Keylogger Threats in Computer Security Aspects
DOI:
https://doi.org/10.55927/ijis.v2i6.4520Keywords:
KeyLogger Threat, Computer SecurityAbstract
Along with the development of increasingly advanced technology, the level of need for information security is very important. With the development of information, new problems arise regarding computer security, an example of computer security that often occurs is data theft. Data security in accessing a computer is a form that must be considered both physically and non-physically. One form of data theft crime is recording traces of a computer keyboard with the help of hardware or software. Keylogger is a data theft technique by recording typing on a computer keyboard, by recording when the computer is entered, intruders can enter and steal it. The purpose of this paper is to understand how keyloggers work so that prevention can be carried out by carrying out various kinds of solutions and also to maintain data security systems and know supporting and anti-keylogger software
Downloads
References
Hasibuan, M. S. (2018). Keylogger pada Aspek Keamanan Komputer. Jurnal Teknovasi: Jurnal Teknik dan Inovasi Mesin Otomotif, Komputer, Industri dan Elektronika, 3(1), 8-15.
Hidayat, W., Syahputra, M. A., Amrullah, M. F., Susanto, L., & Putri, A. S. (2023). Analisis Upaya Meningkatkan Keamanan Komputer Terhadap Ancaman di Lingkup Mahasiswa. Indonesian Technology and Education Journal, 1(1), 29-36
Sutarti, S., Pancaro, A. P., & Saputra, F. I. (2018). IMPLEMENTASI IDS (INTRUSION DETECTION SYSTEM) PADA SISTEM KEAMANAN JARINGAN SMAN 1 CIKEUSAL. PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer, 5(1).
Sinaga, A. S. R. (2020). Keamanan Komputer. CV INSAN CENDEKIA MANDIRI.
https://kumparan.com/how-to-tekno/keylogger-cara-kerja-sejarah-dan-cara-menghindarinya-1vrVWHW7bNb
https://www.dewaweb.com/blog/pengertian-keylogger/ John D. Horwart, Analisis Insiden Keamanan Di Internet 1989-1995, tesis PhD,
Teknik dan Kebijakan Publik, Universitas Carnegie Mellon.
W. Stallings, 1995, “Jaringan dan Keamanan Internet,” Prentice Hall
Wicak, hidayat, 2007, Mengamankan Komputer Dari Spyware. (Jakarta: Media Kita).
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Samsoni, Ditonius Zebua , Basir , Bayu Aji Pamungkas , Hafidsyah Eka Prayogi, Rifaldie Muhammad , Supri Wahyudi , Wira Samudra
This work is licensed under a Creative Commons Attribution 4.0 International License.