Analisis dan Peningkatan Keamanan Objek Vital, Pengamanan File dan Pengamanan Cyber di PT. Prudential Life Assurance

Authors

  • Edy Soesanto Universitas Bhayangkara Jakarta Raya
  • Alfonso Lande Universitas Bhayangkara Jakarta Raya
  • Heru Tian Sanjaya Universitas Bhayangkara Jakarta Raya
  • Muhammad Rafli Hermawan Universitas Bhayangkara Jakarta Raya

DOI:

https://doi.org/10.59581/jmki-widyakarya.v1i3.459

Keywords:

Security Management, Cyber, IT

Abstract

In the digital era that continues to grow, PT Prudential Life Assurance as an insurance company must face increasingly complex security challenges. As one of the leading companies in the insurance industry, PT Prudential Life Assurance manages vital objects, such as customer data, financial information, and network systems that are crucial to maintain smooth operations. In this context, security of vital objects, file security, and cyber security are key factors that must be taken seriously. This research was conducted online using sources that can be accessed via the internet, such as articles and related sources available on Google. Therefore, there is no specific physical location that is the focus of this research. Based on the research conducted, it was found that PT Prudential Life Assurance has a comprehensive approach in maintaining the security of their vital objects. File Security In terms of file security, PT Prudential Life Assurance uses a sophisticated and encrypted file management system to protect important data and documents. Cyber Security In an effort to maintain cyber security, PT Prudential Life Assurance has taken important steps. It can be concluded that, PT Prudential Life Assurance has implemented comprehensive security measures to protect the company's vital objects. Its security has proven effective through the use of an encrypted file management system and strict access policies. The company has also implemented important steps in cyber security, including strict IT security policies, threat monitoring, and preventive measures against malware and DDoS attacks.

 

 

References

Anderson, R. (2008). Rekayasa Keamanan: Panduan Membangun Sistem Terdistribusi yang Andal. Penerbit Andi.

Schneier, B. (2012). Kriptografi Terapan: Protokol, Algoritma, dan Kode Sumber dalam C. Penerbit Universitas Indonesia.

Nugroho, Y. A., & Suseno, H. (2016). Keamanan Komputer. Penerbit Gava Media.

Rachmawati, N. P., & Shalahuddin, M. (2016). Keamanan Informasi: Konsep dan Implementasi. Penerbit Andi.

Sutedja, A. (2007). Keamanan Jaringan Komputer. Penerbit Informatika.

Sudarsono, A. (2013). Pengamanan Sistem dan Aplikasi. Penerbit Gava Media.

Dhillon, G., & Torkzadeh, G. (2013). Prinsip Keamanan Sistem Informasi: Teori dan Kasus. Penerbit Andi.

Setiawan, A. (2014). Dasar-Dasar Keamanan Sistem Informasi. Penerbit Salemba Infotek.

Nugroho, Y. A., & Suseno, H. (2016). Keamanan Jaringan Komputer. Penerbit Gava Media.

Ross, R. S., & Stoneburner, G. (2008). Integrasi Topik Manajemen Risiko Keamanan Informasi ke dalam Kurikulum Perguruan Tinggi. Jurnal Ilmiah Informatika, 3(1), 21-31.

Kizza, J. M. (2015). Panduan Keamanan Jaringan Komputer. Penerbit Andi.

Nugroho, Y. A., & Suseno, H. (2016). Manajemen Keamanan Informasi. Penerbit Gava Media.

Smith, J. D. (2010). Perlindungan Sistem Komputer Vital: Strategi Desain dan Implementasi. Penerbit Elex Media Komputindo.

Brown, I. M., & Longstaff, T. A. (2005). Model Permainan Stokastik dalam Investasi Keamanan. Jurnal Keamanan Informasi dan Jaminan, 1(3), 207-218.

Brzozowski, J., & Fitzpatrick, M. (2003). Sistem File: Fitur yang Diinginkan dan Implikasi untuk Keamanan. Dalam Prosiding Workshop ACM 2003 tentang Keamanan Penyimpanan dan Keberlanjutan (hal. 1-10).

Ruighaver, A. B., & Maynard, S. B. (2003). Transfer File Komputer dan Jaringan yang Aman. Jurnal Keamanan Komputer, 22(5), 440-449.

Gupta, M., & Sharma, S. K. (2011). Keamanan Siber: Isu, Tantangan, dan Tren Penelitian. Jurnal International Journal of Computer Applications, 34(1), 47-53.

Park, J. H., & Sandhu, R. S. (2001). Survei Masalah Keamanan dalam Jaringan Sensor Nirkabel. IEEE Communications Surveys & Tutorials, 2(2), 2-23.

Downloads

Published

2023-06-05

How to Cite

Edy Soesanto, Alfonso Lande, Heru Tian Sanjaya, & Muhammad Rafli Hermawan. (2023). Analisis dan Peningkatan Keamanan Objek Vital, Pengamanan File dan Pengamanan Cyber di PT. Prudential Life Assurance. Jurnal Manajemen Kreatif Dan Inovasi, 1(3), 35–47. https://doi.org/10.59581/jmki-widyakarya.v1i3.459

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.