{"id":6659,"date":"2022-11-07T13:16:36","date_gmt":"2022-11-07T06:16:36","guid":{"rendered":"https:\/\/www.linkqu.id\/?p=6659"},"modified":"2022-11-07T13:53:58","modified_gmt":"2022-11-07T06:53:58","slug":"modus-social-engineering","status":"publish","type":"post","link":"https:\/\/www.linkqu.id\/en\/berita\/modus-social-engineering\/","title":{"rendered":"Mengenal 3 Modus Social Engineering dan Tips Menghindarinya"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-6661\" src=\"https:\/\/www.linkqu.id\/wp-content\/uploads\/2022\/11\/social-engineering.jpg\" alt=\"social engineering\" width=\"1080\" height=\"609\" title=\"\" srcset=\"https:\/\/www.linkqu.id\/wp-content\/uploads\/2022\/11\/social-engineering.jpg 1080w, https:\/\/www.linkqu.id\/wp-content\/uploads\/2022\/11\/social-engineering-18x10.jpg 18w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/p>\n<p>Tindak kejahatan pencurian data pribadi semakin marak ditemui. Modus kejahatannya juga semakin bermacam-macam salah satunya adalah <em><a href=\"https:\/\/www.linkqu.id\/en\/\" target=\"_blank\" rel=\"noopener\">social engineering<\/a>.<\/em>.<\/p>\n<p>Salah satu contoh social engineering yaitu, modus pembobolan rekening bank dan data personal lewat modus SIM swap. Atas dasar itu Kementerian Komunikasi dan Informatika (KOMINFO) dan BRTI mempunyai kewajiban untuk mengedukasi serta mengajak penyedia operator, bank, dan warga agar semakin berhati-hati.<\/p>\n<p>Tujuannya adalah untuk\u00a0meminimalkan berlangsungnya kasus pencurian dan pembobolan serupa terjadi kembali di waktu mendatang.<\/p>\n<p>&nbsp;<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 ez-toc-wrap-left-text counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #000000;color:#000000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #000000;color:#000000\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.linkqu.id\/en\/berita\/modus-social-engineering\/#Apa_itu_Social_Engineering\" >Apa itu Social Engineering?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.linkqu.id\/en\/berita\/modus-social-engineering\/#3_Modus_Social_Engineering\" >3 Modus Social Engineering<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Apa_itu_Social_Engineering\"><\/span>Apa itu Social Engineering?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Mencuplik situs Indonesiabaik.go.id, social engineering adalah manipulasi psikologis dari seseorang dalam melakukan tindakan atau menguak suatu informasi rahasia. Modus ini biasanya dilakukan melalui telephone atau <a href=\"https:\/\/www.linkita.id\/\" target=\"_blank\" rel=\"noopener\">Internet<\/a>.<\/p>\n<p>Social engineering salah satunya sistem yang dipakai oleh hacker untuk mendapatkan data atau informasi tentang targetnya, dengan meminta informasi itu langsung ke korban atau pihak lain yang memiliki data itu.<\/p>\n<p>Pada banyak referensi, unsur manusia dipandang sebagai rantai paling lemah dalam sebuah sistem keamanan. Sebuah mekanisme keamanan yang baik, bisa menjadi tidak bermanfaat bila diatasi oleh administrator yang kurang kompeten.<\/p>\n<p>Disamping itu, umumnya pada suatu jaringan yang cukup kompleks ada beberapa user yang kurang memahami permasalahan keamanan atau kurang cukup perduli mengenai hal tersebut.<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"3_Modus_Social_Engineering\"><\/span>3 Modus Social Engineering<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Sistem Social engineering artinya ini termasuk cara yang seringkali dilakukan pelaku penipuan untuk menipu calon korbannya. Beberapa pelaku akan mengaku Costumer Service \/ Support Staff dari pihak bank, kartu kredit, asuransi, fintect dan instansi bidang keuangan yang lain.<\/p>\n<p>Modus bermula dari sebuah telephone yang diterima oleh calon korban yang tidak mengetahui jika pelaku penipuan sedang berusaha untuk mengorek data pribadinya.<\/p>\n<ol>\n<li>Modus pertama adalah metode yang paling dasar dalam social engineering, bisa menyelesaikan tugas penyerang secara langsung yakni, penyerang tinggal minta apa yang dibutuhkannya: password, akses ke jaringan, peta jaringan, konfigurasi sistem, atau kunci ruangan. Memang langkah ini paling sedikit sukses, tetapi dapat benar-benar menolong dalam menyelesaikan tugas penyerang.<\/li>\n<li>Modus ke-2 dengan membuat situasi palsu di mana seseorang menjadi bagian dari situasi itu. Penyerang dapat membuat alasan yang menyangkut kebutuhan pihak lain atau bagian lain dari perusahaan itu, misalnya. Cara ini membutuhkan kerja lanjutan buat penyerang untuk mencari data lebih lanjut dan umumnya harus juga mengumpulkan informasi tambahan mengenai \u2018target&#8217;.<br \/>\nHal ini berarti kita tidak selalu harus berbohong untuk menciptakan situasi tesebut, terkadang sejumlah fakta lebih bisa diterima oleh target.<\/li>\n<li>Langkah yang terkenal saat ini ialah lewat e-mail, dengan mengirim e-mail yang minta target untuk membuka attachment yang pastinya dapat di sisipi worm atau trojan horse untuk membuat backdoor di sistemnya.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3>Cara Menghindar Kejahatan Social Engineering<\/h3>\n<ul>\n<li>Simpan data seperti username, password mobile banking, data nomor rekening dan yang lain secara baik<\/li>\n<li>Pakai password yang dipadukan antara angka, huruf dan simbol<\/li>\n<li>Bila kehilangan smartphone dan sim card, segera kontak layanan kontak center operator telephone dan bank<\/li>\n<li>Jangan memberi data apa saja ke orang\/oknum yang mengaku dari pihak bank atau operator.<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Tindak kejahatan pencurian data pribadi semakin marak ditemui. Modus kejahatannya juga semakin bermacam-macam salah satunya adalah social engineering.. Salah satu contoh social engineering yaitu, modus pembobolan rekening bank dan data personal lewat modus SIM swap. Atas dasar itu Kementerian Komunikasi dan Informatika (KOMINFO) dan BRTI mempunyai kewajiban untuk mengedukasi serta mengajak penyedia operator, bank, dan [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6661,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"aside","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[49],"tags":[1089,1092,1091,1088,1087,1090],"class_list":["post-6659","post","type-post","status-publish","format-aside","has-post-thumbnail","hentry","category-berita","tag-apa-itu-social-engineering","tag-apa-yang-dimaksud-dengan-social-engineering","tag-contoh-social-engineering","tag-social-engineering","tag-social-engineering-adalah","tag-social-engineering-artinya","post_format-post-format-aside"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.linkqu.id\/en\/wp-json\/wp\/v2\/posts\/6659","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.linkqu.id\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.linkqu.id\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.linkqu.id\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.linkqu.id\/en\/wp-json\/wp\/v2\/comments?post=6659"}],"version-history":[{"count":0,"href":"https:\/\/www.linkqu.id\/en\/wp-json\/wp\/v2\/posts\/6659\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.linkqu.id\/en\/wp-json\/wp\/v2\/media\/6661"}],"wp:attachment":[{"href":"https:\/\/www.linkqu.id\/en\/wp-json\/wp\/v2\/media?parent=6659"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.linkqu.id\/en\/wp-json\/wp\/v2\/categories?post=6659"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.linkqu.id\/en\/wp-json\/wp\/v2\/tags?post=6659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}