Kesadaran Keamanan Siber pada Kalangan Mahasiswa Universitas di Kota Batam

Authors

  • Tony Tan Universitas Internasional Batam
  • Hendi Sama Universitas Internasional Batam
  • Tony Wibowo Universitas Internasional Batam
  • Gautama Wijaya Universitas Internasional Batam
  • Osei Enoch Aboagye Universitas Internasional Batam

DOI:

https://doi.org/10.34010/jati.v14i2.12518

Keywords:

Keamanan Kata sandi, Keamanan Browser, CIA

Abstract

Keamanan siber adalah perlindungan sistem perangkat lunak dan perangkat keras komputer. Keamanan siber menetapkan persyaratan yang harus diikuti oleh pengguna komputer untuk mencegah segala jenis serangan siber. Namun, hanya pengguna yang lebih sadar akan keamanan siber yang terlindungi dengan baik. Dengan memastikan kerahasiaan, integritas, dan ketersediaan, kata sandi, sistem operasi, serta konfigurasi privasi dan keamanan platform media sosial harus ditanggapi dengan serius. Penelitian ini bertujuan untuk mengukur tingkat kesadaran keamanan siber mahasiswa di Kota Batam. Penulis menggunakan metode kuantitatif dengan melakukan tes statistik yang berbeda, seperti tes validitas, tes reliabilitas dan ukuran sampel. Survei dilakukan dengan menyebarkan kuesioner kepada mahasiswa untuk diisi secara online. Respon dihitung dalam persentase. Sebanyak 469 mahasiswa dari lima perguruan tinggi yang dipilih secara acak dari Batam, Kepulauan Riau, menanggapi survei tersebut. Setelah menganalisis data, hasilnya menunjukkan bahwa mahasiswa memiliki tingkat kesadaran keamanan siber yang rendah karena 11 mahasiswa tidak menerapkan pembaruan perangkat lunak dan 6 mengabaikan pembaruan perangkat lunak. Selain itu, 75,3% mahasiswa menggunakan kata sandi yang digunakan sebelumnya, 74% menggunakan satu kata sandi yang kuat untuk akun yang berbeda dan 78,5% mengatakan itu menjengkelkan untuk memiliki kata sandi yang panjang dan kuat untuk setiap akun. Terakhir, 73,3% berbagi lokasi saat ini secara publik di media sosial dan 68,7% berbagi informasi pribadi yang sensitif. Oleh karena itu, penulis merekomendasikan universitas untuk memasukkan pendidikan keamanan siber di semua departemen. Juga, ada kebutuhan untuk pelatihan reguler baik dosen maupun mahasiswa tentang keamanan siber.

References

F. Suwana, A. Pramiyanti, I. D. Mayangsari, R. Nuraeni, and Y. Firdaus, “Digital Media Use of Generation Z During Covid-19 Pandemic,” Jurnal Sosioteknologi, vol. 19, no. 3, pp. 327–340, 2020, doi: 10.5614/sostek.itbj.2020.19.3.2.

A. Pratamasari, “Cybersecurity and Custom Regulations as Trade Barriers in ASEAN E-Commerce: Case of Indonesian C-Commerce,” Jurnal Global & Strategis, vol. 14, no. 1, p. 1, 2020, doi: 10.20473/jgs.14.1.2020.1-16.

E. Syarief, “Security Concerns in Digital Transformation of Electronic Land Registration: Legal Protection in Cybersecurity Laws in Indonesia,” International Journal of Cyber Criminology, vol. 16, no. 2, pp. 32–46, 2022, doi: 10.5281/zenodo.4766565.

I. Ali, “Examining Cyber Security Implementation Through TLS/SSL on Academic Institutional Repository in Indonesia,” Berkala Ilmu Perpustakaan dan Informasi, vol. 17, no. 2, pp. 238–249, 2021, doi: 10.22146/bip.v17i2.2082.

F. Aferudin and K. Ramli, “The Development of Cybersecurity Information Sharing Framework for National Critical Information Infrastructure in Indonesia,” Budapest International Research and Critics Institute (BIRCI-Journal), vol. 5, no. August 2023, pp. 22859–22872, 2022, doi: 10.33258/birci.v5i3.6297.

S. S. Aulianisa and Indirwan, “Critical Review of The Urgency of Strenghthening The Implementation of Cyber Security and Resilience in Indonesia,” Lesrev (Lex Scientia Law Review), vol. 4, no. 1, pp. 33–48, 2020, doi: 10.15294/lesrev.v4i1.38197.

