Security Challenges in Computer Networks and Modern Operating Systems

Authors

  • Gugum Gumelar Information Technology, University of Pamulang, Tangerang City, Indonesia
  • Weni Gurita Aedi Information Technology, University of Pamulang, Tangerang City, Indonesia

DOI:

https://doi.org/10.38035/dijemss.v6i5.4516

Keywords:

Network Security, Operating Systems, Descriptive Qualitative Methods, Cyberattacks, Security Policies

Abstract

This study aims to identify and analyze the various security challenges faced in modern computer networks and operating systems. The research method used is descriptive qualitative, with data obtained from various sources, including journal articles related to computer networks and operating systems. Journal articles on network management, protocols, security, and performance, as well as research reports and case studies that address security challenges in modern computer networks and operating systems. The results show that the main challenge in maintaining the security of networks and operating systems is increasingly sophisticated and complex cyber attacks, which often go beyond the capabilities of existing security technologies. In addition, the low level of security awareness among users is a significant factor that aggravates the situation, as many users do not follow basic security practices. The study also found that effective implementation of security policies is still an unresolved issue in many organizations. Many existing policies are not implemented consistently or are not updated according to the development of new threats. By identifying these challenges, the study makes an important contribution to the development of better strategies and policies to improve the security of networks and operating systems in the future.

 

References

Admin. (2023). Pengertian, Fungsi, Dan Jenis Sistem Operasi. Pengertian, Fungsi, Dan Jenis

Sistem Operasi.

Aksenta, A., Irmawati, Hayati, N., Sepriano, Herlinah, Silalahi, A. T., Pipin, S. J., Abdurrohim,

I., Boari, Y., Mardiana, S., Sutoyo, M. N., Sumardi, Gani, I. P., & Ginting, T. W. (2023).

LITERASI DIGITAL: Pengetahuan & Transformasi Terkini Teknologi Digital Era Industri 4.0

dan Sociaty 5.0. In Perspektif (Vol. 1, Issue 2).

Anastasya Zalsabilla Hermawan, M. Novianto Anggoro, Ditha Lozera, & Asif Faroqi. (2023). STUDI LITERATUR: ANCAMAN SERANGAN SIBER ARTIFICIAL INTELLIGENCE

(AI) TERHADAP KEAMANAN DATA DI INDONESIA. Prosiding Seminar Nasional Teknologi Dan Sistem Informasi, 3(1), 581–591. https://doi.org/10.33005/sitasi.v3i1.363

Arfan Dwi Madya, Bagas Djoko Haryanto, & Devi Putri Ningsih. (2023). Keefektifan Metode

Proteksi Data dalam Mengatasi Ancaman Cybersecurity. Indonesian Journal of Education And Computer Science, 1(3), 127–135. https://doi.org/10.60076/indotech.v1i3.236

Aulia, B. W., Rizki, M., Prindiyana, P., & Surgana, S. (2023). Peran Krusial Jaringan Komputer

dan Basis Data dalam Era Digital. JUSTINFO | Jurnal Sistem Informasi Dan Teknologi Informasi, 1(1), 9–20. https://doi.org/10.33197/justinfo.vol1.iss1.2023.1253

Babys, J. Y., Kusrini, & Sudarmawan. (2013). Analisis Aspek Keamanan Informasi Jaringan

Komputer ( Studi Kasus?: STIMIK Kupang ). Seminar Nasional INformatika 2013.

Elan Maulani, I., & Faisal umam, A. (2023). Evaluasi Efektivitas Sistem Deteksi Intrusi Dalam

Menjamin Keamanan Jaringan. Jurnal Sosial Teknologi, 3(8), 662–667. https://doi.org/10.59188/jurnalsostech.v3i8.907

Faizal, M. A., Faizatul, Z., Asiyah, B. N., & Subagyo, R. (2023). ANALISIS RISIKO

TEKNOLOGI INFORMASI PADA BANK SYARIAH?: IDENTIFIKASI ANCAMAN DAN TANTANGAN TERKINI. Jurnal Asy-Syarikah: Jurnal Lembaga Keuangan, Ekonomi Dan Bisnis Islam, 5(2), 87–100. https://doi.org/10.47435/asy-syarikah.v5i2.2022

Fitria, E. Y., & Mutijarsa, K. (2023). Survei Penelitian Metode Kecerdasan Buatan untuk

Mendeteksi Ancaman Teknologi Serangan Siber. Jurnal Teknologi Informasi Dan Ilmu Komputer, 10(6), 1185–1196. https://doi.org/10.25126/jtiik.1067341

Glen Maxie Taberima, & Ramayanti, D. (2024). MENGOPTIMALKAN MANAJEMEN DAN

KEAMANAN TI MELALUI IMPLEMENTASI LAYANAN DOMAIN ACTIVE DIRECTORY STUDI KASUS PADA INFRASTRUKTUR TI PERUSAHAAN. Jurnal Informatika Teknologi Dan Sains (Jinteks), 6(1), 79–89. https://doi.org/10.51401/jinteks.v6i1.3884

Hafid, M., Firjatullah, F. Z., Pamungkaz, B. W., Magister, S., Hukum, I., Wijaya, U., &

Surabaya, K. (2023). Tantangan Menghadapi Kejahatan Cyber dalam Kehidupan Bermasyarakat dan Bernegara Muhammad. Pendidikan Tambusai, 7(2), 9548–9556.

