PERAN ETHICAL HACKING DALAM MEMERANGI CYBERTHREATS
Keywords:hacker, ethical hacking, cyberthreats, black hat hackers, white hat hackers
The efforts to digitize and optimize various things in the modern world will certainly highlight issues related to cybersecurity such as data breaches, security breaches, and so on. Ethical hacking and its need in the future cannot be avoided. Ethical hacking technology is spreading in almost every aspect of life, especially the computer industry, which requires protection of important data and must be handled with the right technology. Ethical hacking aims to find vulnerabilities in security systems and discover potential data breaches. This contrasts with the common understanding of hacking, which is black hat hackers who damage systems with malicious intent and steal data and infect viruses. Ethical hacking is a way to combat and neutralize black hat hackers. Teaching ethical hacking is preparing professionals in the information security field with the tools and skills to combat and prevent cybersecurity threats. Teaching inexperienced people in information security with aggressive methods can be viewed as both beneficial and harmful. This is because the same methods are used by malicious hackers hence educating professionals in information security may be perceived as enhancing malicious hackers. Using the literature study method, this article discusses various issues related to ethical hacking.
A. M. AL Hawamleh, A. S. M. Alorfi, J. A. Al-Gasawneh, dan G. Al-Rawashdeh, “Cyber Security and Ethical Hacking: The Importance of Protecting User Data,” Solid State Technol., vol. 63, no. 5, hal. 7894–7899, 2020, [Daring]. Tersedia pada: http://solidstatetechnology.us/index.php/JSST/article/view/7202.
“National Cyber Security Index,” 2020. https://ncsi.ega.ee/ncsi-index/.
K. R. Ramadhan dan C. Wijaya, “The Challenges of Personal Data Protection Policy in Indonesia: Lesson learned from the European Union, Singapore, and Malaysia,” Tech. Soc. Sci. J., vol. 36, hal. 18–28, 2022.
L. A. Smith, M. M. Chowdhury, dan S. Latif, “Ethical hacking: Skills to fight cybersecurity threats,” Epic Ser. Comput., vol. 82, hal. 102–111, 2022, doi: 10.29007/vwww.
B. O. Omoyiola, “The Legality of Ethical Hacking,” IOSR J. Comput. Eng., vol. 20, no. 1, hal. 61–63, 2018, doi: 10.9790/0661-2001016163.
G. Thomas, O. Burmeister, dan G. Low, “Issues of implied trust in ethical hacking,” ORBIT J., vol. 2, no. 1, hal. 1–19, 2018, doi: 10.29297/orbit.v2i1.77.
T. Sutikno dan D. Stiawan, “Cyberattacks and data breaches in Indonesia by Bjorka: hacker or data collector?,” Bull. Electr. Eng. Informatics, vol. 11, no. 6, hal. 2989–2994, 2022, doi: 10.11591/eei.v11i6.4854.
J.-P. A. Yaacoub, H. N. Noura, O. Salman, dan A. Chehab, “A Survey on Ethical Hacking: Issues and Challenges,” hal. 1–46, 2021, [Daring]. Tersedia pada: http://arxiv.org/abs/2103.15072.
G. Vishnuram, K. Tripathi, dan A. K. Tyagi, “Ethical Hacking: Importance, Controversies and Scope in the Future,” Int. Conf. Comput. Commun. Informatics, 2022, doi: 10.1109/ICCCI54379.2022.9740860.
P. K. Sahu dan B. Acharya, “A Review Paper on Ethical Hacking,” Int. J. Adv. Res. Eng. Technol., vol. 11, no. 12, hal. 163–168, 2020, doi: 10.34218/IJARET.11.12.2020.018.
R. Hartley, D. Medlin, dan Z. Houlik, “Ethical Hacking: Educating Future Cybersecurity Professionals,” Proc. EDSIG Conf., hal. 1–10, 2017, [Daring]. Tersedia pada: http://proc.iscap.info/2017/pdf/4341.pdf%0Ahttp://iscap.info.
R. E. Pike dan S. S. Curl, “The ‘ethics’ of teaching ethical hacking,” 2013 Proc. ISECON Inf. Syst. Educ. Conf. CONISAR 2013, Conf. Inf. Syst. Appl. Res., vol. 22, no. 4, 2013.
A. R. Kelrey dan A. Muzaki, “Pengaruh Ethical Hacking Bagi Keamanan Data Perusahaan,” Cyber Secur. dan Forensik Digit., vol. 2, no. 2, hal. 77–81, 2019, doi: 10.14421/csecurity.2019.2.2.1625.
B. A. Pashel, “Teaching Students to Hack : Ethical Implications in Teaching Students to Hack at the University Level,” InfoSecCD Conf., hal. 197–200, 2006.
How to Cite
Copyright (c) 2023 JURNAL ILMIAH INFORMATIKA
This work is licensed under a Creative Commons Attribution 4.0 International License.