Lili Khoerunisa
Universitas Bhayangkara Jakarta Raya

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Peranan Sistem Pengamanan File Dan Cyber Security Terhadap Obyek Vital Pada PT Bank Central Asia (BCA) Edy Soesanto; Nova Astia Ningsih; Muhammad Ilham Faturrahman; Lili Khoerunisa
Jurnal Akuntan Publik Vol. 1 No. 2 (2023): Juni : Jurnal Akuntan Publik
Publisher : Universitas Katolik Widya Karya Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59581/jap-widyakarya.v1i2.454

Abstract

Along with the rapid development of information technology, customer interaction with BCA digitally has also increased. This is followed by the risk of technology crime, so BCA continues to improve its information technology security system. The development of BCA's data security system is carried out with the aim of protecting data security and ensuring information technology systems are always ready to serve customer transactions, including preventing and anticipating cybercrimes and potential fraud. National vital objects have an important role in the life of the nation and state, both in terms of economic, political, social, cultural, defense, and security aspects. National vital objects also have a quite strategic role in national development. Data Loss Prevention (DLP) is a data security strategy implemented by BCA on an ongoing basis to increase the security of important electronic information from information theft or access by unauthorized parties. To ensure security in accessing BCA's internal applications that are connected to the internet, BCA applies additional security in the form of two-factor authentication to ensure access to the application is carried out by the right person. BCA has also used a data classification solution to ensure that every piece of data in the company is classified according to the level of data confidentiality.
Keamanan Informasi Data Dalam Pemanfaatan Teknologi Informasi Pada PT Bank Central Asia (BCA) Edy Soesanto; Nova Astia Ningsih; Lili Khoerunisa; Muhammad Ilham Faturrahman
Student Research Journal Vol. 1 No. 3 (2023): Juni : Student Research Journal
Publisher : Sekolah Tinggi Ilmu Administrasi (STIA) Yappi Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/srjyappi.v1i3.334

Abstract

In this era of very rapid growth of information systems, the security of information is something that must be considered, because if information can be accessed by unauthorized or irresponsible people, then the accuracy of the information will be doubted, it will even become information that is healed. Basically a secure system will protect the data in it such as user assistance (user identification), user authentication (user authentication), user authorization (user authorization). Several possible attacks (Hacking) that can be carried out, such as Intrusion, denial of services, joyrider, vandals, piracy, sniffing, spoofing and others. There are many kinds of threats to information systems, including: data theft, illegal use of systems, illegal data destruction, illegal data modification, system failures, human error (HR-human resources), natural disasters. The purpose of information security is prevent threats to the system and detect and repair damage that occurs to the system.