F. O. Catak, A. F. Yazi, O. Elezaj, and J. Ahmed, “Deep Learning Based Sequential Model for Malware Analysis Using Windows exe API Calls,” PeerJ Computer Science, vol. 6, no. 2020, pp. 1–23, 2020, doi: 10.7717/PEERJ-CS.285.

A. Kovacevic, N. Putnik, and O. Toskovic, “Factors Related to Cyber Security Behavior,” IEEE Access, vol. 8, no. 2020, pp. 125140–125148, 2020, doi: 10.1109/ACCESS.2020.3007867.

M. Salehudin, Z. Zulherman, A. Arifin, and D. Napitupulu, “Extending Indonesia Government Policy for E-Learning and Social Media Usage,” Pegem Journal of Education and Instruction, vol. 11, no. 2, pp. 14–26, 2021, doi: 10.14527/pegegog.2021.00.

M. Khader, M. Karam, and H. Fares, “Cybersecurity Awareness Framework for Academia,” Information (Switzerland), vol. 12, no. 10, pp. 1–20, 2021, doi: 10.3390/info12100417.

B. Dash, M. F. Ansari, P. Sharma, and A. Ali, “Threats and Opportunities with AI-based Cyber Security Intrusion Detection: A Review,” International Journal of Software Engineering & Applications, vol. 13, no. 5, pp. 13–21, 2022, doi: 10.5121/ijsea.2022.13502.

T. Alharbi and A. Tassaddiq, “Assessment of Cybersecurity Awareness among Students of Majmaah University,” Big Data and Cognitive Computing, vol. 5, no. 2, pp. 1–15, 2021, doi: /10.3390/bdcc5020023.

A. M. Adam, “Sample Size Determination in Survey Research,” Journal of Scientific Research and Reports, vol. 26, no. 5, pp. 90–97, 2020, doi: 10.9734/jsrr/2020/v26i530263.

T. Muhammad, “Integrative Cybersecurity: Merging Zero Trust, Layered Defense, and Global Standards for a Resilient Digital Future,” International Journal of Computer Science and Technology (IJCST), vol. 1, no. 4, pp. 99–135, 2017, [Online]. Available: https://www.ijcst.com/

P. Limna, T. Kraiwanit, and S. Siripipattanakul, “The Relationship Between Cyber Security Knowledge, Awareness and Behavioural Choice Protection Among Mobile Banking Users in Thailand,” International Journal of Computing Sciences Research, vol. 7, no. August 21, pp. 1133–1151, 2023, doi: 10.25147/ijcsr.2017.001.1.123.

E. Löffler, B. Schneider, P. M. Asprion, and T. Zanwar, “CySecEscape 2.0-A Virtual Escape Room to Raise Cybersecurity Awareness,” International Journal of Serious Games, vol. 8, no. 1, pp. 59–70, 2021, doi: 10.17083/ijsg.v8i1.413.

A. A. Garba, M. M. Siraj, and S. H. Othman, “An Assessment of Cybersecurity Awareness Level Among Northeastern University students in Nigeria,” International Journal of Electrical and Computer Engineering, vol. 12, no. 1, pp. 572–584, 2022, doi: 10.11591/ijece.v12i1.pp572-584.

L. Bottyán, “Cybersecurity Awareness Among University Students.,” Journal of Applied Technical and Educational Sciences, vol. 13, no. 3, pp. 1–11, 2023, doi: https://doi.org/10.24368/jates363.

A. Setiawan, S. Wirawan, H. Djajakerta, and H. Haryanto, “Student’s Cybersecurity Awareness in Post Covid-19 Pandemic,” Journal of Economics, Finance and Management Studies, vol. 06, no. 10, pp. 5057–5066, 2023, doi: 10.47191/jefms/v6-i10-38.

K. Matyokurehwa, N. Rudhumbu, C. Gombiro, and C. Mlambo, “Cybersecurity Awareness in Zimbabwean Universities: Perspectives from the Students,” Security and Privacy, vol. 4, no. 2, pp. 1–11, 2021, doi: 10.1002/spy2.141.

P. Stockle, B. Grobauer, and A. Pretschner, “Automated Implementation of Windows-related Security-Configuration Guides,” International Conference on Automated Software Engineering, vol. 20, no. 2020, pp. 598–610, 2020, doi: 10.1145/3324884.3416540.

A. A. Al Shamsi, “Effectiveness of Cyber Security Awareness Program for Young Children: A Case Study in UAE Effectiveness of Cyber Security Awareness Program for Young Children View Project Sentiment Analysis for Arabic Dialects View project Effectiveness of Cyber Security,” International Journal of Information Technology and Language Studies (IJITLS), vol. 3, no. 2, pp. 8–29, 2019, doi: 10.13140/RG.2.2.28488.14083.

