Awareness Cybercrime Phishing Email Menggunakan Secure Socket Layer Sebagai Interpretasi Information Security

Authors

  • Kotim Subandi Universitas Pakuan
  • Dinar Munggaran Ahmad Universitas Pakuan
  • Victor Ilyas Sugara Universitas Pakuan
  • Adriana Sari Aryani Universitas Pakuan
  • Hermawan Universitas Pakuan

DOI:

https://doi.org/10.22236/teknoka.v9i1.17560

Keywords:

Kejahatan Siber, Phishing Email, Keamanan Informasi, Enkripsi, Kesadaran Pengguna

Abstract

Email phishing is a fraudulent technique used by cybercriminals to obtain sensitive information through emails that appear legitimate but have malicious purposes. Information security has become a crucial aspect in the increasingly developing digital world, especially along with the increasing threat of cybercrime, such as email phishing. In this context, implementing Secure Socket Layer (SSL) is one solution to increase awareness and mitigate risks against phishing attacks. SSL, which is a security protocol for data encryption, can help protect digital communications by authenticating servers and encrypting data sent, thereby reducing the potential for misuse of personal data sent via email. This research aims to examine the role of SSL in providing protection against email phishing and increasing user awareness regarding the importance of information security in the use of digital technology. Through an information security interpretation approach, this study suggests that SSL can serve as an effective barrier in reducing the risk of phishing attacks and increasing the level of user trust in the emails received. Therefore, it is important for individuals or organizations to understand and apply information security principles such as the use of SSL to maintain the integrity and confidentiality of data exchanged online.

Downloads

Download data is not yet available.

References

SADIQ, A., ANWAR, M., BUTT, R. A., MASUD,F., SHAHZAD, M. K., NASEEM, S., & YOUNAS, M. (2021). A review of phishing attacks and countermeasures for internet of things-based smart business applications in industry 4.0. Human Behavior and Emerging Technologies, 3(5), 854–864. https://doi.org/10.1002/hbe2.301

KOTO, I. (2021). IJRS: International JournalReglement & Society Cyber CrimeAccording to… Cyber Crime According tothe ITE Law. August, 103–110. http://jurnal.bundamediagrup.co.id/index.php/ijrs

] MISHRA, A., & FANCY. (2021). Efficient Detection of Phising Hyperlinks using Machineearning. International Journal on Cybernetics & Informatics, 10(2), 23–33. https://doi.org/10.5121/ijci.2021.100204

IRAWAN, D. (2020). Mencuri Informasi PentingDengan Mengambil Alih Akun Facebook Dengan Metode Phising. JIKI (Jurnal LlmuKomputer & Lnformatika), 1(1), 43–46 https://doi.org/10.24127/jiki.v1i1.671

MUSLIM, N., SENJAYA, O., HUKUM, F., & KARAWANG, U. S. (2022).Pertanggung jawaban Hukum PlatformMedia Sosial Terhadap Korban PhisingMelalui Mass Tagging. 9(2), 955–963

MOORTHY, R. S., & PABITHA, P. (2020). OptimalDetection of Phising Attack using SCA based K-NN. Procedia Computer Science,171(2019), 1716 1725.

RAMADHAN, A., ALHAFIDH, M. A., &FIRMANSYAH, M. D. (2022). Penyebaran Link Phising Kuota Kemendikbud TerhadapMahasiswa UNINUS. Kampret Journal,1(1), 11–15.https://doi.org/10.35335/kampret.v1i1.9.

H. Tabrizchi and M. K. Rafsanjani, “A survey on security challenges in cloud computing: issues, threats, and solutions,” Springer Sci. Media, 2020

M. K. Sharma and M. J. Nene, “Two‐factor authentication using biometric based quantum operations,” Secur. Priv., vol. 3, no. 3, 2020, doi: 10.1002/spy2.102.

