3 research outputs found

    Pengamanan E-Dokumen Berbasis Steganografi Dengan Kombinasi Advanced Encryption Standard (AES) 128 Bit

    Get PDF
    Keamanan data informasi menjadi permasalahan yang cukup serius, informasi yang dianggap rahasia memerlukan keamanan yang tinggi sehingga apabila terdapat pihak ketiga yang dapat mengakses data penyimpanan tanpa seizin pemilik. Kasus yang terjadi terhadap data pribadi sebanyak 1207 di tahun 2016 dengan crime clearance 669 sehingga memiliki persentasi 57% kasus yang terjadi. Tujuan penelitian membuat sistem keamanan data dengan mengimplementasikan steganografi kombinasi enkripsi Advanced Encryption Standard (AES) 128 bit. Pada penelitian ini menggunakan tahapan metode pengembangan sistem Rapid Application Development (RAD). Dari hasil penelitian ini telah dilakukan pengujian dengan berbagai pengujian untuk mengenkripsikan file dokumen yang dienkripsi dan disembunyikan pada sebuah image sehingga keamanan data informasi dapat terjaga keamanannya dengan bai

    Mobile Network Infrastructure Security in Developing Countries – A Kenya Case Study

    Get PDF
    The usage of mobile network infrastructure to access internet resources for organizations is getting higher year by year in sub-Saharan Africa. However, there was an increase in malicious attacks on mobile networks and devices accessing mobile network infrastructure, targeting organizations’ private information. Grounded in Bandura’s social cognitive theory, the purpose of this multiple case study was to explore strategies security managers used to secure mobile network infrastructures from cyberattacks. Participants comprised four security managers in Kenya in two major cities who successfully implemented strategies to mitigate cyberattacks on the mobile network infrastructures. Data were gathered from video conference, face-to-face, semi-structured interviews, and review of organizations’ documents comprised of policies and procedures, internal reports, and training procedures. Thematic analysis was used to unveil four themes: security awareness and training, infrastructure management, defense-in-depth, and security governance framework. A key recommendation would be for security managers to craft employee security training and awareness to protect the organizations’ data assets. The implications for positive social change include the potential for security managers to mitigate data breaches and protect sensitive customer data from being exposed
    corecore