Efektivitas Keamanan Informasi dalam Menghadapi Ancaman Social Engineering
DOI:
https://doi.org/10.33172/pa.v3i1.94Abstrak
Abstrak – Indonesia adalah sebuah negara yang sedang berkembang. Perekonomian Indonesia sedang meningkat dan didukung dengan kemajuan teknologi dan informasi. Dunia perbankan di Indonesia sudah cukup bagus, sehingga kejahatan cyber akan semakin besar Social engineering merupakan suatu metode dalam kejahatan cyber.Ancaman kejahatan cyber saat ini sangat mempengaruhi kerentanan keamanan informasi, khususnya di dunia perbankan. Bentuk nyata adalah dengan adanya pembobolan kartu kredit ,pencurian data oleh karyawan dalam perusahaan dan lain sebagainya. E.B Taylor menyatakan bahwa kerentanan yang dapat ditembus oleh social engineering melalui kebiasaan, ilmu pengetahuan penekanan dan kepercayaan. Perusahaan merespon akan bahaya kejahatan cyber crime yaitu ancaman social engineering, akibat yang ditimbulkannya adalah kehancuran akan keamanan informasi Pelaksanaan efektivitas dapat berjalan dengan baik apabila bagian bagian yang terlibat dalam proses pelaksanaannya dapat memerankan peranannya dengan baik. Adapun tesis ini bertujuan adalah untuk menganalisis efektifitas dan penerapan prosedur operasional dan kebiasaan yang dilakukan karyawan untuk keamanan informasi dalam menghdapi bahaya sosial engineering. Penelitian ini menggunakan metode kualitatif dengan teknik pengumpulan data yaitu, wawancara, observasi, studi pustaka, dan studi dokumen. Hasil dari penelitian ini adalah bahwa melalui penerapan Standar Operasional Prosedur yang benar, rasa memiliki, penggunaan surat dalam melakukan suatu permintaan dan mengirim email keseluruh karyawan tentang keamanan informasi secara berkala. Sehingga Perusahaan dapat terhindar dari ancaman social engineering .Maka efektivitas keamanan informasi dalam menghadapi bahaya social engineering dapat terwujud. Keamanan informasi perbankan dapat terjaga baik secara nasional maupun internasional.
Kata kunci: Keamanan Informasi, Social Engineering, Standard Operasional Prosedur, Efektivitas
Abstract– Indonesia is a developing country. Indonesia’s economy is increasing . this is because the support of Information and tecnology development. The Bank world in Indonesia is good enough. This might make crime is getting bigger. Social Engineering is a cyber crime. The threat of cyber crime influences the weakness of information security, especially in Bank world. The real cyber crime are the piercing of Credit Card, data robbing by the employee inside the company. E.B Taylor said that the succeptibility can be penetrated by social engineering through habbit, the science of information security, trust and pressure. Artha Graha Int’l Bank is very good in responding dan facing one of the cyber crime methods which is social engineering threat. The effectivity can run well if parts involved in the process can run their parts well. This thesis has purposes to analise the effectivity and the application operational procedure and employee’s habbit for the information security in facing the danger of social engineering. This research use qualitative method with gathering data technique by interview, observations, library research and document study. The result of the research is that by applying the right standardized operational procedure, self belonging, the use of demand letter and the use of emails to all employees about the informational security continually. So that Artha Graha Bank can avoid social engineering threat. The effectivityof information security in facing social engineering can be done. The Bank security can be well kept nationally and internationally.
Keywords: Information Security, social engineering, standardized opeartional Procedure, effectivity
Referensi
Daftar Pustaka
Buku
Buzan, B. (2000). Human Security: What It Means, and What It Entails. Kuala Lumpur: the 14st Asia Pasific Roundtable on Confidence uliding and Conflict Resolution.
Golose, P. R. (2015). Invasi Terorisme ke Cyberspace. Jakarta: Yayasan Pengembangan Kajian Ilmu Kepolisian.
Muradi. (2013). Penataan Kebijakan Keamanan Nasional. Bandung: Penerbit Dian Cipta.
