School of Information Systems

INFORMATION SYSTEMS SECURITY

INFORMATION SYSTEMS SECURITY is not seen only in the eyes of the emergence of attacks from viruses, mallware, spy ware, and other problems, but it is viewed in various ways according to the system’s security domain itself. The threat of information systems security is an action that occurs both from within the system and from outside the system that can disturb the balance of the information system. threats to the security of information systems come from individuals, organizations, mechanisms, or events that have the potential to cause damage to information sources. weaknesses of a system that may arise when designing, establishing procedures, implementing and weaknesses of the existing control system so that triggering violations by actors who try to infiltrate the system.

Cyber Crime is an illegal act carried out through a computer system or internet network to gain benefits by harming other parties. In general, these crimes are committed by people who understand and master the information technology field.

Types: Data Theft, Illegal Access, Hacking and Cracking, Carding, Defacing, Cybersquatting, Cyber Typosquatting, Spreading Illegal Content, Malware, and Cyber Terorism. Cyber Crimer Method: Password Cracker, Spoofing, Distributed Denial of Attacks, Sniffing, and Destructive Device.

As per its terminology, Cyber Security is an activity to secure telematics resources in order to prevent cyber crime, and the spectrum of cyber security activities is very broad. whereas cyber war has activities which in general are hacking and anti-hacking activities carried out behind the counter and invisible and the potential damage caused by cyber war can be as dangerous as conventional warfare.

The purpose of the existence of information system security:

  • Protect company data and information from unauthorized disclosure.
  • Availability
  • This aspect emphasizes that information must not be changed without the permission of the owner of the information.

How to maintain the security of information systems:

  • Protect with passwords
  • Design safe systems
  • Conduct screening and background checks
  • Provide basic training
  • Use a virus scanner, and keep all software up-to-date
  • Keep sensitive data out of the cloud

 

Defects or weaknesses of a system that may arise when designing, establishing procedures, implementing or weaknesses of the existing control system so that triggering violations by actors who try to infiltrate the system. These weaknesses are exploited by irresponsible people such as harassment / attacks:

  • Access attacks
  • Modification attacks
  • Denial of service attacks

Some ways to carry out attacks, including:

  • Sniffing
  • Spoofing
  • Man in the middle
  • Guess the password

Threats are actions that occur both from within the system and from outside the system that can determine the balance of the information system. These threats come from individuals, organizations, transitions, or events that have the potential to cause damage to company information sources. And when it happens, it can happen from within, external companies also happen intentionally or unintentionally.

Adela Zahwa Firdaus Suherman, Marisa Karsen