Security Challenges in Computer Networks and Modern Operating Systems
DOI:
https://doi.org/10.38035/dijemss.v6i5.4516Keywords:
Network Security, Operating Systems, Descriptive Qualitative Methods, Cyberattacks, Security PoliciesAbstract
This study aims to identify and analyze the various security challenges faced in modern computer networks and operating systems. The research method used is descriptive qualitative, with data obtained from various sources, including journal articles related to computer networks and operating systems. Journal articles on network management, protocols, security, and performance, as well as research reports and case studies that address security challenges in modern computer networks and operating systems. The results show that the main challenge in maintaining the security of networks and operating systems is increasingly sophisticated and complex cyber attacks, which often go beyond the capabilities of existing security technologies. In addition, the low level of security awareness among users is a significant factor that aggravates the situation, as many users do not follow basic security practices. The study also found that effective implementation of security policies is still an unresolved issue in many organizations. Many existing policies are not implemented consistently or are not updated according to the development of new threats. By identifying these challenges, the study makes an important contribution to the development of better strategies and policies to improve the security of networks and operating systems in the future.
References
Admin. (2023). Pengertian, Fungsi, Dan Jenis Sistem Operasi. Pengertian, Fungsi, Dan Jenis
Sistem Operasi.
Aksenta, A., Irmawati, Hayati, N., Sepriano, Herlinah, Silalahi, A. T., Pipin, S. J., Abdurrohim,
I., Boari, Y., Mardiana, S., Sutoyo, M. N., Sumardi, Gani, I. P., & Ginting, T. W. (2023).
LITERASI DIGITAL: Pengetahuan & Transformasi Terkini Teknologi Digital Era Industri 4.0
dan Sociaty 5.0. In Perspektif (Vol. 1, Issue 2).
Anastasya Zalsabilla Hermawan, M. Novianto Anggoro, Ditha Lozera, & Asif Faroqi. (2023). STUDI LITERATUR: ANCAMAN SERANGAN SIBER ARTIFICIAL INTELLIGENCE
(AI) TERHADAP KEAMANAN DATA DI INDONESIA. Prosiding Seminar Nasional Teknologi Dan Sistem Informasi, 3(1), 581–591. https://doi.org/10.33005/sitasi.v3i1.363
Arfan Dwi Madya, Bagas Djoko Haryanto, & Devi Putri Ningsih. (2023). Keefektifan Metode
Proteksi Data dalam Mengatasi Ancaman Cybersecurity. Indonesian Journal of Education And Computer Science, 1(3), 127–135. https://doi.org/10.60076/indotech.v1i3.236
Aulia, B. W., Rizki, M., Prindiyana, P., & Surgana, S. (2023). Peran Krusial Jaringan Komputer
dan Basis Data dalam Era Digital. JUSTINFO | Jurnal Sistem Informasi Dan Teknologi Informasi, 1(1), 9–20. https://doi.org/10.33197/justinfo.vol1.iss1.2023.1253
Babys, J. Y., Kusrini, & Sudarmawan. (2013). Analisis Aspek Keamanan Informasi Jaringan
Komputer ( Studi Kasus?: STIMIK Kupang ). Seminar Nasional INformatika 2013.
Elan Maulani, I., & Faisal umam, A. (2023). Evaluasi Efektivitas Sistem Deteksi Intrusi Dalam
Menjamin Keamanan Jaringan. Jurnal Sosial Teknologi, 3(8), 662–667. https://doi.org/10.59188/jurnalsostech.v3i8.907
Faizal, M. A., Faizatul, Z., Asiyah, B. N., & Subagyo, R. (2023). ANALISIS RISIKO
TEKNOLOGI INFORMASI PADA BANK SYARIAH?: IDENTIFIKASI ANCAMAN DAN TANTANGAN TERKINI. Jurnal Asy-Syarikah: Jurnal Lembaga Keuangan, Ekonomi Dan Bisnis Islam, 5(2), 87–100. https://doi.org/10.47435/asy-syarikah.v5i2.2022
Fitria, E. Y., & Mutijarsa, K. (2023). Survei Penelitian Metode Kecerdasan Buatan untuk
Mendeteksi Ancaman Teknologi Serangan Siber. Jurnal Teknologi Informasi Dan Ilmu Komputer, 10(6), 1185–1196. https://doi.org/10.25126/jtiik.1067341
Glen Maxie Taberima, & Ramayanti, D. (2024). MENGOPTIMALKAN MANAJEMEN DAN
KEAMANAN TI MELALUI IMPLEMENTASI LAYANAN DOMAIN ACTIVE DIRECTORY STUDI KASUS PADA INFRASTRUKTUR TI PERUSAHAAN. Jurnal Informatika Teknologi Dan Sains (Jinteks), 6(1), 79–89. https://doi.org/10.51401/jinteks.v6i1.3884
Hafid, M., Firjatullah, F. Z., Pamungkaz, B. W., Magister, S., Hukum, I., Wijaya, U., &
Surabaya, K. (2023). Tantangan Menghadapi Kejahatan Cyber dalam Kehidupan Bermasyarakat dan Bernegara Muhammad. Pendidikan Tambusai, 7(2), 9548–9556.
