Cover Image

Representasi Social Engineering Dalam Tindak Kejahatan Dunia Maya (Analisis Semiotika Pada Film Firewall)

Imas Rahmadhtul Hidayah(1),


(1) Universitas 17 Agustus 1945 Surabaya
Corresponding Author

Abstract


In the current technological era, information is represented as a valuable asset for every individual or organization. There are three important components in information security such as ; (1) human; (2) process; and (3) technology. For perpetrators of cybercrime will look for gaps in the three components, not infrequently the human component becomes the target. From the above problems, researchers are interested in conducting studies by placing the film Firewall as research objects. The film is interesting because it's one of the action-thriller films with a cybercrime theme in banking. Through the film, researchers will examine the related representation of social engineering in cybercrime using the semiotic analysis method developed by Roland Barthes. The results show that social engineering representation is reflected in reverse social engineering based on social interaction. The implicit meaning in the Firewall film that is protecting company information must pay attention to the three components above because attacks from the inside are just as dangerous from outside attacks.

Keywords: Social Engineering, Cyber World, Film


References


Anggoro, A. R. (2016, Oktober 12). Konsep-Konsep Dasar Semiotika Struktural Pada Momen Ilmiah Roland Barthes. Retrieved Mei 03, 2020, from Repository ISI: http://repository.isi-ska.ac.id/32778/1/Albertus%20Rusputranto%20Ponco%20Anggoro%2C%20S.Sn.%2C%20M.Hum._Penelitian.pdf

Besar. (2016). Kejahatan Dengan Menggunakan Sarana Teknologi Informasi. Retrieved April 30, 2020, from Business Law Binus University: https://business-law.binus.ac.id/2016/07/31/kejahatan-dengan-menggunakan-sarana-teknologi-informasi/

CNN Indonesia. (2020, Februari 06). Pembobolan Rekening Ilham Bintang, Data Dijual Orang Bank. Retrieved Mei 06, 2020, from CNN Indonesia: https://m.cnnindonesia.com/nasional/20200205211241-12-472073/pembobolan-rekening-ilham-bintang-data-dijual-orang-bank

Dhull, R., & Hooda, S. S. (2016). Contrast Study of Social Engineering Techniques. IOSR Journal of Computer Engineering, Volume 18(Issue 4), 66-68.

Djanggih, H., & Qamar, N. (2018, June). Penerapan Teori-Teori Kriminologi Dalam Penanggulan Kejahatan Siber (Cyber Crime). Pandecta, Volume 13(Number 1), 10-23.

Fasah, A. P., & Laksmi. (2018). Representasi Profesionalisme Pustakawan Dalam Mengelola Perpustakaan Pada Film Pendek Project: Library. Lentera Pustaka, Vol. 4(No. 1), 1-6.

Forte, J. (Writer), & Loncraine, R. (Director). (2006). Firewall [Motion Picture].

Hadnagy, C. (2011). Social Engineering: The Art of Human Hacking. Indianapolis: Wiley Publishing, Inc.

Kelrey, A. R., & Muzaki, A. (2019, November). Pengaruh Ethical Hacking Bagi Keamanan Data Perusahaan. CyberSecurity dan Forensik Digital, Vol. 2(No. 2), 77-81.

Putra, A. M. (2015, Oktober 30). Pengenalan Teknologi Informasi. Retrieved Mei 06, 2020, from Sisfo ITP: https://sisfo.itp.ac.id/bahanajar/index.php?dir=Andi%20M%20Nur%20Putra/Pengantar%20Teknologi%20Informasi/&file=BAB%20I%20Pengenalan%20Teknologi%20Informasi.pdf

Rafizan, O. (2011). Analisis Penyerangan Social Engineering. Masyarakat Telematika Dan Informasi : Jurnal Penelitian Teknologi Informasi dan Komunikasi, Vol. 2(No. 2), 115-126.

Ramadhan, M. H. (2017, Agustus 11). Representasi Visi dan Misi UIN Sunan Ampel Surabaya dalam Lirik Lagu Mars dan Himne : Analisis Semiotika Model Ferdinand de Saussure. Retrieved Mei 06, 2020, from Digital Library UIN Sunan Ampel: http://digilib.uinsby.ac.id/19237/

Zulkarnaen, M. J. (2015, April 06). Efektivitas Penggunaan Teknologi Informasi dan Komunikasi Dalam Meningkatkan Prestasi Belajar Pendidikan Agama Islam Siswa Kelas X Teknik Komputer dan Informatika di SMK Negeri 3 Bojonegoro. Retrieved Mei 03, 2020, from Digital Library UIN Sunan Ampel: http://digilib.uinsby.ac.id/1534/


Full Text: PDF

Article Metrics

Abstract View : 1374 times
PDF Download : 1275 times

DOI: 10.30742/tb.v4i1.905

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.