Slamet, Slamet (2022) Pertahanan Pencegahan Serangan Social Engineering Menggunakan Two Factor Authentication (2FA) Berbasis SMS (Short Message System). Jurnal SPIRIT, 14 (2). pp. 23-29. ISSN 2085-3092
Text
Abstrak_SPIRIT.pdf Download (319kB) |
|
Text
Turnitin -SPIRIT.pdf Download (1MB) |
Search this title on : |
Abstract
Advances in digital technology have made communication between humans faster and easier. On the other hand, a lot of personal information is available online through social media and services that do not have security measures in place to protect this information. Therefore, the communication system is very vulnerable and easily penetrated by intruder due to social engineering attacks. This attack aims to deceive individuals or companies by taking actions that benefit the attacker. The trick is to provide personal data such as PIN numbers, health records, and passwords. This attack phenomenon is one of the biggest challenges in maintaining the security of personal data because this attack model takes advantage of human nature which is easy to trust others. This paper provides an in-depth survey of high-success social engineering attacks, using a 2 Factor Authentication (2FA) model by examining user accounts, to detect and avoid attempted account fraud via SMS (Short Message System). Experimental results show that attack success can be reduced to 10% and aggressive intruders can be caught by 70% of users in forwarding user verification code.
Export Record
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Social Engineering, Security, 2FA, SMS |
Dewey Decimal Classification: | 000 – Computer science, information & general works > 000 Computer science, knowledge & systems > 000 Computer science, information & general works |
Divisions: | Perpustakaan > Journals |
Depositing User: | Agung P. W. |
Date Deposited: | 25 Sep 2023 10:09 |
Last Modified: | 25 Sep 2023 10:09 |
URI: | http://repository.dinamika.ac.id/id/eprint/7352 |
Download Statistics
Downloads over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
Actions (login required)
View Item |