Christopher Hadnagy (2010). Social Engineering. The Art of Homan Hacking. Indianapolis, Indiana. Wiley Publishing, inc
Departemen Pertahanan Republik Indonesia (2008) Buku Putih Pertahanan Republik Indonesia 2008
Departemen Pertahanan Republik Indonesia (2015) Buku Putih Pertahanan Republik Indonesia 2015
Mary Kaldor (2007). Human Security : Reflections on Globalization and Intervention. Cambridge, UK Copyright
Idrus Muhammad (2009). Metode Ilmu Penelitian Ilmu Sosial : Pendekatan Kualitatif dan Kuantitatif. Yogjakarta, Penerbit Erlangga
Sugiyono (2016), Metode Penelitian Kuantitatif, Kualitatif dan R & D, Bandung, Penerbit ALFABETA, CV Berbagai Sumber Daya Bagi Pertumbuhan Berkelanjutan, Jakarta
Kennetth C. Laudon, Jane p. Laudon . Sistem Informasi Manajemen 1, Jakarta , Penerbit Salemba Empat
Jurnal
Granger, Sarah., Social Engineering Fundamentals, Part I: Hacker Tactics. Symantec
Lucky Adhie, 2010, Identity Thet dengan menggunakan Social Engineering Studi Kasus: Kartu Kredit di indonesia.
Peltier, T.R., 2001, Information Security Risk Analysis, Auerbach Publications.
Papadaki, Maria, Furnell, Steven dan Dodge, Ronald C., Social Engineering – Exploiting the Weakest Links. s.l. : European Network and Information Security Agency, 2008
Rhodes, Colleen., Safeguarding Against Social Engineering. East Carolina : s.n., 2006.
Siagian, B. D. (2016). Analisis Wacana Radikalisme pada Situs Online di Indonesia dalam Perspektif Keamanan Nasional(Tesis). Bogor: Program StudiPeperanganAsimetrisUniversitasPertahanan.
Solichul Huda , 2007 Pengamanan Sistem Komputer dari Model Social Engineering dengan mengaktifkan program Security Awareness,
Subekti, V. S. (2015). Dinamika Konsolidasi Demokrasi: Dari Ide Pembaharuan Sistem Politik hingga ke Praktik Pemerintahan Demokratis . Jakarta: Yayasan Pustaka Obor Indonesia.
Whitman, Michael E, dan Mattord, Herbert J (2012), Principles of Information Security (4th ed). Boston, MA, USA Course Technologi
Marwana (2012), Teknik Social Engineering Dan Pencegahannya.
Website
Azis,(2015); cybercrime-dan-social-engineering. diakses 30 September, 2016, http://fahmirahmatazis.co.id/2015/09/cybercrime-dan-social-engineering.
Bagus Artiadi Soewardi, Cyber Defence diakses 5 januari 2017. http//www.kemhan.go.id/pothan
Dr. Joel Brenner ( 2009), National Counterinteligence Executive diakses 5 januari 2017. https://cryptome.org/dni-cbs-24.pdf
Etikakelompok7,(2013) Keamanan Jaringan dan Komputer diakses 30 https://keamananjaringandankomputer/2013/03/22/website-palsu-klik-bca/
Houchins Thomas ( 2002); Security’s Biggest Threats: Social Engineering Your Employees, diakses 5 januari 2017.
https://www.giac.org/paper/gsec/2149/securitys-biggest-threats-social-engineering-employees/
Indrajit,(2015), Social Engineering Masih Menjadi Ancaman, diakses 30 September 2016 http://www.ciso.co.id/2015/03/social-engineering-masih-menjadi-ancaman/).
Institute, Insurance Information., Identity Theft. Consumer Fraud and Identity Theft. Insurance Information Institute, 2009. Diakses : 23 september 2016.] http://www.iii.org/media/facts/statsbyissue/idtheft/.
Indra, D. dan M. Chandrataruna (2009) pencuri data adalah karyawan Huawei (http://teknologi.vivanews.com/news/read/41027. pencuri data adalah karyawan huawei. Diakses 3 0ktober 2016.
Nudin,2005 Teori Organisasi 30 September, 2016 http://file.upi.edu SekilasTentang Cyber Crime, Cyber Security ,diakses 30 September, 2016, http://inet.detik.com/read/2015/08/31/sekilas-tentang-cyber-crime-cyber-security-dan-cyber-war
S. Juliandri Simanungkalit 2009, Perancangan Manajemen, 30 September, 2016 http://lib.ui.ac.id/file?file=digital/Perancangan20manajemen-Literatur.pdf.
Unduhan
Diterbitkan
Cara Mengutip
Terbitan
Bagian
Lisensi
Proposed Policy for Journals That Offer Open Access. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.