Pelanggaran Keamanan Sistem Komputer

(Studi Kasus Unauthorized Access dan Dampaknya terhadap Privasi Data)

Authors

  • Hana Khairunnas Universitas Bina Sarana Informatika
  • Amelia Rachma Dita Universitas Bina Sarana Informatika
  • Nuruzzahra Syaputri Universitas Bina Sarana Informatika
  • Siti Zulaeha Universitas Bina Sarana Informatika
  • Excelcis Novan Solomasi G Universitas Bina Sarana Informatika
  • Yunita Yunita Universitas Bina Sarana Informatika

DOI:

https://doi.org/10.55606/jutiti.v5i3.6290

Keywords:

Cybersecurity, Data Privacy, DPIA, Identity Protection, Password Spraying

Abstract

Unauthorized access incidents often occur stealthily, with password spraying attacks resulting in the misuse of legitimate credentials. This study reconstructs a real-world incident using system logs from Identity Provider/Single Sign-On (IdP/SSO), Security Information and Event Management/Endpoint Detection and Response (SIEM/EDR), and application-level sources. The attack techniques were mapped to the MITRE ATT&CK framework, focusing on T1110 (Brute Force) and T1078 (Valid Accounts). A Data Protection Impact Assessment (DPIA) was conducted based on the Indonesian Personal Data Protection Law (Law No. 27 of 2022), complemented by a gap assessment against ISO/IEC 27001 and 27002 controls. The results show that the attack’s success was driven by incomplete Multi-Factor Authentication (MFA) deployment, the continued use of legacy/basic authentication, weak adaptive rate-limiting and lockout mechanisms, and a monitoring system limited to alert-only functions. The DPIA identified exposure of thousands of personal data records with medium-to-high privacy risks, particularly concerning confidentiality breaches and identity impersonation, necessitating possible notification to authorities and affected data subjects. The study recommends enforcing MFA across all access channels, disabling legacy authentication, implementing risk-based or step-up authentication, activating automatic blocking for password spraying and impossible travel anomalies, extending DPIA coverage during control changes, and updating the Statement of Applicability to reflect modern security controls. Strengthening identity protection and adopting preventive monitoring are shown to significantly reduce privacy risks while easing compliance obligations.

Downloads

Download data is not yet available.

References

Agung, S. F. A. T., & Nasution, M. I. P. (2023). Perlindungan hukum terhadap data pribadi konsumen dalam melakukan transaksi di e-commerce. Jurnal Ekonomi Manajemen dan Bisnis (JEMB), 2(1), 5–7. https://doi.org/10.47233/jemb.v2i1.915

Bahtiar, R. A. (2020). Potensi, peran pemerintah, dan tantangan dalam pengembangan e-commerce di Indonesia [Potency, government role, and challenges of e-commerce development in Indonesia]. Jurnal Ekonomi dan Kebijakan Publik, 11(1), 13–25. https://doi.org/10.22212/jekp.v11i1.1485

Choudhury, N., & Singh, R. (2022). Multi-factor authentication in cloud security: A critical review. International Journal of Computer Applications, 184(31), 1–7. https://doi.org/10.5120/ijca2022922222

Disemadi, H. S. (2021). Urgensi regulasi khusus dan pemanfaatan artificial intelligence dalam mewujudkan perlindungan data pribadi di Indonesia. Jurnal Wawasan Yuridika, 5(2), 177. https://doi.org/10.25072/jwy.v5i2.460

Josephine, Y. (2021). Human capital, economic growth and poverty reduction nexus: Why investment in free compulsory universal education matters for Africa. International Journal of Humanities and Social Sciences, 13(2), 50–60. https://doi.org/10.26803/ijhss.13.2.3

Kumar, S., & Gupta, P. (2023). Cybersecurity threats and mitigation strategies in digital ecosystems. Journal of Information Security and Applications, 76, 103576. https://doi.org/10.1016/j.jisa.2023.103576

Niffari, H. (2020). Perlindungan data pribadi sebagai bagian dari hak asasi manusia atas perlindungan diri pribadi: Suatu tinjauan komparatif dengan peraturan perundang-undangan di negara lain. Jurnal Hukum dan Bisnis (Selisik), 6(1), 1–14. https://doi.org/10.35814/selisik.v6i1.1699

Puspita, K. (2023). Perlindungan hukum data pribadi konsumen dalam perjanjian pinjaman online di Indonesia. Jurisprudensi: Jurnal Ilmu Syariah, Perundangan-Undangan dan Ekonomi Islam, 15(1), 67–83. https://doi.org/10.32505/jurisprudensi.v15i1.5478

Putra, T. I. (2023). The analysis of the legal protection of ship’s crew in sea work agreement in Indonesia. Indonesian Journal of Advocacy and Legal Services, 5(2), 181–206. https://doi.org/10.15294/ijals.v5i2.75367

Raab, C. D. (2020). Information privacy, impact assessment, and the place of ethics. Computer Law & Security Review, 37, 105404. https://doi.org/10.1016/j.clsr.2020.105404

Rahmawati, D., & Prasetyo, T. (2024). Analisis implementasi multi factor authentication untuk pencegahan unauthorized access pada sistem informasi pemerintahan. Jurnal Teknologi Informasi dan Komputer (J-TIK), 9(1), 42–51. https://doi.org/10.33387/jtik.v9i1.6543

Ramadhani, S. A. (2022). Komparasi perlindungan data pribadi di Indonesia dan Uni Eropa. Jurnal Hukum Lex Generalis, 3(1), 73–84. https://doi.org/10.56370/jhlg.v3i1.173

Sulistianingsih, D., Ihwan, M., Setiawan, A., & Prabowo, M. S. (2023). Tata kelola perlindungan data pribadi di era metaverse (Telaah yuridis Undang-Undang Perlindungan Data Pribadi). Masalah-Masalah Hukum, 52(1), 97–106. https://doi.org/10.14710/mmh.52.1.2023.97-106

Tegar Islami Putra, Fibrianti, N., & Fakhrullah, M. R. (2024). Data protection impact assessment indicators in protecting consumer personal data on e-commerce platforms. The Indonesian Journal of International Clinical Legal Education, 6(1), 111–150. https://doi.org/10.15294/iccle.v6i1.2002

Widodo, A., & Lestari, F. (2023). Analisis risiko pelanggaran privasi data pribadi berdasarkan UU No. 27 Tahun 2022. Jurnal Hukum & Teknologi Informasi Indonesia, 2(2), 88–102. https://doi.org/10.36787/jhti.v2i2.839

Downloads

Published

2025-11-28

How to Cite

Hana Khairunnas, Amelia Rachma Dita, Nuruzzahra Syaputri, Siti Zulaeha, Excelcis Novan Solomasi G, & Yunita Yunita. (2025). Pelanggaran Keamanan Sistem Komputer: (Studi Kasus Unauthorized Access dan Dampaknya terhadap Privasi Data). Jurnal Teknik Informatika Dan Teknologi Informasi, 5(3), 273–285. https://doi.org/10.55606/jutiti.v5i3.6290