Analisis Bahaya Serangan Ransomeware Terhadap Layanan Perbankan

Authors

  • Nurul Monika Larasati Universitas Malikussaleh, Aceh
  • Rayyan Firdaus Universitas Malikussaleh, Aceh

DOI:

https://doi.org/10.61132/merkurius.v2i4.151

Keywords:

Banking Services, Ransomware, data security

Abstract

In the ever-growing digital era, banking services also continue to develop and become important for both individuals and businesses to carry out financial transactions quickly and easily. With these technological advances, serious concerns have arisen regarding the security of banking service data. Ransomware is a type of malicious program or malware that threatens to destroy or block access to important data or systems until a ransom is paid by the victim. Ransomware can infect computers in various ways, for example through attached files that the victim downloads, or attacking software directly by looking for vulnerable loopholes. Ransomware attacks have caused many losses, especially in the banking sector, both in terms of financial and customer data security. Protection of banking services from cyber attacks is very important. Proactive prevention efforts, early detection, quick response, application of appropriate technology and implementation of strong data security policies are crucial elements in maintaining the integrity and security of financial transactions. Therefore, it is very important for banking services to understand ransomware attacks and the dangers of ransomware by strengthening computer data security. The research method used is descriptive qualitative research using the literature study method.

References

Farid, A. (2022, Oktober 8). 3 Strategi Penerapan Cyber Security Dunia Perbankan. Retrieved from www.exabyte.co.id:https://www.exabytes.co.id/blog/penerapan-cyber-security-dunia-perbankan/

Harmen, F. A. (2023, juni 12). Ransomware, Ancaman dan Langkah-Langkah untuk Menghindarinya. Retrieved from djpk.kemenkeu.go.id: https://www.djkn.kemenkeu.go.id/kanwil-jabar/baca-artikel/16188/Ransomware-Ancaman-dan-Langkah-Langkah-untuk-Menghindarinya.html

Hartono, B. (2023). Ransomware: Memahami Ancaman Keamanan Digital. Bincang Sains dan Teknologi (BST), 55-62.

Johnson, K., & Putih, L. (2021). Ancaman Keamanan Siber dalam Layanan Perbankan Online: Tinjauan Risiko yang Muncul. Jurnal Keamanan Finansial, 9(3), 67-78.

Muftiadi, A., Agustina, T. P., & Evi, M. (2022). Studi kasus keamanan jaringan komputer: analisis ancaman phising terhadap layanan online banking. Jurnal Ilmiah Teknik, 61-63.

Muhtar. (2023, Mei 23). Mengenal Ransomware; Cara Kerja dan Tips Pencegahannya. Retrieved from uic.ac.id: https://uici.ac.id/mengenal-ransomware-cara-kerja-dan-tips-pencegahannya/

Respati, A. R., & Sukmana, Y. (2023, Mei 17). Perjalanan Kasus BSI, dari Gangguan Layanan sampai "Hacker" Minta Tebusan. Retrieved from Kompas.com: https://money.kompas.com/read/2023/05/17/072027926/perjalanan-kasus-bsi-dari-gangguan-layanan-sampai-hacker-minta-tebusan?page=all

Syahputra, E. (2021, Desember 1). Perlu Cara Jenius Mengatasi Kejahatan Siber Perbankan. www.cnbcindonesia.com:https://www.cnbcindonesia.com/tech/20211201161804-37-295890/perlu-cara-jenius-mengatasi-kejahatan-siber-perbankan

Wardani, A. S. (2024, Januari 14). Pakar Sebut BSI Jadi Korban Ransomware, 1,5 TB Data Milik 15 Juta Nasabah Dicuri dan Hacker Minta Tebusan. Retrieved from www.liputan6.com: https://www.liputan6.com/tekno/read/5285443/pakar-sebut-bsi-jadi-korban-ransomware-15-tb-data-milik-15-juta-nasabah-dicuri-dan-hacker-minta-tebusan

Wang, Q., & Liu, M. (2020). Mitigasi Risiko Siber di Perbankan: Strategi dan Praktik Terbaik. Jurnal Internasional Teknologi Perbankan, 8(1), 34-47.

www.acerid.com. (2023, Juni 6). Ransomware :Cara Kerja, Contoh, hingga Mengatasi Serangan. Retrieved from www.acerid.com: https://www.acerid.com/bisnis/cara-kerja-ransomware-hingga-cara-mengatasinya

Published

2024-06-20

How to Cite

Nurul Monika Larasati, & Rayyan Firdaus. (2024). Analisis Bahaya Serangan Ransomeware Terhadap Layanan Perbankan. Merkurius : Jurnal Riset Sistem Informasi Dan Teknik Informatika, 2(4), 102–109. https://doi.org/10.61132/merkurius.v2i4.151

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 > >> 

You may also start an advanced similarity search for this article.