Studi Literature : Etika Teknologi Informasi Dalam Menghadapi Ancaman Malicious Insider

  • Dyah Ikhtiarti PDAM Tirta Betuah

Abstract

The development of information technology in Indonesia is experiencing rapid progress. One of them is that currently many companies and organizations operating in Indonesia use information technology and information systems in their business processes. One of the potential risks of attacks from within the company is known as insider threats. Therefore, service providers offer strong security policies and monitoring systems detect suspicious activities. The security models used are kill chain, network development life cycle (NDLC), convolutional neural network (CNN) and recurrent unit (GRU) as well as industrial control systems (ICS). The research results show that successful infrastructure security requires human resources, technical and policy aspects, how to implement advanced security technology that can prevent malicious insider crimes early on. Take proactive action to mitigate threats and protect systems from attacks and minimize potential losses.

Keywords: Malicious Insiders, Insider Threats, Technology Information

 

Published
2025-10-25
How to Cite
Dyah Ikhtiarti (2025) “Studi Literature : Etika Teknologi Informasi Dalam Menghadapi Ancaman Malicious Insider ”, Jurnal Ilmu Komputer dan Sistem Informasi (JIKSI), 1(2), pp. 92-101. doi: 10.61346/jiksi.v1i3.98.