Kesadaran Keamanan Informasi atas Phising, Smishing, dan Vishing pada Warga Kota Cimahi
DOI:
https://doi.org/10.25134/ilkom.v18i2.201Keywords:
Information Security, Phishing, Smishing, Vishing, Dilandacita WebsiteAbstract
Maintaining the confidentiality of information poses a significant challenge in today's technology-driven era. Information security is invaluable for individuals, businesses, governments, and global entities alike. It serves as a vital tool in preventing and identifying fraud within information-based systems. This knowledge is intended to educate people worldwide early on, helping them avoid falling victim to fraud. As technology advances for the greater good, it demands our vigilance against potential crimes like phishing, smishing, and vishing. The study utilized survey and literature review methods. Surveys were conducted using questionnaires at the Civil Registration Office of Cimahi City, targeting city residents. Survey findings indicated that many residents had experienced smishing incidents. Some respondents showed a commendable level of awareness regarding information security. Furthermore, the Dilandacita website aids respondents in handling population and civil registration matters efficiently.
Downloads
References
A. McCormac, T. Zwaans, K. Parsons, D. Calic, M. Butavicius, and M. Pattinson, “Individual Differences and Information Security Awareness,” Comput. Human Behav., vol. 69, pp. 151–156, 2017, doi: 10.1016/j.chb.2016.11.065.
H. B. Setiawan and F. U. Najicha, “PERLINDUNGAN DATA PRIBADI WARGA NEGARA INDONESIA TERKAIT DENGAN KEBOCORAN DATA,” vol. 6, no. 1, pp. 976–982, 2022.
A. K. Jain and B. B. Gupta, “A survey of phishing attack techniques, defence mechanisms and open research challenges,” Enterp. Inf. Syst., vol. 16, no. 4, pp. 527–565, 2022, doi: 10.1080/17517575.2021.1896786.
S. Mishra and D. Soni, “Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis,” Futur. Gener. Comput. Syst., vol. 108, pp. 803–815, 2020, doi: 10.1016/j.future.2020.03.021.
K. S. Jones, M. E. Armstrong, M. K. Tornblad, and A. Siami Namin, How social engineers use persuasion principles during vishing attacks, vol. 29, no. 2. 2020.
A. Ramadhani, “Keamanan Informasi,” Nusant. - J. Inf. Libr. Stud., vol. 1, no. 1, p. 39, 2018, doi: 10.30999/n-jils.v1i1.249.
K. Khando, S. Gao, S. M. Islam, and A. Salman, “Enhancing employees information security awareness in private and public organisations: A systematic literature review,” Comput. Secur., vol. 106, p. 102267, 2021, doi: 10.1016/j.cose.2021.102267.
S. Hina and P. D. D. Dominic, “Information security policies’ compliance: a perspective for higher education institutions,” J. Comput. Inf. Syst., vol. 60, no. 3, pp. 201–211, 2020, doi: 10.1080/08874417.2018.1432996.
A. Wiley, A. McCormac, and D. Calic, “More than the individual: Examining the relationship between culture and Information Security Awareness,” Comput. Secur., vol. 88, pp. 1–31, 2020, doi: 10.1016/j.cose.2019.101640.
A. Basit, M. Zafar, X. Liu, A. R. Javed, Z. Jalil, and K. Kifayat, “A comprehensive survey of AI-enabled phishing attacks detection techniques,” Telecommun. Syst., vol. 76, no. 1, pp. 139–154, 2021, doi: 10.1007/s11235-020-00733-2.
S. Mishra and D. Soni, “DSmishSMS-A System to Detect Smishing SMS,” Neural Comput. Appl., vol. 0123456789, 2021, doi: 10.1007/s00521-021-06305-y.
F. Salahdine and N. Kaabouch, “Social engineering attacks: A survey,” Futur. Internet, vol. 11, no. 4, 2019, doi: 10.3390/FI11040089.
R. S. Deora and D. M. Chudasama, “Brief Study of Cybercrime on an Internet,” no. June, 2021, doi: 10.37591/JoCES.
S. Mamonov and R. Benbunan-Fich, “The impact of information security threat awareness on privacy-protective behaviors,” Comput. Human Behav., vol. 83, pp. 32–44, 2018.
R. Fatima, A. Yasin, L. Liu, and J. Wang, “How persuasive is a phishing email? A phishing game for phishing awareness,” J. Comput. Secur., vol. 27, no. 6, pp. 581–612, 2019.
S. Salloum, T. Gaber, S. Vadera, and K. Shaalan, “Phishing Email Detection Using Natural Language Processing Techniques: A Literature Survey,” Procedia CIRP, vol. 189, no. 2019, pp. 19–28, 2021.
C. Balim and E. S. Gunal, “Automatic Detection of Smishing Attacks by Machine Learning Methods,” pp. 1–3, 2019.
Fakieh, A., & Akremi, A, “An Effective Blockchain-Based Defense Model for Organizations against Vishing Attacks,” Applied Sciences, 12(24), 13020, 2022.
Brkić, M, “A system architecture for preventing social engineering attacks via e-mail. Journal of Computer and Forensic Sciences,” 2(1), 43-52, 2023.
Ghasemi, M., Saadaat, M., & Ghollasi, O, “Threats of social engineering attacks against security of Internet of Things (IoT),” In Fundamental Research in Electrical Engineering: The Selected Papers of The First International Conference on Fundamental Research in Electrical Engineering (pp. 957-968). Springer Singapore, 2019.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Nuansa Informatika
This work is licensed under a Creative Commons Attribution 4.0 International License.