Akademska digitalna zbirka SLovenije - logo
E-viri
Recenzirano Odprti dostop
  • Cyber Security System With ...
    Suroso, Jarot S.; Prastya, Caesario Putra

    IOP conference series. Materials Science and Engineering, 06/2020, Letnik: 874, Številka: 1
    Journal Article

    Communication science and information technology (ICT) has been progressing and contain complex implication for individual, groups and inter-country relationship. Along with ICT evolution, threats (including theft of information) increase and electronic systems are adopted. As a government agency in higher education with the country's strategic data, XYZ cannot escape hackers trying to access the assets. Strategic assets include system and company's data as well as systems and data which might be taken for granted by irresponsible parties. Therefore, it is necessary to secure information and data systems in XYZ. Moreover to test whether the implemented cyber security system can optimally standardize the company's information and data systems. The application of Security Information Event Management (SIEM) to cyber security systems to detect incoming threat alerts and block access to suspicious threats. While the honeypot is used to deceive the hacker into a fake system intentionally attacked and learning the tricks that intruders use when performing the action. The results of the test of the application of SIEM and Honeypot at XYZ can monitor the monitoring of information system and data-related threats in real-time, and deter and transmit cyber-attacks to adequately protect information security so that the use of cyber security systems with SIEM & Honeypot can secure the information and data systems owned by XYZ optimal.