Claim Missing Document
Check
Articles

Found 3 Documents
Search

Analysis of Phishing Attack Trends, Impacts and Prevention Methods: Literature Study Fauzan Prasetyo Eka Putra; Ubaidi; Achmad Zulfikri; Goffal Arifin; Ilhamsyah, Revi Mario
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.4357

Abstract

Phishing is a growing form of cybercrime that poses a serious threat to information security in the digital world. This article aims to analyze the latest trends in phishing attacks and evaluate effective prevention methods. Using data from cybersecurity reports, case studies, and academic literature, this research identifies the latest phishing techniques such as spear phishing, whaling, and smishing that are increasingly sophisticated and difficult to detect. The analysis showed that while anti-phishing technologies such as email filters, two-factor authentication (2FA), and encryption have undergone significant developments, user awareness and education remain key factors in preventing phishing attacks. Additionally, strict policies and procedures at the organizational level also play an important role in reducing risk. The case studies presented in this article demonstrate the successful implementation of various prevention methods in several organizations, although challenges in terms of technology adoption and user training remain. For example, spear phishing and whaling have been effectively countered by tailored training programs and advanced threat detection systems. The article concludes by providing practical recommendations to increase user awareness and strengthen organizational policies to protect against phishing attacks. It also includes foresight to illustrate the possible evolution of phishing attacks, emphasizing the need for continuous innovation in cyber defense strategies. This comprehensive approach underscores the importance of a multi-layered defense system that combines technological solutions with human vigilance to effectively combat the ever-evolving threat of phishing.
Implementation And Evaluation Of Zerotier-Based Virtual Network For Device Connectivity Putra, Fauzan Prasetyo Eka; Ilhamsyah, Revi Mario; Efendy, Satrio Ananta; Rizki, Abdulloh
Brilliance: Research of Artificial Intelligence Vol. 5 No. 1 (2025): Brilliance: Research of Artificial Intelligence, Article Research May 2025
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v5i1.5966

Abstract

The demand for adaptable, secure, and easily deployable network connectivity is increasing rapidly, driven by continuous advancements in information and communication technology. This is particularly evident in the rising adoption of cloud computing, remote work models, and the growing need for scalable and flexible virtual network infrastructures. ZeroTier emerges as an innovative solution that combines the key concepts of Virtual Private Networks (VPN), Software Defined Networking (SDN), and peer-to-peer architectures into a unified platform. This study aims to explore the operational mechanism, implementation procedure, and real-world performance of ZeroTier in enabling seamless connections between devices located across different networks and physical locations. The research methodology includes a comprehensive literature review and practical testing by creating a virtual network using ZeroTier. The evaluation focuses on connection setup, security, ease of configuration, and performance under different network scenarios. The findings reveal that ZeroTier offers a reliable, secure, and efficient virtual networking environment, capable of delivering stable communication with minimal configuration effort. Additionally, it does not require complex infrastructure or technical expertise, making it suitable for academic research, remote work environments, and small to medium-sized businesses. The results suggest that ZeroTier can be considered a viable alternative to traditional VPN solutions and physical network setups, especially in contexts that demand agility, security, and simplicity.
Analysis of Phishing Attack Trends, Impacts and Prevention Methods: Literature Study Fauzan Prasetyo Eka Putra; Ubaidi; Achmad Zulfikri; Goffal Arifin; Ilhamsyah, Revi Mario
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.4357

Abstract

Phishing is a growing form of cybercrime that poses a serious threat to information security in the digital world. This article aims to analyze the latest trends in phishing attacks and evaluate effective prevention methods. Using data from cybersecurity reports, case studies, and academic literature, this research identifies the latest phishing techniques such as spear phishing, whaling, and smishing that are increasingly sophisticated and difficult to detect. The analysis showed that while anti-phishing technologies such as email filters, two-factor authentication (2FA), and encryption have undergone significant developments, user awareness and education remain key factors in preventing phishing attacks. Additionally, strict policies and procedures at the organizational level also play an important role in reducing risk. The case studies presented in this article demonstrate the successful implementation of various prevention methods in several organizations, although challenges in terms of technology adoption and user training remain. For example, spear phishing and whaling have been effectively countered by tailored training programs and advanced threat detection systems. The article concludes by providing practical recommendations to increase user awareness and strengthen organizational policies to protect against phishing attacks. It also includes foresight to illustrate the possible evolution of phishing attacks, emphasizing the need for continuous innovation in cyber defense strategies. This comprehensive approach underscores the importance of a multi-layered defense system that combines technological solutions with human vigilance to effectively combat the ever-evolving threat of phishing.