PEMBEKALAN TEKNIK ALGORITMA DALAM KEAMANAN DATA ERA REVOLUSI INDUSTRI 4.0

Nizirwan Anwar, Erry Yudhya Mulyani, Ummanah Ummanah

Sari


Allah SWT created humans on earth as sosial beings to interact or communicate with each other (correspondence / collaboration). And along with the exponential development of information and communication technology, it has changed the mindset and attitude and the way of communicating in the virtual world of sosial networking pages via cyberspace. With the aim of gaining comfort, sharing ideas, calm, creative and innovative collaborations that are constructive in correspondence or user-generated content. In computer security, there are several important aspects of Confidentiality, so that the data on the device does not fall into unauthorized "hands" and which is not authorized. In general, the concept of cryptography is an information security or protection technique that is carried out by processing original information with a certain key using an encryption algorithm so as to produce new information that cannot be read directly. And to restore the integrity of the ciphertext, it can be returned to the original information through the description process. In principle, encryption is the process of randomizing or changing the initial message into other forms and structures so that the initial message cannot be recognized by other parties.

 

Keywords: human, sosial-media, cryptography, cyberspace, encryption / decryption


Teks Lengkap:

PDF

Referensi


Anonymous. (2020). Common Vulnerabilities and Exposures. Retrieved March 25, 2020, from Wikipedia website: cve.mitre.org

Anwar, N., Munawwar, M., Abduh, M., & Santosa, N. B. (2018). Komparatif Performance Model Keamanan Menggunakan Metode Algoritma AES 256 bit dan RSA. Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 2(3), 783–791. https://doi.org/10.29207/resti.v2i3.606

Boyd, D., & Ellison, N. (2007). Social Network Sites: Definition, History, and Scholarship. J. Computer-Mediated Communication., 13(1), 210–230. https://doi.org/10.1111/j.1083-6101.2007.00393.x

Christopher Hadnagy. (2011). Social Engineering: The Art of Human Hacking. Retrieved from http://www.wiley.com

Corporation, T. M. (2016). Common Vulnerabilities and Exposures (CVE®). Retrieved from https://cve.mitre.org/docs/cve-intro-handout.pdf

Dakwah, J., Sosial, P., Vol, K., Syaikh, I., Siddik, A., & Belitung, B. (2018). Hate Speech di Indonesia: Bahaya dan Solusi. 9(1), 3–4.

Indonesia, B. P. S. (2020). Statistik Indonesia 2020 (1st ed.; S. P. dan K. Statistik, Ed.). Retrieved from https://www.bps.go.id/publication/2020/04/29/e9011b3155d45d70823c141f/statistik-indonesia-2020.html

Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of Sosial Media. Business Horizons, 53(1), 59–68.

Kemp, S. (2020). Digital 2020: 3.8 billion people use social media.

Kominfo. (2014). Pengguna Internet Indonesia Nomor Enam Dunia. Retrieved from Kementrian Komunikasi dan Informatika Republik Indonesia website: http://tekno.kompas.com/read/2014/11/24/07430087/Pengguna.Internet.Indonesia.Nomor.Enam.Dunia

Munir, R. (2004). Advanced Encryption Standard ( AES ) Departemen Teknik Informatika Institut Teknologi Bandung 13 . Advanced Encryption Standard ( AES ).

Orman, H. (2015). Encrypted Email - SPRINGER BRIEFS IN COMPUTER SCIENCE.

Rahardjo, B. (2017). Keamanan Informasi & Jaringan. 47. Retrieved from http://budi.rahardjo.id/files/keamanan.pdf

Rizki, R. (2018). Polri: Indonesia Tertinggi Kedua Kejahatan Siber di Dunia. Retrieved from https://www.cnnindonesia.com/nasional/20180717140856-12-314780/polri-indonesia-tertinggi-kedua-kejahatan-siber-di-dunia

Rothke, B. (2007). A look at the Advanced Encryption Standard (AES). Information Security Management Handbook, Sixth Edition, 1151–1158. https://doi.org/10.1201/9781439833032.ch89

Schneier, B. (1996). Foreword by Whitfield Diffie Preface About the Author Chapter 1 — Foundations Part I — Cryptographic Protocols Chapter 2 — Protocol Building Blocks Chapter 3 — Basic Protocols Chapter 4 — Intermediate Protocols Chapter 5 — Advanced Protocols.

Stallings, W. (2014). Cryptography and Network Security: Principles and Practice, International Edition: Principles and Practice. Retrieved from https://books.google.com/books?id=q_6pBwAAQBAJ&pgis=1




DOI: https://doi.org/10.47007/abd.v7i1.3723

Refbacks

  • Saat ini tidak ada refbacks.


Lembaga Penerbitan Universitas Esa Unggul
Jalan Arjuna Utara No 9 Kebon Jeruk Jakarta 11510
Telp : 021 5674223 ext 266

email : [email protected]

 

Web Analytics View My Stats