{"id":1896,"date":"2024-07-27T16:00:00","date_gmt":"2024-07-27T09:00:00","guid":{"rendered":"https:\/\/nevacloud.com\/blog\/?p=1896"},"modified":"2024-07-19T13:48:20","modified_gmt":"2024-07-19T06:48:20","slug":"apa-itu-social-engineering","status":"publish","type":"post","link":"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/","title":{"rendered":"Apa Itu Social Engineering, Cara Kerja, dan Cara Mencegahnya"},"content":{"rendered":"\n<p>social engineering adalah seni mengeksploitasi psikologi manusia, bukan teknik peretasan teknis, untuk mendapatkan akses ke bangunan, sistem, atau data. Latih diri Anda untuk melihat tanda-tandanya.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 ez-toc-wrap-left counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Daftar Isi<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #444444;color:#444444\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #444444;color:#444444\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Apa_Itu_Social_Engineering\" >Apa Itu Social Engineering?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Sejarah_dan_Evolusi_Teknik_Social_Engineering\" >Sejarah dan Evolusi Teknik Social Engineering.<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Awal_Mula\" >Awal Mula<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Perkembangan_Abad_ke-20\" >Perkembangan Abad ke-20:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Ketenaran_Digital\" >Ketenaran Digital:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Bagaimana_Social_Engineering_Bekerja\" >Bagaimana Social Engineering Bekerja?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Teknik-teknik_umum_yang_digunakan_dalam_Social_Engineering\" >Teknik-teknik umum yang digunakan dalam Social Engineering<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Phishing\" >Phishing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Pretexting\" >Pretexting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Baiting\" >Baiting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Quid_Pro_Quo\" >Quid Pro Quo<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Dampak_Serangan_Social_Engineering\" >Dampak Serangan Social Engineering<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Dampak_terhadap_individu\" >Dampak terhadap individu.<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Dampak_terhadap_perusahaan_dan_organisasi\" >Dampak terhadap perusahaan dan organisasi.<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Cara_Mencegah_dan_Melindungi_Diri_dari_Social_Engineering\" >Cara Mencegah dan Melindungi Diri dari Social Engineering<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Edukasi_dan_kesadaran_karyawan\" >Edukasi dan kesadaran karyawan.<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Penggunaan_teknologi_dan_perangkat_lunak_keamanan\" >Penggunaan teknologi dan perangkat lunak keamanan.<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Prosedur_dan_kebijakan_keamanan_di_perusahaan\" >Prosedur dan kebijakan keamanan di perusahaan.<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#Tertarik_Untuk_Menggunakan_VPS_dengan_teknologi_terbaik_dari_Nevacloud\" >Tertarik Untuk Menggunakan VPS dengan teknologi terbaik dari Nevacloud?<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Apa_Itu_Social_Engineering\"><\/span>Apa Itu Social Engineering?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>social engineering, dalam konteks keamanan siber, adalah proses menipu orang agar membocorkan informasi pribadi yang dapat berguna dalam serangan siber.<\/p>\n\n\n\n<p>Ada banyak jenis serangan social engineering. Beberapa bentuk manipulasi psikologis adalah email atau pesan teks yang meyakinkan yang terinfeksi tautan yang mengarah ke situs web berbahaya. Lainnya melibatkan lebih banyak upaya, seperti panggilan telepon dari penjahat dunia maya yang berpura-pura menjadi dukungan teknis yang meminta informasi rahasia.<\/p>\n\n\n\n<p>Serangan social engineering sangat populer karena membantu penjahat dunia maya menghindari upaya sulit untuk menemukan dan mengeksploitasi kerentanan keamanan untuk mengakses jaringan. Sebaliknya, karyawan yang dimanipulasi pada dasarnya menyerahkan aktor ancaman kunci ke jaringan<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Sejarah_dan_Evolusi_Teknik_Social_Engineering\"><\/span>Sejarah dan Evolusi Teknik Social Engineering.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Awal_Mula\"><\/span>Awal Mula<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Istilah &#8220;social engineering&#8221; pertama kali digunakan oleh industrialis Belanda JC Van Marken pada tahun 1894. Van Marken menekankan perlunya spesialis untuk mengatasi tantangan manusia di samping tantangan teknis.<\/p>\n\n\n\n<p>Pada tahun 1911, Edward L. Earp menulis sebuah buku berjudul &#8220;Social Engineer,&#8221; mendorong orang untuk mendekati hubungan sosial dengan ketekunan yang sama seperti yang mereka lakukan pada mesin.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Perkembangan_Abad_ke-20\"><\/span>Perkembangan Abad ke-20:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Selama akhir abad ke-19 dan awal abad ke-20, para ahli muncul yang berusaha membentuk masyarakat, menyebarkan nilai-nilai, dan meningkatkan efisiensi. Mereka pada dasarnya adalah &#8220;social engineering&#8221; dalam upaya mereka. Pada tahun 1875, profesor Jerman Wilhelm Wundt meletakkan dasar bagi psikologi, tanpa sadar mempengaruhi dunia dengan cara yang mungkin tidak dia bayangkan.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ketenaran_Digital\"><\/span>Ketenaran Digital:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>social engineering menjadi terkenal dalam dua dekade terakhir, terutama karena penjahat dunia maya mengadopsi tekniknya. Saat ini, social engineering memanipulasi target untuk mengungkapkan informasi pribadi, mendapatkan uang, atau mendapatkan akses ke data sensitif.