Latest Challenges and Trends in Network Security: Facing Cyber Threats in the Digital Era
DOI:
https://doi.org/10.59934/jaiea.v3i3.518Keywords:
Cyber threats, Network security, Literature studyAbstract
In the ever-growing digital era, network security is becoming increasingly important considering the increasing adoption of information technology and the internet. Cyber threats such as hacking attacks, data theft, ransomware and identity theft are lurking threats for both companies and individuals. To overcome these challenges, effective security strategies are needed to protect networks and data from cyberattacks. This research uses a qualitative approach with literature studies to understand the perceptions, views and solutions of experts in the field of network security. The research results show that training, education, cyber security strategies and cross-sector collaboration are the keys to facing cyber threats and maintaining data integrity in an ever-evolving digital environment.
Downloads
References
M. O. Hoshmand and S. Ratnawati, "Security Analysis of Information Technology Infrastructure in Facing Cybersecurity Threats," vol. 5, no. 2, 2023.
R. A. Pulungan, "Network Security Analysis in Industrial Control Systems".
A. Sephira and M. H. Abrar, "CYBER SECURITY ANALYSIS IN THE DIGITAL ERA 'CHALLENGES AND SECURITY STRATEGIES'".
D. R. Yuniarti, H. F. Alfarizy, Z. Siallagan, and M. W. Rizkyanfi, "ANALYSIS OF POTENTIAL AND CYBER CRIME PREVENTION STRATEGIES IN LOGISTICS SYSTEMS IN THE DIGITAL ERA," J. Logist Business. And Supply Chain BLOGCHAIN, vol. 3, no. 1, pp. 23–32, Jun. 2023, doi: 10.55122/blogchain.v3i1.714.
Stallings, W., & Brown, L. (2018). Computer Security: Principles and Practice. Pearson.
Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.
S. A. M. Babys, "CYBER WAR THREAT IN THE DIGITAL ERA AND INDONESIAN NATIONAL SECURITY SOLUTIONS," vol. 3, no. 1, 2021.
A. Bustami and S. Bahri, "Threats, Attacks and Protective Measures in Network Security or Information Systems: Systematic Review," UNISTEK, vol. 7, no. 2, pp. 59–70, Aug. 2020, doi: 10.33592/unistek.v7i2.645.
Laudon, K. C., & Laudon, J. P. (2016). Management Information Systems: Managing the Digital Firm. Pearson.
N. I. Putri, "Computer Network Security in the Big Data Era," J. Sist. Inf., vol. 02.
F.jauhari and M. I. Wahyuddin, "COMPUTER NETWORK SECURITY IN ELECTRONIC GOVERNMENT SYSTEMS," 2008.
E. Susanto, Lady Antira, K. Kevin, E. Stanzah, and A. A. Majid, “CYBER SECURITY MANAGEMENT IN THE DIGITAL ERA,” J. Bus. Entrep., vol. 11, no. 1, p. 23, Jun. 2023, doi: 10.46273/jobe.v11i1.365.
I. E. Maulani, T. Herdianto, D. F. Syawaludin, and M. O. Laksana, "APPLICATION OF BLOCKCHAIN TECHNOLOGY IN INFORMATION SECURITY SYSTEMS".
Northcutt, S. (2009). The Security+ Guide to Network Security Fundamentals. Cengage Learning.
M. Machlul, "Improving the Quality of Human Resources through Cyber Security Training for East Java Regional Police Members," Parta J. Service. To. Masy., vol. 4, no. 2, pp. 150–155, Jan. 2024, doi: 10.38043/parta.v4i2.4655.
F. Indah, A. Sidabutar, and N. Annisa, "The Role of Cyber Security in the Security of Indonesian Population Data (Case Study: Hacker Bjorka)," vol. 1, no. 1, 2022.
M. I. T. Dwikoryanto and Y. A. Arifianto, "Synergy of Pancasila Education and Christian Education in Reducing Cyber Bullying in the Digital Era," vol. 4, no. 1, 2022.
Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W.W. Norton & Company.
Kshetri, N. (2017). Blockchain’s roles in meeting key supply chain management objectives. International Journal of Information Management, 39, 80-89.
Chintya Pradilla Putri, Widya Anggraini, Yuda Mahendra Hasibuan, and N. Nurbaiti, "Cyber Security Strategy: Scope of Cooperation in Facing Cyber Threats," INSOLOGY J. Science And Technology., vol. 2, no. 6, pp. 1124–1130, Dec. 2023, doi: 10.55123/insologi.v2i6.2847.
Chio, C., & Freeman, D. (2018). Machine Learning and Security: Protecting Systems with Data and Algorithms. O'Reilly Media.
M. Hafid, F. Z. Firjatullah, and B. W. Pamungkaz, "Challenges of Facing Cyber Crime in Community and State Life," vol. 7, 2023.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Artificial Intelligence and Engineering Applications (JAIEA)
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.