Laksana, T. G., & Mulyani, S. (2024). PENGETAHUAN DASAR IDENTIFIKASI DINI
DETEKSI SERANGAN KEJAHATAN SIBER UNTUK MENCEGAH PEMBOBOLAN DATA PERUSAHAAN. Jurnal Ilmiah Multidisiplin, 3(01), 109–122. https://doi.org/10.56127/jukim.v3i01.1143
Oktaviani, S., Rizky, F., & Gunawan, I. (2023). Analisis Keamanan Data Dengan
Menggunakan Kriptografi Modern Algoritma Advance Encryption Standar (AES). Jurnal Media Informatika, 4(2), 97–101. https://doi.org/10.55338/jumin.v4i2.435
Prasetia, O., Machfud, S., & ... (2023). Sosialiasi Pengenalan Pentingnya Cyber Security Guna
Menjaga Keamanan Data di Era Digital Pada Siswa/i SMK Bakti Idhata Jakarta. JIPM: Jurnal Inovasi …, 2(1), 16–20. https://jurnal.astinamandiri.com/index.php/JIPM/article/view/141%0Ahttps://jurnal.astinamandiri.com/index.php/JIPM/article/download/141/101
Ramadhani, A. (2018). KEAMANAN INFORMASI. Nusantara - Journal of Information and
Library Studies, 1(1), 39. https://doi.org/10.30999/n-jils.v1i1.249
Rohan, D. H., & Hayati, N. (2019). Persamaan Lorenz untuk Keamanan Nomor Serial Sistem
Operasi Window7. Jurnal Ilmiah FIFO, 10(2), 1. https://doi.org/10.22441/fifo.2018.v10i2.001
Santoso, K. P., Madany, F. A., & Suryotrisongko, H. (2023). Dan Augmentasi Data NSL-
KDD Menggunakan Deep Generative Adversarial Networks Untuk Meningkatkan Performa Algoritma Extreme Gradient Boosting Dalam …. ArXiv Preprint ArXiv ….
Sari, M. W. (2013). Analisis keamanan jaringan Virtual Private Network (VPN) pada Sistem
Online Microbanking. Informatika, 13.
Surahman, F. (2023). Tantangan Dalam Menjaga Keamanan Data Official Statistics dari
Serangan Cybercrime. Jurnal Ilmiah Multidisiplin, 1(11), 904–907. https://doi.org/10.5281/zenodo.10371686
Sutriawan, S., Khatimah, N. H., & Sanusi, G. (2023). Sosialisasi Pentingnya Menjaga Privasi
Dan Keamanan Data Di Era Digital. SEWAGATI: Jurnal Pengabdian Kepada Masyarakat, 2(1), 8–14. https://doi.org/10.61461/sjpm.v2i1.10
Syahputri, N. I., Harahap, H., Siregar, R., & Tommy, T. (2023). Penyuluhan Pentingnya Two
Factor Authentication dan Aplikasinya Di Era Keamanan Digital. Jurnal Pengabdian Masyarakat Bangsa, 1(6), 768–773. https://doi.org/10.59837/jpmba.v1i6.256
Syamsu, M., Terisia, V., & Masduki, U. (2023). Buku Ajar Jaringan Komputer?: Praktis &
Mudah disertai Studi Kasus. Eureka Media Aksara.
Tan, T., Sama, H., Wijaya, G., & Aboagye, O. E. (2023). Studi Perbandingan Deteksi Intrusi
Jaringan Menggunakan Machine Learning: (Metode SVM dan ANN). Jurnal Teknologi Dan Informasi, 13(2), 152–164. https://doi.org/10.34010/jati.v13i2.10484
Vansuri, R., Fauzi, A., Teguh Prasetyo, E., Negara, R., Ramadhan, R., Mada Restu, A., & Raffi
Firmansyah, R. (2023). Peran CIA (Confidentiality, Integrity, Availability) Terhadap Manajemen Keamanan Informasi. Jurnal Ilmu Multidisplin, 2(1), 106–113. https://doi.org/10.38035/jim.v2i1.234
Wicaksono, D. (2022). Firewall Sistem Keamanan Jaringan Menggunakan Firewall dengan
Metode Port Blocking dan Firewall Filtering. JATISI (Jurnal Teknik Informatika Dan
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Gugum Gumelar, Weni Gurita Aedi

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish their manuscripts in this journal agree to the following conditions:
- The copyright on each article belongs to the author(s).
- The author acknowledges that the Dinasti International Journal of Education Management and Social Science (DIJEMSS) has the right to be the first to publish with a Creative Commons Attribution 4.0 International license (Attribution 4.0 International (CC BY 4.0).
- Authors can submit articles separately, arrange for the non-exclusive distribution of manuscripts that have been published in this journal into other versions (e.g., sent to the author's institutional repository, publication into books, etc.), by acknowledging that the manuscript has been published for the first time in the Dinasti International Journal of Education Management and Social Science (DIJEMSS).