Edy Soesanto, Nova Astia Ningsih, Lili Khoerunisa, Muhammad Ilham Faturrahman
{"title":"Keamanan Informasi Data Dalam Pemanfaatan Teknologi Informasi Pada PT Bank Central Asia (BCA)","authors":"Edy Soesanto, Nova Astia Ningsih, Lili Khoerunisa, Muhammad Ilham Faturrahman","doi":"10.55606/srjyappi.v1i3.334","DOIUrl":null,"url":null,"abstract":"In this era of very rapid growth of information systems, the security of information is something that must be considered, because if information can be accessed by unauthorized or irresponsible people, then the accuracy of the information will be doubted, it will even become information that is healed. Basically a secure system will protect the data in it such as user assistance (user identification), user authentication (user authentication), user authorization (user authorization). Several possible attacks (Hacking) that can be carried out, such as Intrusion, denial of services, joyrider, vandals, piracy, sniffing, spoofing and others. There are many kinds of threats to information systems, including: data theft, illegal use of systems, illegal data destruction, illegal data modification, system failures, human error (HR-human resources), natural disasters. The purpose of information security is prevent threats to the system and detect and repair damage that occurs to the system.","PeriodicalId":91358,"journal":{"name":"Medical student research journal","volume":"14 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Medical student research journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55606/srjyappi.v1i3.334","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this era of very rapid growth of information systems, the security of information is something that must be considered, because if information can be accessed by unauthorized or irresponsible people, then the accuracy of the information will be doubted, it will even become information that is healed. Basically a secure system will protect the data in it such as user assistance (user identification), user authentication (user authentication), user authorization (user authorization). Several possible attacks (Hacking) that can be carried out, such as Intrusion, denial of services, joyrider, vandals, piracy, sniffing, spoofing and others. There are many kinds of threats to information systems, including: data theft, illegal use of systems, illegal data destruction, illegal data modification, system failures, human error (HR-human resources), natural disasters. The purpose of information security is prevent threats to the system and detect and repair damage that occurs to the system.