika (J-SAKTI), 7(September), 991–1005.

Hastuti, T., Djuyandi, Y., & Darmawan, W. B. (2021). Deteksi Dini Ancaman Social Engineering Hacker Terhadap Mata Pelajaran Rahasia Di Sekolah Staf Dan Komando Angkatan Udara. POLISTAAT: Jurnal Ilmu Sosial Dan Ilmu Politik, 4(2), 60–81. https://doi.org/10.23969/paradigmapolistaat.v4i1.4503

Hoshmand, M. O., Ratnawati, S., & Korespondensi, E. P. (2023). Analisis Keamanan Infrastruktur Teknologi Informasi dalam Menghadapi Ancaman Cybersecurity. Jurnal Sains Dan Teknologi, 5(2), 679–686.

Hwang, I., Wakefield, R., Kim, S., & Kim, T. (2021). Security Awareness: The First Step in Information Security Compliance Behavior. Journal of Computer Information Systems, 61(4), 345–356. https://doi.org/10.1080/08874417.2019.1650676

Ikhwan, A., & Hendri, R. (2022). Analisis Perencanaan Strategs Sistem Informasi Dan Teknologi Informasi Menggunakan Framework Ward Dan Peppard Studi Kasus: Fakultas Komputer Umitra Indonesia. Jurnal Teknologi Dan Informatika (JEDA), 1(1), 1–12. https://doi.org/10.57084/jeda.v1i1.950

Katsikeas, S., Johnson, P., Ekstedt, M., & Lagerström, R. (2021). Research communities in cyber security: A comprehensive literature review. In Computer Science Review (Vol. 42). Elsevier Ireland Ltd. https://doi.org/10.1016/j.cosrev.2021.100431

Kelrey, A. R., & Muzaki, A. (2019). Pengaruh Ethical Hacking Bagi Keamanan Data Perusahaan. Cyber Security Dan Forensik Digital, 2(2), 77–81. https://doi.org/10.14421/csecurity.2019.2.2.1625

Khando, K., Gao, S., Islam, S. M., & Salman, A. (2021). Enhancing employees information security awareness in private and public organisations: A systematic literature review. Computers and Security, 106. https://doi.org/10.1016/j.cose.2021.102267

Kurniawan, E., Trianantha Jaya, I. G. N., Purnama, E., Winahyu, A., Aribowo, K., & Surya, A. (2024). Penerapan Sistem Informasi Pemasaran (SIP) pada Products and Services Layanan Unggulan Kardiovaskular di Rumah Sakit X. COMSERVA?: Jurnal Penelitian Dan Pengabdian Masyarakat, 3(10), 4145–4157. https://doi.org/10.59141/comserva.v3i10.1227

Mihal?ová, B., Korauš, A., Šišulák, S., Gallo, P., & Luká?, J. (2023). The risks of misusing social networks in the context of hybrid threat. Entrepreneurship and Sustainability Issues, 10(4), 357–371. https://doi.org/10.9770/jesi.2023.10.4(22)

Mikuleti?, S., Vrhovec, S., Skela-Savi?, B., & Žvanut, B. (2024). Security and Privacy Oriented Information Security Culture (ISC): Explaining Unauthorized Access to Healthcare data by Nursing Employees. Computers & Security, 136.

Nehemia, Phillip, J., Hendrayana, & Rifky, M. (2024). Tantangan Dan Manfaat AI Dalam Perlindungan Data Kantor?: Mengoptimalkan Keamanan Informasi. Jurnal Transformasi Bisnis Digital, 1(3), 13–27.

Niffari, H. (2020). Perlindungan Data Pribadi Sebagai Bagian Dari Hak Asasi Manusia Atas Perlindungan Diri Pribadi (Suatu Tinjauan Komparatif Dengan Peraturan Perundang-Undangan Di Negara Lain). Jurnal Hukum Dan Bisnis (Selisik), 6(1), 1–14. https://doi.org/10.35814/selisik.v6i1.1699

Nurdiansyah, A., Pratiwi, A., & Kaunaini, B. (2022). Literature Review Pengaruh Kepercayaan , Kemudahan dan Kepuasan. Jurnal Ilmu Multidisiplin, 1(1), 297–303.