M. P. Aphane, “Cybersecurity Awareness on Cybercrime Among the Youth in Gauteng Province,” International Journal of Social Science Research and Review, vol. 6, no. 8, pp. 23–32, 2023, doi: 10.47814/ijssrr.v6i8.1414.

H. İ. Haseski, “Cyber Security Skills of Pre-service Teachers as a Factor in Computer-assisted Education,” International Journal of Research in Education and Science, vol. 6, no. 3, pp. 484–500, 2020, doi: 10.46328/ijres.v1i1.1006.

M. F. Ansari, “A Quantitative Study of Risk Scores and the Effectiveness of AI-Based Cybersecurity Awareness Training Programs,” International Journal of Smart Sensor and Adhoc Network, vol. 3, no. 3, pp. 1–8, 2022, doi: 10.47893/ijssan.2022.1212.

S. A. Pitchay, A. S. Suhaimi, N. Hayaati, and M. Alwi, “Enhancing Cyber-attacks Awareness via Mobile Gamification Techniques,” International Journal of Advanced Research in Technology and Innovation, vol. 4, no. 2, pp. 69–84, 2022, doi: 10.55057/ijarti.2022.4.2.8.

K. Umaima, “Comparative Study Of Linux and Windows,” International Journal of Academic Research, vol. 2, no. 2, pp. 53–70, 2020, doi: 10.5281/zenodo.3692081.

M. Kulkarni, “Analysis of Process Structure in Windows Operating System,” International Research Journal of Engineering and Technology, vol. 7, no. 6, pp. 1–5, 2020. [Online]. Available: https://www.irjet.net/archives/V7/i6/IRJET-V7I601.pdf

N. Tosun et al., “A SWOT Analysis to Raise Awareness about Cyber Security and Proper Use of Social Media: Istanbul Sample,” International Journal of Curriculum and Instruction, vol. 12, pp. 271–294, 2020, [Online]. Available: https://ijci.globets.org/index.php/IJCI/article/view/327

F. Abu-Amara, R. Almansoori, S. Alharbi, M. Alharbi, and A. Alshehhi, “A Novel SETA-based Gamification Framework to Raise Cybersecurity Awareness,” International Journal of Information Technology (Singapore), vol. 13, no. 6, pp. 2371–2380, 2021, doi: 10.1007/s41870-021-00760-5.

D. M. Rayman, A. Asmawi, N. Afiza, and M. Ariffin, “WBEC : A Web Browsers Evidence Collection Toolkit for Web Browsers Usage in Windows 10,” International Journal of Technology Management and Information System (IJTMIS), vol. 4, no. 1, pp. 1–15, 2022, [Online]. Available: https://myjms.mohe.gov.my/index.php/ijtmis/article/view/17664

B. Hu, E. Gunnell, and Y. Sun, “Smart Tab Predictor: A Chrome Extension to Assist Browser Task Management using Machine Learning and Data Analysis,” International Journal of Information Technology (IJIT), vol. 1, no. 6, pp. 227–240, 2021, doi: 10.5121/csit.2021.112318.

L. F. Lina, “Privacy Concerns in Personalized Advertising Effectiveness on Social Media,” Sriwijaya International Journal of Dynamic Economics and Business, vol. 1, no. 2, p. 147, 2021, doi: 10.29259/sijdeb.v1i2.147-156.

L. Jiang, A. Jayatilaka, M. Nasim, M. Grobler, M. Zahedi, and M. A. Babar, “Systematic Literature Review on Cyber Situational Awareness Visualizations,” IEEE Access, vol. 10, no. 26, pp. 57525–57554, 2022, doi: 10.1109/ACCESS.2022.3178195.

H. Irfan, K. J. Akhter, and R. Shakeel, “Cybersecurity and Multidisciplinary Students: A Survey,” International Journal of Science and Engineering Research, vol. 11, no. 4, pp. 1786–1791, 2020, [Online]. Available: https://www.ijser.org/researchpaper/Cybersecurity-and-Multidisciplinary-Students-A-Survey.pdf

Downloads

Published

2024-09-02

How to Cite

[1]
“Kesadaran Keamanan Siber pada Kalangan Mahasiswa Universitas di Kota Batam”, JATI, vol. 14, no. 2, pp. 163–173, Sep. 2024, doi: 10.34010/jati.v14i2.12518.