Keamanan Komputer Dalam Novel Spammer Karya Ronny Mailindra

  • I Gede Widiantara Universitas Teknologi Yogyakarta
  • Eva Dwi Kurniawan Universitas Teknologi Yogyakarta
Keywords: Computer Security, Literature, Hermeneutics

Abstract

The threats related to computer viruses have become a highly significant issue in the era of technology. Data and computer system security are the primary concerns in various sectors, including businesses, government, and individuals. This research aims to examine how computer viruses are spread and how computer security works within the novel Spammer by Ronny Mailindra. The method used is hermeneutics. Based on the analysis and discussion, the findings reveal 1) Spyware for mobile phones, 2) Trojans, 3) Viruses, 4) Digital footprints, 5) Remote SSH. In the novel Spammer it is depicted that computer viruses are commonly disseminated through email spam, and one of the network security protocols that proves challenging to breach is the Secure Shell Protocol (SSH).

References

Desmira, D., & Wiryadinata, R. (2022). Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knocking. Jurnal Ilmu Komputer dan Sistem Informasi, 28-33. https://doi.org/10.55338/jikomsi.v5i1.242

Hartono, B. (2023). Ransomware: Memahami Ancaman Keamanan Digital. Bincang Sains dan Teknologi, 55-62. https://doi.org/10.56741/bst.v2i02.353

Kurniawan, D. (2020). Membasmi Virus Komputer dan Android. Jakarta: PT Elex Media Komputindo.

Mahendra, G. S., Wali, M., Idwan, H., Listartha, I. M., Yuliastuti, G. E., Sasongko, D., Saskara G. A. J., Alfina. (2022). Keamanan Komputer. Jakarta Selatan: PT Galiono Digdaya Kawthar.

Mailindra, R. (2016). Spammer. Yogyakarta: PT Bentang Pustaka.

Palinggi, S., & Allolinggi, L. R. (2020). Analisa Deskriptif Industri Fintech di Indonesia: Regulasi dan Keamanan Jaringan dalam Perspektif Teknologi Digital. Jurnal Ekonomi dan Bisnis, 177-192.

Permana, A. A., Hayati, N., Abdurrasyid, Wijayanti, R. R., Botutihe, M. H., Irmawati, Adhicandra, I., Putra, Y., Rukmana, A. Y., Pomalingo, S., Khadafi, S., Irawan, A. S. Y., Jarwo. (2023). KEAMANAN INFORMASI. Get Press Indonesia.

Riadi, I., Yudhana, A., & W., Y. (2019). Analisis Keamanan Website Open Journal System Menggunakan Metode Vulnerability Assessment. Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK), 853-860.

Sabry, F. (2023). Email Spam: Fundamentals and Applications. One Billion Knowledgeable.

Setiawan, I., Rusydi, I., Rahmawati, A., & Hasanah, S. (2022). JEJAK DIGITAL SEBAGAI ALAT BUKTI PETUNJUK MENURUT PASAL 184 KITAB UNDANG UNDANG HUKUM ACARA PIDANA. Jurnal Ilmiah Galuh Justisi, 119-132. http://dx.doi.org/10.25157/justisi.v10i1.7236

Siddiq, A., Yudiastuti, H., & Panjaitan, F. (2020). Analisis Perilaku Malware Dengan Metode Surface Analysis Dan Runtime Analysis. Journal of Software Engineering Ampera, 160-174. https://doi.org/10.51519/journalsea.v1i3.53

Published
2023-12-20
How to Cite
I Gede Widiantara, & Eva Dwi Kurniawan. (2023). Keamanan Komputer Dalam Novel Spammer Karya Ronny Mailindra. Jurnal Publikasi Teknik Informatika, 3(1), 29-37. https://doi.org/10.55606/jupti.v3i1.2507