Analisis Ancaman Keamanan Informasi Pada Insfrastruktur Teknologi di Universitas Bhayangkara Jakarta Raya
DOI:
https://doi.org/10.31599/z8cxja55Keywords:
information security, cyber threats, risk mitigation, Universitas Bhayangkara Jakarta Raya, machine learning.Abstract
Information security is a critical aspect in the digital era, especially for higher education institutions such as Universitas Bhayangkara Jakarta Raya. With the increasing use of information technology in learning and administrative processes, the potential for information security threats has also grown, ranging from cyberattacks to system vulnerabilities. This study aims to analyze various information security threats faced by the university’s technological infrastructure and evaluate the effectiveness of the implemented mitigation measures. The methodology used is a quantitative survey with respondents consisting of university students, collected through online questionnaires.The findings of this research indicate that the majority of respondents consider information security to be very important, with many reporting experiences of threats such as malware and phishing. Furthermore, the study found that although the university has a dedicated team to handle security incidents, there is still a need to improve infrastructure and awareness regarding information security. Recommendations include implementing machine learning technology for threat detection and enhancing training for the information security team to improve responses to evolving threats.
Downloads
Downloads
Published
Issue
Section
License
Please read and understand the copyright terms for submissions to this journal.
Copyright Notice
The Jurnal Keamanan Nasional is under the Creative Commons Attribution 4.0 International (CC-BY 4.0) License, according to which:
1) Authors retain copyright and grant the journal the right to first publication, with the work simultaneously licensed under the Creative Commons Attribution (CC-BY 4.0) that allows the sharing of articles published with the acknowledgement of authorship and the initial publication in this journal.
2) The authors are authorized to make additional contracts separately for distribution of the version of the work published in this journal (for example, publication in an institutional repository or as a chapter of the book), as long as there is recognition of authorship and initial publication in this journal.
3) Authors are authorized and encouraged to publish and distribute their work online (for example, in institutional repositories or on their personal pages) at any time before or during the editorial process, as it increases the impact and reference of the published work.