Laksana, T. G., & Mulyani, S. (2024). PENGETAHUAN DASAR IDENTIFIKASI DINI

DETEKSI SERANGAN KEJAHATAN SIBER UNTUK MENCEGAH PEMBOBOLAN DATA PERUSAHAAN. Jurnal Ilmiah Multidisiplin, 3(01), 109–122. https://doi.org/10.56127/jukim.v3i01.1143

Oktaviani, S., Rizky, F., & Gunawan, I. (2023). Analisis Keamanan Data Dengan

Menggunakan Kriptografi Modern Algoritma Advance Encryption Standar (AES). Jurnal Media Informatika, 4(2), 97–101. https://doi.org/10.55338/jumin.v4i2.435

Prasetia, O., Machfud, S., & ... (2023). Sosialiasi Pengenalan Pentingnya Cyber Security Guna

Menjaga Keamanan Data di Era Digital Pada Siswa/i SMK Bakti Idhata Jakarta. JIPM: Jurnal Inovasi …, 2(1), 16–20. https://jurnal.astinamandiri.com/index.php/JIPM/article/view/141%0Ahttps://jurnal.astinamandiri.com/index.php/JIPM/article/download/141/101

Ramadhani, A. (2018). KEAMANAN INFORMASI. Nusantara - Journal of Information and

Library Studies, 1(1), 39. https://doi.org/10.30999/n-jils.v1i1.249

Rohan, D. H., & Hayati, N. (2019). Persamaan Lorenz untuk Keamanan Nomor Serial Sistem

Operasi Window7. Jurnal Ilmiah FIFO, 10(2), 1. https://doi.org/10.22441/fifo.2018.v10i2.001

Santoso, K. P., Madany, F. A., & Suryotrisongko, H. (2023). Dan Augmentasi Data NSL-

KDD Menggunakan Deep Generative Adversarial Networks Untuk Meningkatkan Performa Algoritma Extreme Gradient Boosting Dalam …. ArXiv Preprint ArXiv ….

Sari, M. W. (2013). Analisis keamanan jaringan Virtual Private Network (VPN) pada Sistem

Online Microbanking. Informatika, 13.

Surahman, F. (2023). Tantangan Dalam Menjaga Keamanan Data Official Statistics dari

Serangan Cybercrime. Jurnal Ilmiah Multidisiplin, 1(11), 904–907. https://doi.org/10.5281/zenodo.10371686

Sutriawan, S., Khatimah, N. H., & Sanusi, G. (2023). Sosialisasi Pentingnya Menjaga Privasi

Dan Keamanan Data Di Era Digital. SEWAGATI: Jurnal Pengabdian Kepada Masyarakat, 2(1), 8–14. https://doi.org/10.61461/sjpm.v2i1.10

Syahputri, N. I., Harahap, H., Siregar, R., & Tommy, T. (2023). Penyuluhan Pentingnya Two

Factor Authentication dan Aplikasinya Di Era Keamanan Digital. Jurnal Pengabdian Masyarakat Bangsa, 1(6), 768–773. https://doi.org/10.59837/jpmba.v1i6.256

Syamsu, M., Terisia, V., & Masduki, U. (2023). Buku Ajar Jaringan Komputer?: Praktis &

Mudah disertai Studi Kasus. Eureka Media Aksara.

Tan, T., Sama, H., Wijaya, G., & Aboagye, O. E. (2023). Studi Perbandingan Deteksi Intrusi

Jaringan Menggunakan Machine Learning: (Metode SVM dan ANN). Jurnal Teknologi Dan Informasi, 13(2), 152–164. https://doi.org/10.34010/jati.v13i2.10484

Vansuri, R., Fauzi, A., Teguh Prasetyo, E., Negara, R., Ramadhan, R., Mada Restu, A., & Raffi

Firmansyah, R. (2023). Peran CIA (Confidentiality, Integrity, Availability) Terhadap Manajemen Keamanan Informasi. Jurnal Ilmu Multidisplin, 2(1), 106–113. https://doi.org/10.38035/jim.v2i1.234

Wicaksono, D. (2022). Firewall Sistem Keamanan Jaringan Menggunakan Firewall dengan

Metode Port Blocking dan Firewall Filtering. JATISI (Jurnal Teknik Informatika Dan

Downloads

Published

2025-06-10

How to Cite

Gumelar, G., & Aedi, W. G. . (2025). Security Challenges in Computer Networks and Modern Operating Systems. Dinasti International Journal of Education Management And Social Science, 6(5), 3541–3547. https://doi.org/10.38035/dijemss.v6i5.4516