The Importance of Implementing Security Management in the Era of Digital Transformation

Authors

  • Achmad Fauzi Universitas Bhayangkara Jakarta Raya
  • Ratilla Amanda Edwar Universitas Bhayangkara Jakarta Raya
  • Teti Aliyanti Universitas Bhayangkara Jakarta Raya
  • Ayu Nur Jannah Milawati Candra Universitas Bhayangkara Jakarta Raya
  • Amelia Seli Febrianti Universitas Bhayangkara Jakarta Raya
  • Iqbal Al Baihaqi Universitas Bhayangkara Jakarta Raya
  • Aditya Aji Nugroho Universitas Bhayangkara Jakarta Raya

DOI:

https://doi.org/10.69718/ijesm.v2i2.227

Keywords:

Cyber Security, DDoS, Malware, Implementation

Abstract

Cyber security is an important aspect of the increasingly complex cyber threats. This research uses a qualitative approach, namely a method using a literature review. This study was conducted to examine how events implement security management in this developing era and how to maintain data security. Human Resource Security is also very important in facing various threats in the digital transformation era which include SQL Injection, Phishing Attack, Fake News, Denial of Service, Malware & Ransomware, and others. Hackers' motivations for launching malware and DDoS attacks are usually to gain access to sensitive data, disrupt business operations, or exploit systems for illicit purposes. The goal is to consume system resources and cause business system failure.

References

AVKalpana, D. Digvijay, R. Chenchaiah, & C. SaiVignesh. (2021). Implementing Cybersecurity in IoT Using IPAI Algorithm.

Adhiaksa, AR (2021, April). Simple steps to secure your device from hackers.

Admin. (2023, June). Security in the Internet of Things (IoT): Challenges and Solutions.

Alrobaian, S., Alshahrani, S., & Almaleh, A. (2023). Cybersecurity Awareness Assessment among Trainees of the Technical and Vocational Training Corporation.

Annarelli, A., & Palombi, G. (2021). Digitalization Capabilities for Sustainable Cyber Resilience: A Conceptual Framework.

Arman, M. (2020). Web Server Defense Method Against Distributed Slow HTTP DoS Attack.

Disemadi, HS (2021). The Urgency of Special Regulations and the Use of Artificial Intelligence in Realizing Personal Data Protection in Indonesia.

Eijikman, Q. (2013). Digital Security Governance and Accountability in Europe: Ethical Dilemmas in Terrorism Risk Management.

Evans, M., Maglaras, L. A., He, Y., & Janicke, H. (2016). Human behavior as an aspect of cybersecurity assurance.

Geges, S., & Wibisono, W. (2015). Development of Prevention of Distributed Denial of Service (DDoS) Attacks on Network Resources by Integrating Network Behavior Analysis and Client Puzzle.

HRF. (2022). Risk Management Framework that Companies Must Implement.

Ikhsan. (2023). Digital Transformation and its Impact in Indonesia.

Irawan, A., Fadholi, WH, Erikamaretha, Z., & Sinlae, F. (2024). IoT-based Cyber Security Management Challenges and Strategies in Indonesia.

Jasmina M. Veličković, K. J. (2023). CYBERATTACKS ON HEALTHCARE SYSTEMS.

Kensbock, J. M., & Stockmann, C. (2020). Big brother is watching you”: surveillance via technology undermines employees' learning and voice behavior during digital transformation .

Khoironi, S. c. (2020). The influence of analysis of cyber security culture training needs as an effort to develop competency for state civil servants in the digital era.

we p. (2024, January). Latest Cyber Security Developments in Indonesia.

Ma, J.-Y., Shi, L., & Kang, T.-W. (2022). The Effect of Digital Transformation on the Pharmaceutical Sustainable Supply Chain Performance: The Mediating Role of Information Sharing and Traceability Using Structural Equation Modeling.

Maldini, R.R. (2023). Technology Security System for Internet of Things Systems.

Maldini, R.R. (2023). Technology Security Systems for Internet of Things Systems.

Maya Utami Dewi, SM (2022). Securing Internet Of Things (IoT) Devices.

Munandar, A. (2023). SPBE Security in Digital Transfirmation.

Muslim, Sephira, A., Abrar, MH, Angin, SL, & Hidayatullah, H. (2024). Cyber security analysis in the digital era "security challenges and strategies".

Najib, W., Sulistyo, S., & Widyawan. (2020). Overview of Security Threats and Solutions in Internet of Things Technology.

Oktafiani, C. (2020). MANAGEMENT INFORMATION SYSTEM "Information Security in the Use of Information Technology at PT.

OuhssiniA, M., AfdelA, K., AgherrabiB, E., AkouharC, M., & AbardaD, A. (2024). Deepdefens: A comprehensive framework for DDoS Attack detection and prevention in computing.

Latest Cyber Security Developments in Indonesia. (2024, January).

Purbo, O. (2023, May). Cyber Security: Emergency Response and Disasters .

Putra, FP, Dewi, SM, Maugfiroh, & Hamzah, A. (2023). Privacy and Security Application of IoT in Everyday Life Challenges and Implications.

Rayhan, M., Alfaridzi, MD, Saputra, IE, & Sinlae, F. (2023). Implementation of security management to prevent fraudulent online sales transactions on buying and selling forums (Facebook).

Cyber, B.K. (2022). AI and Automation Help Prevent Ransomware and Phishing Attacks.

Solorzano, G. A., Gutiérrez, A. F., & Gordillo, A. P. (2023). Data Security Threats On Smart Devices At Home. ARPHA Conference Abstracts .

Triwahyuni, D., & Wulandari, TA (2016). United States Cyber Security Strategy. Journal of Political Science and Communication .

Tulungen, EE, Saerang, DP, & Maramis, JB (2022). Digital Transformation: The Role of Digital Leadership.

Main, L. (2023, December 1). 5 main causes of data leaks.

widya. (2024). Protect Data From Phishing in 2024.

Williams, E. J., Hinds, J., & Joinson, A. N. (2018). Exploring susceptibility to Phishing in the workplace.

Downloads

Published

2024-07-31

How to Cite

Achmad Fauzi, Ratilla Amanda Edwar, Teti Aliyanti, Ayu Nur Jannah Milawati Candra, Amelia Seli Febrianti, Iqbal Al Baihaqi, & Aditya Aji Nugroho. (2024). The Importance of Implementing Security Management in the Era of Digital Transformation. IJESM Indonesian Journal of Economics and Strategic Management, 2(2), 1663–1679. https://doi.org/10.69718/ijesm.v2i2.227

Issue

Section

Articles

Most read articles by the same author(s)

1 2 > >>