K. C. Laudon and J. Laudon, IT Infrastructure and Emerging Technologies. 2018.

C. Z. Acemyan, P. Kortum, J. Xiong, and D. S. Wallach, “2FA might be secure, but it’s not usable: A summative usability assessment of Google’s two-factor authentication (2FA) methods,” Proc. Hum. Factors Ergon. Soc., vol. 2, pp. 1141–1145, 2018, doi: 10.1177/1541931218621262.

D. Wang, Q. Gu, H. Cheng, and P. Wang, “The request for better measurement: A comparative evaluation of two-factor authentication schemes,” ASIA CCS 2016 - Proc. 11th ACM Asia Conf. Comput. Commun. Secur., no. May, pp. 475–486, 2016, doi: 10.1145/2897845.2897916.

R. S. Pressman and B. R. Maxim, Software Engineering A PRACTITIONER’S APPROACH. McGraw-Hill, 2020.

D. E. Kurniawan, M. Iqbal, J. Friadi, F. Hidayat, and R. D. Permatasari, “Login Security Using One Time Password (OTP) Application with Encryption Algorithm Performance,” J. Phys. Conf. Ser., vol. 1783, no. 1, 2021, doi: 10.1088/1742-6596/1783/1/012041.

J. Zhang, X. Tan, X. Wang, A. Yan, and Z. Qin, “T2FA: Transparent Two-Factor Authentication,” IEEE Access, vol. 6, pp. 32677–32686, 2018, doi: 10.1109/ACCESS.2018.2844548.

N. Karapanos et al., “Sound-Proof : Usable Two-Factor Authentication Based on Ambient Sound This paper is included in the Proceedings of the,” Usenix Secur., 2015.

N. Morze, O. Buinytska, and L. Varchenko-Trotsenko, “Use of Bot-Technologies for Educational Communication At the University,” Eff. Dev. Teach. Ski. Area Ict E-Learning, vol. 9, pp. 239–248, 2017, [Online]. Available: https://depot.ceon.pl/handle/123456789/15492.

H. Khalid, S. J. Hashim, S. M. S. Ahmad, F. Hashim, and M. A. Chaudary, “New and Simple Offline Authentication Approach using Time-based One-time Password with Biometric for Car Sharing Vehicles,” 2020 IEEE Asia-Pacific Conf. Comput. Sci. Data Eng. CSDE 2020, no. April 2021, 2020, doi: 10.1109/CSDE50874.2020.9411569.

C. Adams, G. V. Jourdan, J. P. Levac, and F. Prevost, “Lightweight protection against brute force login attacks on web applications,” PST 2010 2010 8th Int. Conf. Privacy, Secur. Trust, pp. 181–188, 2010, doi: 10.1109/PST.2010.5593241

CASCAVILLA, G., TAMBURRI, D. A., & VAN DEN HEUVEL, W. J. (2021). Cybercrime threat intelligence: A systematic multi-vocal literature review. Computers and Security, 105, 102258.

HAYATI, M., & FATA, D. (2021). Analisis Keamanan Informasi Pengguna Media Sosial Menggunakan Setoolkit Melalui Teknik Phising. Djtechno Jurnal Teknologi Informasi, 2(1), 2128.https://doi.org/10.46576/djtechno.v2i1.125

GULO, A. S., LASMADI, S., & NAWAWI, K. (2021). Cyber Crime dalam Bentuk PhisingBerdasarkan Undang-Undang Informasi dan Transaksi Elektronik. PAMPAS: Journal of crimimal Law 1(2) ,68-81 https/doi.org/10.22437/ pampas.v1i2.9574Criminal Law, 1(2), 68–81. https://doi.org/10.22437/pampas.v1i2

Published

2024-12-27

How to Cite

Kotim Subandi, Dinar Munggaran Ahmad, Victor Ilyas Sugara, Adriana Sari Aryani, & Hermawan. (2024). Awareness Cybercrime Phishing Email Menggunakan Secure Socket Layer Sebagai Interpretasi Information Security. Prosiding Seminar Nasional Teknoka, 9(1), 56–66. https://doi.org/10.22236/teknoka.v9i1.17560