2 research outputs found

    SISTEM KEAMANAN WIRELESS SENSOR NETWORK MENGGUNAKAN SIGNATURE BASED INTRUSION DETECTION SYSTEM DAN SISTEM SHUTDOWN UNTUK MEMITIGASI SERANGAN DOS

    Get PDF
    Wireless Sensor Network (WSN) memiliki peran yang besar di beberapa bidang seperti penerapan pada area peperangan, penerapan pada rumah pintar, penelitian tentang lingkungan serta penerapan di bidang kesehatan. Namun WSN memberikan ancaman dikarenakan tidak adanya sistem keamanan bawaan yang tertanam pada perangkat sensor serta dengan adanya keterbatasan yang dimiliki oleh sensor node. Akibatnya WSN rentan terhadap serangan, salah satunya adalah serangan DoS. Sehingga diperlukan cara mendeteksi dan memitigasi serangan DoS pada WSN. Pada penelitian ini membahas metode deteksi dan mitigasi serangan DoS menggunakan signature based Intrusion Detection System (IDS) dengan mengimplementasikan sistem shutdown pada sink node. Sistem shutdown berhasil diimplementasikan pada jaringan WSN ketika IDS mendeteksi adanya serangan DoS. Sehingga metode sistem shutdown dapat digunakan sebagai langkah awal mitigasi serangan DoS dengan mengamankan data pada sink node

    Technical Strategies Database Managers use to Protect Systems from Security Breaches

    Get PDF
    Healthcare organizations generate massive amounts of data through their databases that may be vulnerable to data breaches due to extensive user privileges, unpatched databases, standardized query language injections, weak passwords/usernames, and system weaknesses. The purpose of this qualitative multiple case study was to explore technical strategies database managers in Southeast/North Texas used to protect database systems from data breaches. The target population consisted of database managers from 2 healthcare organizations in this region. The integrated system theory of information security management was the conceptual framework. The data collection process included semistructured interviews with 9 database managers, including a review of 14 organizational documents. Data were put into NVivo 12 software for thematic coding. Coding from interviews and member checking was triangulated with corporate documents to produce 5 significant themes and 1 subtheme: focus on verifying the identity of users, develop and enforce security policies, implement efficient encryption, monitor threats posed by insiders, focus on safeguards against external threats, and a subtheme derived from vulnerabilities caused by weak passwords. The findings from the study showed that the implementation of security strategies improved organizations\u27 abilities to protect data from security incidents. Thus, the results may be applied to create social change, decreasing the theft of confidential data, and providing knowledge as a resource to accelerate the adoption of technical approaches to protect database systems rom security incidents
    corecore