Claim Missing Document
Check
Articles

Found 2 Documents
Search

Keylogger Threats in Computer Security Aspects Samsoni; Ditonius Zebua; Basir; Bayu Aji Pamungkas; Hafidsyah Eka Prayogi; Rifaldie Muhammad; Supri Wahyudi; Wira Samudra
International Journal of Integrative Sciences Vol. 2 No. 6 (2023): June 2023
Publisher : PT FORMOSA CENDEKIA GLOBAL

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55927/ijis.v2i6.4520

Abstract

Along with the development of increasingly advanced technology, the level of need for information security is very important. With the development of information, new problems arise regarding computer security, an example of computer security that often occurs is data theft. Data security in accessing a computer is a form that must be considered both physically and non-physically. One form of data theft crime is recording traces of a computer keyboard with the help of hardware or software. Keylogger is a data theft technique by recording typing on a computer keyboard, by recording when the computer is entered, intruders can enter and steal it. The purpose of this paper is to understand how keyloggers work so that prevention can be carried out by carrying out various kinds of solutions and also to maintain data security systems and know supporting and anti-keylogger software
The Effectiveness of the Port Knocking Method in Computer Security Muhammad Nur; Teguh; Wasis Waskito; Azhar Fathoni; Bagas; Yuda; Ramadan Galih; Alif Ainnun Qoyum; Samsoni
International Journal of Integrative Sciences Vol. 2 No. 6 (2023): June 2023
Publisher : PT FORMOSA CENDEKIA GLOBAL

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55927/ijis.v2i6.4526

Abstract

Computer network is a group of autonomous computers that are interconnected with each other using communication protocols through communication media so that they can share information, programs, share hardware devices such as printers, hard disks, and so on. One of the most important network components is network security, computer security involves various aspects, including protection against unauthorized access, data theft, system tampering, and operational disruptions. This research method uses descriptive method. At this stage specifications are determined regarding the system that will be designed to meet the objectives of this study, the Port Knocking method to secure the Router can be applied to Mikrotik routers by utilizing a firewall which functions to guard against illegal access and overcome problems caused by Attackers