Jaminan Informasi dan Keamanan yang Lebih Baik: Studi Kasus BPJS Kesehatan
DOI:
https://doi.org/10.25134/ilkom.v18i2.202Keywords:
Security Lifecycle, Information Assurance, Security Assurance, Data LeakageAbstract
In 2021, BPJS Kesehatan experienced a significant data leak incident, where the personal data of 279 million Indonesians was leaked and traded on hacker forums. This incident has a serious impact on individual privacy and the reputation of BPJS Kesehatan. This paper analyzes the incident using the security lifecycle method, which consists of the stages of identification, analysis/assessment, protection, and monitoring. The findings suggest that weaknesses in IT security systems and a lack of continuous monitoring contributed to the leaks. Recommendations include strengthening security protocols, staff training, and implementing real-time monitoring to prevent similar incidents in the future.
Downloads
References
U. S. D. of Commerce and S. Wilbur L. Ross, Jr., “Control Baselines for Information Systems and Organizations,” NIST Spec. Publ. 800- 53B, no. 800–53B, 2020, [Online]. Available: https://nvlpubs.nist.gov/nistpubs/Speci alPublications/NIST.SP.800-53B.pdf
M. Lubis, C. Wardana, and A. Widjajarto, “The Development of Information System Security Operation Centre (SOC): Case Study of Auto Repair Company,” 6th Int. Conf. Interact. Digit. Media, ICIDM 2020, no. December 2020, 2020, doi: 10.1109/ICIDM51048.2020.9339678.
R. R. Putra, “ANALISIS MANAJEMEN RISIKO TI PADA KEAMANAN DATA E - LEARNING DAN ASET IT MENGGUNAKAN NIST SP 800 – 30 Revisi 1,” JATISI (Jurnal Tek. Inform. dan Sist. Informasi), vol. 6, no. 1, pp. 96–105, 2019, doi: 10.35957/jatisi.v6i1.154.
M. F. Safitra, M. Lubis, and M. T. Kurniawan, “Cyber Resilience: Research Opportunities,” ACM Int. Conf. Proceeding Ser., pp. 99–104, 2023, doi: 10.1145/3592307.3592323.
A. Hidayat and A. A. Hendriadi, “Penanggulangan Bencana Teknologi Informasi Di Data Center Perusahaan Dengan Metoda Disaster Recovery Plan (DRP),” Syntax, vol. Vol 1, No, no. 1, pp. 7–17, 2012.
R. Vishwakarma and A. K. Jain, “A survey of DDoS attacking techniques and defence mechanisms in the IoT network,” Telecommun. Syst., vol. 73, no. 1, pp. 3–25, 2020, doi: 10.1007/s11235-019-00599-z.
B. Bulgurcu, H. Cavusoglu, and I. Benbasat, “Qjarterly Special Issue Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness1,” Source MIS Q., vol. 34, no. 3, p. 39, 2010.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Nuansa Informatika
This work is licensed under a Creative Commons Attribution 4.0 International License.