Keamanan Komputer Dalam Novel Spammer Karya Ronny Mailindra
DOI:
https://doi.org/10.55606/jupti.v3i1.2507Keywords:
Computer Security, Literature, HermeneuticsAbstract
The threats related to computer viruses have become a highly significant issue in the era of technology. Data and computer system security are the primary concerns in various sectors, including businesses, government, and individuals. This research aims to examine how computer viruses are spread and how computer security works within the novel Spammer by Ronny Mailindra. The method used is hermeneutics. Based on the analysis and discussion, the findings reveal 1) Spyware for mobile phones, 2) Trojans, 3) Viruses, 4) Digital footprints, 5) Remote SSH. In the novel Spammer it is depicted that computer viruses are commonly disseminated through email spam, and one of the network security protocols that proves challenging to breach is the Secure Shell Protocol (SSH).
References
Desmira, D., & Wiryadinata, R. (2022). Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knocking. Jurnal Ilmu Komputer dan Sistem Informasi, 28-33. https://doi.org/10.55338/jikomsi.v5i1.242
Hartono, B. (2023). Ransomware: Memahami Ancaman Keamanan Digital. Bincang Sains dan Teknologi, 55-62. https://doi.org/10.56741/bst.v2i02.353
Kurniawan, D. (2020). Membasmi Virus Komputer dan Android. Jakarta: PT Elex Media Komputindo.
Mahendra, G. S., Wali, M., Idwan, H., Listartha, I. M., Yuliastuti, G. E., Sasongko, D., Saskara G. A. J., Alfina. (2022). Keamanan Komputer. Jakarta Selatan: PT Galiono Digdaya Kawthar.
Mailindra, R. (2016). Spammer. Yogyakarta: PT Bentang Pustaka.
Palinggi, S., & Allolinggi, L. R. (2020). Analisa Deskriptif Industri Fintech di Indonesia: Regulasi dan Keamanan Jaringan dalam Perspektif Teknologi Digital. Jurnal Ekonomi dan Bisnis, 177-192.
Permana, A. A., Hayati, N., Abdurrasyid, Wijayanti, R. R., Botutihe, M. H., Irmawati, Adhicandra, I., Putra, Y., Rukmana, A. Y., Pomalingo, S., Khadafi, S., Irawan, A. S. Y., Jarwo. (2023). KEAMANAN INFORMASI. Get Press Indonesia.
Riadi, I., Yudhana, A., & W., Y. (2019). Analisis Keamanan Website Open Journal System Menggunakan Metode Vulnerability Assessment. Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK), 853-860.
Sabry, F. (2023). Email Spam: Fundamentals and Applications. One Billion Knowledgeable.
Setiawan, I., Rusydi, I., Rahmawati, A., & Hasanah, S. (2022). JEJAK DIGITAL SEBAGAI ALAT BUKTI PETUNJUK MENURUT PASAL 184 KITAB UNDANG UNDANG HUKUM ACARA PIDANA. Jurnal Ilmiah Galuh Justisi, 119-132. http://dx.doi.org/10.25157/justisi.v10i1.7236
Siddiq, A., Yudiastuti, H., & Panjaitan, F. (2020). Analisis Perilaku Malware Dengan Metode Surface Analysis Dan Runtime Analysis. Journal of Software Engineering Ampera, 160-174. https://doi.org/10.51519/journalsea.v1i3.53