AI Shield: Protecting Business Data from Cybercrime

Authors

  • Anggi Ariska Putri Universitas Islam Negeri Raden Mas Said Surakarta
  • Muhammad Asrul Aswar Universitas Islam Negeri Raden Mas Said Surakarta

DOI:

https://doi.org/10.55927/snimekb.v2i2.6998

Keywords:

Cyber Crime, AI, Security Systems, Data, Company

Abstract

This research discusses the application of Artificial Intelligence (AI) in strengthening company data security in collaboration with Firewall systems, Intrusion Detection Systems (IDS), and Cryptography. With the involvement of AI which has algorithmic capabilities and predictive analysis, this qualitative descriptive research provides proactive solutions to security threats, increases detection efficiency and strengthens data security systems. These three systems make it easy to limit illegal network access, detect and encrypt data through coding. These findings have important implications in facing the ever-growing challenges of cyber crime on information security, and provide a strong foundation for a particular company or organization to maintain the integrity and confidentiality of its data.

Downloads

Download data is not yet available.

References

Al-Shaer, E. (2014). Automated Firewall Analytics (Design, Configuration, and Optimization).

Antoni. (2017). Kejahatan Dunia Maya (Cyber Crime) Dalam Simak Online. Nurani, 17(2).

Ariyus, D. (2008). Pengantar Ilmu Kriptografi (Teori, Analisis, dan Implementasi) (S. Suyantoro, Ed.; 1st ed.). CV. Andi Offset.

Aryani, A. P., & Susanti, L. E. (2022). Pentingnya Perlindungan Data Pribadi Konsumen dalam Transaksi Online pada Marketplace terhadap Kepuasan Konsumen. Ahmad Dahlan Legal Perspective, 2(1).

Axelsson, S. (1999). Research in Intrusion-Detection Systems:ASurvey. Technical Report (Department of Computer Engineering), 120.

Azlin, Musadat, F., & Nur, J. (2018). Aplikasi Kriptografi Keamanan Data Menggunakan Algoritma Base64. Jurnal Informatika, 7(2).

Danuri, M. (2019). Perkembangan dan Transformasi Teknologi Digital. Jurnal Ilmiah Informasi Komputer Akuntansi Dan Manajemen, 15(2).

Danuri, M., & Suharnawi. (2017). Tren Perkembangan Teknologi. Jurnal Ilmiah Informasi Komputer Akuntansi Dan Manajemen, 13(1).

Disemadi, H. S. (2021). Urgensi Regulasi Khusus dan Pemanfaatan Artificial Intelligence dalam Mewujudkan Perlindungan Data Pribadi di Indonesia. Jurnal Wawasan Yuridika, 5(2).

Farid, I., Reksoprodjo, A. H., & Suhirwan. (2023). Pemanfaatan Artificial Intelligence Dalam Pertahanan Siber. Jurnal Ilmu Pengetahuan Sosial, 10(2).

Garfinkel, S., & Lipford, H. R. (2014). Usable Security (History, Themes, and Challenges). Morgan & Claypool Publishers.

Hidayatullah, S. (2014). Analisis dan Optimalisasi Keamanan Jaringan Menggunakan Protokol IPSEC. Jurnal Informatika, 1(2).

Kim, A., Park, M., & Lee, D. H. (2020). AI-IDS: Application of Deep Learning to Real-Time Web Intrusion Detection. IEEE Access, 8, 70245–70261.

Kumar, G., Kumar, K., & Sachdeva, M. (2010). The Use Of Artificial Intelligence Based Techniques for Intrusion Detection: A Review. Springer Link, 34(4).

Kurniawan, R. (2020). Kecerdasan Buatan (Artificial Intelligence). UIN Sumatera Utara Medan.

Kusumadewi, S. (2003). Artificial Intelligence (Teknik dan Aplikasinya) (1st ed.). Penerbit Graha Ilmu.

Lahmadi, A., & Festor, O. (2009). SecSip: A stateful Firewall For SIP-based Networks. IFIP/IEEE International Symposium on Integrated Network Management.

McCharthy, J. (1995). What has AI in Common with Philosophy?. IJCAI (International Joint Conference on Artificial Intelligence).

Mukhtar, H. (2018). Kriptografi Untuk Keamanan Data (1st ed.). Deepublish.

Priowirjanto, E. S. (2022). Urgensi Pengaturan Mengenai Artificial Intelligence Pada Sektor Bisnis Daring Dalam Masa Pandemi Covid-19 di Indonesia. Jurnal Bina Mulia Hukum, 6(2).

Purwaningrum, F. A., Darmadi, E. A., & Purwanto, A. (2018). Optimalisasi Jaringan Menggunakan Firewall. Jurnal Komputer & Informatika, 2(3).

Putri, N. I., Komalasari, R., & Munawar, Z. (2020). Pentingnya Keamanan Data Dalam Intelijen Bisnis. Jurnal Sistem Informatika, 1(2).

Raghunath, B. R., & Mahadeo, S. N. (2008). Network intrusion detection system (NIDS). Proceedings - 1st International Conference on Emerging Trends in Engineering and Technology, ICETET 2008, 1272–1277.

Rich, E., & Knight, K. (1991). Artificial Intelligence (2nd ed.). McGraw-Hill.

Russell, S., & Norvig, P. (2016). Artificial Intelligence A Modern Approach .

Sallu, S., & Qammaddin. (2020). Keamanan Data Pembelajaran Online Jaringan Komputer di Perguruan Tinggi. Jurnal Instruksional, 2(1).

Sugiyono. (2016). Metode Penelitian Kuantitatif, Kualitatif dan R&D (24th ed.). Alfabeta.

Vydia, V., Surono, & Setiarso, G. (2020). Application Gateway dan Stateful Inspection Method Pada Implementasi Firewall Untuk Optimasi Keamanan Jaringan Komputer. Jurnal Pengembangan Rekayasa Dan Teknologi, 16(2).

Yuwinanto, H. P. (2011). Privasi Online dan Keamanan Data. Jurnal Palimpsest, 2(2).

Zed, M. (2008). Metode Penelitian Kepustakaan (2nd ed.). Yayasan Pustaka Obor Indonesia.

Downloads

Published

2023-11-30

How to Cite

Anggi Ariska Putri, & Aswar, M. A. . (2023). AI Shield: Protecting Business Data from Cybercrime. Prosiding Seminar Nasional Ilmu Manajemen, Ekonomi, Keuangan Dan Bisnis, 2(2). https://doi.org/10.55927/snimekb.v2i2.6998