Pengaruh Keamanan Two Factor Authentication Terhadap Pencurian Data (Cyber Crime) Pada Media Sosial
Abstract
Security management refers to effective and efficient steps that must be taken to carry out security efforts and prevent losses so that disturbances that can cause losses do not occur. In the 4.0 era, people are required to utilize the latest technology to make it easier to solve problems, including data security. Cybercriminals often steal and manipulate data. Various data security methods have been developed, one of which is two factor authentication (2FA) which is widely used on social media. Gen-Z's lack of awareness about data security often leads to data leaks or account hijacking. By using 2FA, this problem can be overcome and provide more protection against cyber threats. This research aims to determine the effect of two factor authentication security on data theft on social media. This research uses qualitative methods with data collected from previous research as reference material. The results of this research show that public awareness and enlightenment regarding cybercrime is related to the use of social media.
Keywords
Full Text:
PDFReferences
Ahmad Riffat, D. (2023). MENGGUNAKAN SOSIAL MEDIA DENGAN BIJAK UNTUK MENGHINDARI BAHAYA CYBER CRIME. APPA : Jurnal Pengabdian Kepada Masyarakat.
Ahmed Buhari, Z. I. (2023). SOCIAL MEDIA AND CYBER SECURITY: PROTECTING AGAINST ONLINE THREATS AND ATTACKS. Researchgate.
Catur Nugroho, S. M. (2020). CYBER SOCIETY : Teknologi, Media Baru, Dan Disrupsi Informasi. KENCANA.
Edy Soesanto, D. (2023). Keamanan Informasi Data Dalam Pemanfaatan Teknologi Informasi Pada PT Bank Central Asia (BCA).
Eni Pudjiarti, S. F. (2023). Analisa Kesadaran Masyarakat Terhadap Bahaya Cybercrime Pada Penggunaan Teknologi Dan Media Sosial. BINA IN SANI ICT JOURNAL.
Guma Ali, M. A. (2020). Two-Factor Authentication Scheme For Mobile Money : A Review Of Threat Models And Countermeasures. MDIP.
Haider Mehraj, D. (2021). Protection Motivation Theory Using Multi-Factor Authentication For Providing Security Over Social Networking Sites.
Hero Raka Herdiantoro, M. R. (2023). IMPLEMENTASI TWO-FACTOR AUTHENTICATION (2FA) DAN FIREWALL POLICIES DALAM MENGAMANKAN WEBSITE. JMIK (JURNAL MAHASISWA ILMU KOMPUTER).
I Gusti Ngurah Dwi, D. S. (2023). ANALISA TINDAK PIDANA CYBER CRIME PADA BIDANG PERBANKAN NASIONAL BERUPA PENCURIAN DATA KARTU KREDIT (CARDING).
Iwan Setiawan, F. G. (2024). PENCURIAN DATA DAN INFORMASI DI INDONESIA SEBAGAI KEJAHATAN CYBER DALAM PERSPEKTIF PEPERANGAN ASIMETRIS. NUSANTARA: Jurnal Ilmu Pengetahuan Sosial.
Ken Reese, T. S. (2019). A Usability Study Of Five Two-Factor Authentication Methods.
Lanang Adi Saputra, F. M. (2024). Ancaman Keamanan Pada Sistem Informasi Manajemen Perusahaan. Researchgate.
Mauli Bayu Segoro, P. A. (2020). Implementation Of Two Factor Authentication (2FA) And Hybrid Encryption To Reduce The Impact Of Account Theft On Android-Based Instant Messaging (IM) Applications. Researchgate.
Mitch Holmes, J. O. (2019). Online Security Behaviour: Factors Influencing Intention To Adopt Two-Factor Authentication.
Neneng Nuryati, D. (2022). Two Factor Authentication Sistem Inventarisasi Barang Dan Manajemen Dana Bantuan Operasional Sekolah Dinas Pendidikan Nasional.
Nenna Irsa Syahputri, D. (2023). Penyuluhan Pentingnya Two Factor Authentication Dan Aplikasinya Di Era Keamanan Digital. Jurnal Pengabdian Masyarakat Bangsa.
Octo Iskandar S.H M.H., D. H. (2021). BAHAN AJAR MATA KULIAH MANAJEMEN SEKURITI.
Potter, K. (2018). INCREASED USE OF TWO-FACTOR AUTHENTICATION FORCE NEW SOCIAL ENGINEERING TACTICS. Proqouest.
R Suresh, K. B. (2024). Two Factor Authentication By Using Decentralized File Storage System. Researchgate.
Rasa Bruzgiene, K. J. (2021). Securing Remote Access To Information Systems Of Critical Infrastructure Using Two-Factor Authentication. MDPI.
Slamet. (2022). PERTAHANAN PENCEGAHAN SERANGAN SOCIAL ENGINEERING MENGGUNAKAN TWO FACTOR AUTHENTICATION (2FA) BERBASIS SMS (SHORT MESSAGE SYSTEM). Jurnal SPIRIT.
Surya Bodhi, D. T. (2022). KEAMANAN DATA PRIBADI DALAM SISTEM PEMBAYARAN E-WALLET TERHADAP ANCAMAN PENIPUAN DAN PENGELABUAN (CYBERCRIME). UNES LAW REVIEW.
Szczygiel, I. (2023). Two-Factor Authentication (2FA) Comparison Of Methods And Applications. Advances In Web Development Journal.
Wilem Musu, D. (2022). Analisis Pola Penggunaan Fitur Autentikasi Dua Faktor Oleh Para Remaja Di Media Sosial. JURNAL SISTEM INFORMASI DAN TEKNOLOGI INFORMASI.
Willy Sudiarto Raharjo, I. D. (2017). IMPLEMENTASI TWO FACTOR AUTHENTICATION DAN PROTOKOL ZERO KNOWLEDGE PROOF PADA SISTEM LOGIN. Jutisi.
Refbacks
- There are currently no refbacks.