IMPLEMENTATION OF A HUMAN FIREWALL TO PREVENT SOCIAL ENGINEERING THREATS IN REALIZING CYBER SECURITY
Abstract
The rapid development of information and communication technology has provided many conveniences in various aspects of life. However, on the other hand, this also brings increasing cyber security threats, one of which is the threat of social engineering. Therefore, this research aims to analyze the implementation of a human firewall to prevent social engineering threats in realizing cyber security. The research method used is a qualitative research method with in-depth interviews with several key informants including cyber security managers, employees involved in training programs, and cyber security experts in PT. Mekar Armada Jaya Magelang. From the results of the research that has been carried out, it can be concluded that the implementation of a human firewall is effective in preventing social engineering threats and improving cyber security. The integration of enabling technology with human training strengthens the company's defenses, while clear security policies and top management support help overcome the challenges of participation and organizational culture change. However, challenges such as low employee participation and resistance to cultural change remain. For greater success, the training approach should be relevant to the employee's role, use technology to increase engagement, and involve employees in the development of training materials. The success and failure case studies found show that this strategy can be adapted and improved continuously.
Keywords
Full Text:
PDFReferences
Alharthi, D. N., & Regan, A. C. (2020). Social engineering defense mechanisms: A taxonomy and a survey of employees’ awareness level. Intelligent Computing: Proceedings of the 2020 …. https://doi.org/10.1007/978-3-030-52249-0_35
Anthony, B. (2019). Social Engineering: The Human Element of Cybersecurity. search.proquest.com. https://search.proquest.com/openview/de962d722378732c5e7e2cb9049cf9a1/1?pq-origsite=gscholar&cbl=18750&diss=y
Arfan Dwi Madya, Bagas Djoko Haryanto, & Devi Putri Ningsih. (2023). Keefektifan Metode Proteksi Data dalam Mengatasi Ancaman Cybersecurity. Indonesian Journal of Education And Computer Science, 1(3), 127–135. https://doi.org/10.60076/indotech.v1i3.236
Arikunto, S. (2009). Dasar-Dasar Evaluasi Pendidikan. PT. Bumi Aksara.
Astakhova, L. V. (2020). A corporate employee is a subject of corporate information security management. Scientific and Technical Information Processing. https://doi.org/10.3103/S0147688220020069
Ballqish, Amelia, A. (2023). Perlindungan Hukum Terhadap Nasabah Bank Syariah Indonesia Dari Serangan Cybercrime. Journal of Engineering Research, 84. https://repository.uinjkt.ac.id/dspace/handle/123456789/74011%0Ahttps://repository.uinjkt.ac.id/dspace/bitstream/123456789/74011/1/BALLQISH AMELIA ASSIFFA - FSH.pdf
Bossomaier, T., D’Alessandro, S., & Bradbury, R. (2019). Human dimensions of cybersecurity. books.google.com. https://books.google.com/books?hl=en&lr=&id=8lW9DwAAQBAJ&oi=fnd&pg=PP1&dq=human+firewall++social+engineering+cyber+security&ots=itEV7TWhSy&sig=KKJXA2EMedJsGadgu9cl2t_Zjgg
Dianta, I. A., & Zusrony, E. (2019). Analisis Pengaruh Sistem Keamanan Informasi Perbankan Pada Nasabah Pengguna Internet Banking. INTENSIF: Jurnal Ilmiah Penelitian Dan Penerapan Teknologi Sistem Informasi, 3(1), 1. https://doi.org/10.29407/intensif.v3i1.12125
Diogenes, Y., & Ozkaya, E. (2019). Cybersecurity–Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against …. books.google.com. https://books.google.com/books?hl=en&lr=&id=E7zHDwAAQBAJ&oi=fnd&pg=PP1&dq=human+firewall++social+engineering+cyber+security&ots=tmpeGymugS&sig=H7Cc1b_owUECL_LHw9nxsCJLhTU
Gulyas, O., & Kiss, G. (2022). Cybersecurity threats in the banking sector. … on Control, Decision and Information …. https://ieeexplore.ieee.org/abstract/document/9804140/
Hidayah, I. R. (2020). Representasi Social Engineering Dalam Tindak Kejahatan Dunia Maya (Analisis Semiotika Pada Film Firewall). Tibanndaru : Jurnal Ilmu Perpustakaan Dan Informasi, 4(1), 30. https://doi.org/10.30742/tb.v4i1.905
Jensen, M. L., Wright, R., Durcikova, A., & ... (2020). Building the Human Firewall: Combating Phishing through Collective Action of Individuals Using Leaderboards. Available at SSRN …. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3622322
Morrow, V. (2001). Using qualitative methods to elicit young people’s perspectives on their environments: some ideas for community health initiatives. Health Education Research. https://academic.oup.com/her/article-abstract/16/3/255/703087
Rowan, N., & Wulff, D. (2007). Using qualitative methods to inform scale development. Qualitative Report. https://eric.ed.gov/?id=EJ800203
Salama, R., & Al-Turjman, F. (2023). Cyber-Security Countermeasures and Vulnerabilities to Prevent Social-Engineering Attacks. Artificial Intelligence of Health-Enabled …. https://doi.org/10.1201/9781003322887-7
Sandelowski, M. (1994). Focus on qualitative methods. The use of quotes in qualitative research. Research in Nursing &health. https://doi.org/10.1002/nur.4770170611
Sudiyono, A. (2011). Pengantar Evaluasi Pendidikan. Rajawali Pers.
Taib, R., Yu, K., Berkovsky, S., Wiggins, M., & ... (2019). Social engineering and organizational dependencies in phishing attacks. … on Human-Computer …. https://doi.org/10.1007/978-3-030-29381-9_35
Vitadiar, T. Z., Permadi, G. S., Putra, R. A. Y., & Putri, U. S. (2021). Etika &Hukum Cyber. eprints.unhasy.ac.id. https://eprints.unhasy.ac.id/230/
Witjaksono, D. K., & Kriswibowo, A. (2023). Fondasi Kemananan Siber Untuk Layanan Pemerintah. Al-Ijtima`i: International Journal of Government and Social Science, 9(1), 21–38. https://doi.org/10.22373/jai.v9i1.2057
Wojcicki, N. M. (2019). Phishing Attacks: Preying on Human Psychology to Beat the System and Developing Cybersecurity Protections to Reduce the Risks. World Libraries. http://worldlibraries.dom.edu/index.php/worldlib/article/view/579
DOI: http://dx.doi.org/10.31604/eksakta.v10i1.%25p
Article Metrics
Abstract view : 38 timesPDF - 1 times
Refbacks
- There are currently no refbacks.