Nurul, S., Shynta Anggrainy, & Siska Aprelyani. (2022). Faktor-Faktor Yang Mempengaruhi Keamanan Sistem Informasi: Keamanan Informasi, Teknologi Informasi Dan Network (Literature Review Sim). Jurnal Ekonomi Manajemen Sistem Informasi, 3(5), 564–573. https://doi.org/10.31933/jemsi.v3i5.992

Ramadhani, A. (2018). Keamanan Informasi. Nusantara - Journal of Information and Library Studies, 1(1), 39. https://doi.org/10.30999/n-jils.v1i1.249

Renaldy, A., Fauzi, A., Shabrina, A. N., & Ramadhan, H. N. (2023). Peran Sistem Informasi dan Teknologi Informasi Terhadap Peningkatan Keamanan Informasi Perusahaan. Jurnal Ilmu Multidisiplin, 2(1), 15–22.

Rohan, R., Pal, D., Hautamäki, J., Funilkul, S., Chutimaskul, W., & Thapliyal, H. (2023). A systematic literature review of cybersecurity scales assessing information security awareness. Heliyon, 9(3). https://doi.org/10.1016/j.heliyon.2023.e14234

Safitri, E. M., Ameilindra, Z., & Yulianti, R. (2020). Analisis Teknik Social Engineering Sebagai Ancaman Dalam Keamanan Sistem Informasi: Studi Literatur. Jurnal Ilmiah Teknologi Informasi Dan Robotika, 2(2), 21–26. https://doi.org/10.33005/jifti.v2i2.26

Sholikah, H., Ardianto, Y. T., & Prasetya, D. A. (2022). Pengaruh Kualitas Sistem Informasi Sumber Daya Manusia, Pelatihan dan Pengembangan terhadap Kinerja Karyawan melalui Disiplin Kerja pada PT. Era Mulia Abadi Sejahtera. Jurnal Teknologi Dan Manajemen Informatika, 8(2), 125–133. https://doi.org/10.26905/jtmi.v8i2.8239

Susanto, T. D., & Maulana, M. D. (2024). Evaluating the Influence of Attitude versus Knowledge and Individual Factor versus Intervention Factor on Information Security Awareness in Local Government. Procedia Computer Science, 234, 1428–1434. https://doi.org/10.1016/j.procs.2024.03.142

Syafitri, W., Shukur, Z., Mokhtar, U. A., Sulaiman, R., & Ibrahim, M. A. (2022). Social Engineering Attacks Prevention: A Systematic Literature Review. IEEE Access, 10, 39325–39343. https://doi.org/10.1109/ACCESS.2022.3162594

Tejay, G. P. S., & Mohammed, Z. A. (2023). Cultivating security culture for information security success: A mixed-methods study based on anthropological perspective. Information & Management, 60(3).

Wijatmoko, T. E. (2020). Evaluasi Keamanan Informasi Menggunakan Indeks Keamanan Informasi (Kami) Pada Kantor Wilayah Kementerian Hukum Dan Ham Diy. Cyber Security Dan Forensik Digital, 3(1), 1–6. https://doi.org/10.14421/csecurity.2020.3.1.1951

Wijaya, A. R., Siregar, M., & Kartika, D. (2023). Perencanaan Strategis Sistem Informasi sebagai Pendukung Optimalisasi Layanan Pendidikan di Sekolah Dasar. Dirasisi, 1(1), 1–18.

Wiradharma, G., Ainun, A. N. A., Vransisca Kissya, Agustiana, E., & Irawan, D. (2023). Komunikasi dan Negosiasi Bisnis. Cendikia Mulia Mandiri.

Zulaeha, S., & Sari, A. P. (2020). Analisis Faktor-Faktor yang Mempengaruhi Kinerja Sistem Informasi Akuntansi pada PT. Sinar Galesong Mandiri. Jurnal Ilmu Akuntansi, 2(1), 1–11

Downloads

Published

2024-04-30

How to Cite

Nugroho, M. A. ., Asih, S. W. ., & Karunia, A. N. . (2024). PERAN KESADARAN MANUSIA DALAM KEAMANAN INFORMASI DAN SOCIAL ENGINEERING. Bureaucracy Journal : Indonesia Journal of Law and Social-Political Governance, 4(1), 199–216. https://doi.org/10.53363/bureau.v4i1.401