Meningkatkan Keamanan Sertifikat Digital dengan Pengaktifan HTTPS
DOI:
https://doi.org/10.47134/pjise.v1i4.3170Keywords:
Digital Certificates, Encryption, HTTPS, Information Security, Online CommunicationAbstract
Era digital saat ini, keamanan informasi menjadi isu yang sangat penting bagi organisasi maupun individu. Salah satu aspek krusial dalam keamanan digital adalah keamanan sertifikat digital. Sertifikat digital berperan vital dalam mengautentikasi identitas digital dan melindungi komunikasi serta pertukaran data sensitif secara online. Namun, sertifikat digital seringkali rentan terhadap ancaman keamanan, seperti serangan man-in-the-middle, pemalsuan sertifikat, dan kebocoran informasi. Untuk mengatasi permasalahan ini, pengaktifan protokol HTTPS (Hypertext Transfer Protocol Secure) menjadi solusi yang efektif. HTTPS merupakan protokol komunikasi yang mengenkripsi data yang dikirimkan antara klien dan server, sehingga memperkuat keamanan sertifikat digital dan melindungi komunikasi online. Dengan HTTPS, sertifikat digital dapat terverifikasi dengan lebih baik, meminimalisir risiko peretasan, dan membangun kepercayaan pengguna.
References
Aji, M. P. (2023). Sistem Keamanan Siber dan Kedaulatan Data di Indonesia dalam Perspektif Ekonomi Politik (Studi Kasus Perlindungan Data Pribadi) [Cyber Security System and Data Sovereignty in Indonesia in Political Economic Perspective]. Jurnal Politica Dinamika Masalah Politik Dalam Negeri Dan Hubungan Internasional, 13(2), 222–238. https://doi.org/10.22212/jp.v13i2.3299 DOI: https://doi.org/10.22212/jp.v13i2.3299
Arianto, A. R., & Anggraini, D. G. (n.d.-a). Membangun Pertahanan Dan Keamanan Siber Nasional Indonesia Guna Menghadapi Ancaman Siber Global Melalui Indonesia Security Incident Response Team On Internet Infrastructure (Id-Sirtii) Building Indonesia’s National Cyber Defense And Security To Face The Global Cyber Threats Through Indonesia Security Incident Response Team On Internet Infrastructure (Id-Sirtii). http://kominfo.go.id/index.
AlFardan, N. J., & Paterson, K. G. (2012). "Lucky Thirteen: Breaking the TLS and DTLS Record Protocols." Proceedings of the 2013 IEEE Symposium on Security and Privacy. DOI: https://doi.org/10.1109/SP.2013.42
A., Wahib, P., Tunggal Narotama, A., Muhamad Rijki, N., Permana, F., Sagara, D., Ibrahim Azkhal, D., Anwar, M., & Rifqi Juniawan, M. (2022). SOSIALISASI CYBER SECURITY UNTUK MENINGKATKAN LITERASI DIGITAL. 1(2). https://jurnal.portalpublikasi.id/index.php/AJP/index
Bhargavan, K., et al. (2016). "Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS." IEEE Symposium on Security and Privacy.
Bodo, J., & Green, M. (2018). "A Study of Forward Secrecy Deployment in HTTPS." Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems.
Buchegger, S., & Le Boudec, J. Y. (2006). "Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes—Fairness In Dynamic Ad-hoc NeTworks)." Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing.
Cremers, C. J., et al. (2017). "The Security Impact of a New Cryptographic Library." Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.
Dukhovni, V., et al. (2019). "Extended Validation Certificates Are Dead." Proceedings of the Internet Society Network and Distributed System Security Symposium.
Felt, A. P., et al. (2017). "Measuring HTTPS Adoption on the Web." Proceedings of the Internet Measurement Conference.
Garg, D., et al. (2018). "Understanding and mitigating the impact of layout shifts for developers." Proceedings of the 2018 World Wide Web Conference.
Gergely, A. M. (2022). BlockCACert – A Blockchain-Based Novel Concept for Automatic Deployment of X.509 Digital Certificates. Lecture Notes in Networks and Systems, 386, 820–832. https://doi.org/10.1007/978-3-030-93817-8_73 DOI: https://doi.org/10.1007/978-3-030-93817-8_73
Horvat, M., et al. (2019). "An Empirical Study of Web Transport Security in Practice." Proceedings of the 2019 ACM Internet Measurement Conference.
Hu, Q. (2021). A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations. Journal of Computer Security, 29(1), 25–50. https://doi.org/10.3233/JCS-200070 DOI: https://doi.org/10.3233/JCS-200070
Hughes, L. E. (2022). Pro Active Directory Certificate Services: Creating and Managing Digital Certificates for Use in Microsoft Networks. Pro Active Directory Certificate Services: Creating and Managing Digital Certificates for Use in Microsoft Networks, 1–459. https://doi.org/10.1007/978-1-4842-7486-6 DOI: https://doi.org/10.1007/978-1-4842-7486-6
Ishida, Y. (2023). Analysis of DNS Graph of Phishing Websites Using Digital Certificates. International Conference on Advanced Communication Technology, ICACT, 2023, 174–179. https://doi.org/10.23919/ICACT56868.2023.10079566 DOI: https://doi.org/10.23919/ICACT56868.2023.10079566
Mavrogiannopoulos, N. (2017). "The dangers of key reuse: Practical attacks on IPsec IKE." Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.
Mori, Y., et al. (2018). "Detection of SSL/TLS Vulnerabilities using Machine Learning." 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA).
Rescorla, E. (2018). "The Transport Layer Security (TLS) Protocol Version 1.3." RFC 8446. Internet Engineering Task Force (IETF). DOI: https://doi.org/10.17487/RFC8446
Ristic, I. (2015). "Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications." IT Governance Ltd.
Wang, X. (2022). Research on technical scheme for multi type load resource information access. Journal of Physics: Conference Series, 2189(1). https://doi.org/10.1088/1742-6596/2189/1/012030 DOI: https://doi.org/10.1088/1742-6596/2189/1/012030
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Aep Setiawan, Muchammad Alifandino Satrio, Itqon Madani, Ramma Dwi Rachmat, Stivan Hari Sukma

This work is licensed under a Creative Commons Attribution 4.0 International License.