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Bagaimana_Social_Engineering_Bekerja\"><\/span>Bagaimana Social Engineering Bekerja?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>social engineering biasanya mulai dengan mengumpulkan informasi tentang target mereka. Ini dapat dilakukan melalui pengumpulan intelijen sumber terbuka, yang melibatkan menjelajahi media sosial, situs web, dan catatan publik untuk mempelajari kebiasaan, minat, koneksi, dan rutinitas target. Dalam konteks perusahaan, penyerang juga dapat meneliti organisasi target untuk mengidentifikasi potensi kerentanan atau titik masuk.<\/p>\n\n\n\n<p>Salah satu bentuk manipulasi psikologis yang paling umum dan efektif adalah phishing. Email phishing dibuat agar terlihat sah, sering kali meniru entitas terpercaya seperti bank, situs e-commerce, atau bahkan kolega. Email ini berisi tautan atau lampiran berbahaya yang, ketika di klik, dapat menginstal malware di perangkat korban atau mengarahkan mereka ke situs web palsu tempat mereka diminta memasukkan informasi sensitif seperti nama pengguna dan kata sandi. Rincian teknis dalam serangan phishing melibatkan pembuatan template email yang meyakinkan dan seringkali pendaftaran nama domain yang tampak meyakinkan.<\/p>\n\n\n\n<p>Aspek teknis social engineering sering berkisar pada penciptaan persona yang meyakinkan, menyusun skenario yang dapat dipercaya, mengembangkan keterampilan komunikasi yang efektif, dan menggunakan berbagai alat dan taktik untuk penipuan. Misalnya, penyerang dapat menggunakan alamat email palsu, nama domain, dan ID penelepon untuk membuat komunikasi mereka tampak asli. Mereka juga dapat menggunakan malware, kit social engineering, dan trik psikologis untuk meningkatkan efektivitas serangan mereka.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Teknik-teknik_umum_yang_digunakan_dalam_Social_Engineering\"><\/span>Teknik-teknik umum yang digunakan dalam Social Engineering<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Phishing\"><\/span>Phishing<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Penyerang menggunakan email, pesan, atau situs web palsu yang meniru sumber yang sah untuk menipu penerima agar memberikan informasi pribadi, seperti kredensial login, detail kartu kredit, atau bahkan nomor Jaminan Sosial.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Pretexting\"><\/span>Pretexting<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Pretexting adalah proses berbohong untuk mendapatkan akses ke data pribadi atau informasi istimewa lainnya. Misalnya, penipu mungkin menyamar sebagai vendor pihak ketiga, mengatakan bahwa mereka perlu mengetahui nama lengkap dan jabatan Anda untuk memverifikasi identitas Anda.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Baiting\"><\/span>Baiting<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Menawarkan sesuatu yang menarik, seperti unduhan gratis atau kupon, yang, ketika diakses, menginstal perangkat lunak berbahaya pada perangkat korban atau memikat mereka untuk mengungkapkan informasi sensitif.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Quid_Pro_Quo\"><\/span>Quid Pro Quo<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Quid pro quo adalah jenis serangan social engineering yang mengeksploitasi kecenderungan manusia untuk membalas gerakan yang baik.<\/p>\n\n\n\n<p>Misalnya, penyerang dapat memberikan dukungan teknis gratis melalui panggilan telepon ke korban dan kemudian meminta mereka mematikan antivirus mereka untuk mendukung pembaruan sistem yang akan datang. Korban kemudian ditekan untuk berkewajiban membalas bantuan murah hati yang diberikan kepada mereka.<\/p>\n\n\n\n<p>Jika korban sangat akomodatif, penjahat dunia maya akan terus menggunakannya untuk memajukan serangan dunia maya. Mengikuti dari contoh di atas, setelah mematikan semua perangkat lunak antivirus, korban kemudian dapat diminta untuk menginstal trojan masking sebagai &#8220;pembaruan perangkat lunak&#8221;, yang menyebabkan seluruh jaringan jatuh di bawah kendali penjahat dunia maya.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"585\" data-src=\"https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/07\/social-engineering-1-1024x585.webp\" alt=\"\" class=\"wp-image-1898 lazyload\" data-srcset=\"https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/07\/social-engineering-1-1024x585.webp 1024w, https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/07\/social-engineering-1-300x171.webp 300w, https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/07\/social-engineering-1-768x439.webp 768w, https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/07\/social-engineering-1-1536x878.webp 1536w, https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/07\/social-engineering-1.webp 1792w\" data-sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/585;\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Dampak_Serangan_Social_Engineering\"><\/span>Dampak Serangan Social Engineering<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Dampak_terhadap_individu\"><\/span>Dampak terhadap individu.<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Kehilangan Data Pribadi dan Keuangan: Penyerang dapat memperoleh informasi sensitif, seperti nomor kartu kredit atau data pribadi. Korban berisiko kehilangan uang atau mengalami pencurian identitas.<\/li>\n\n\n\n<li>Rusaknya Reputasi: Jika data pribadi bocor, reputasi individu bisa tercemar. Informasi yang disalahgunakan dapat merusak citra dan kepercayaan diri.<\/li>\n\n\n\n<li>Stres dan Kecemasan: Ancaman dan manipulasi dari serangan social engineering dapat menyebabkan stres dan kecemasan pada korban.<\/li>\n\n\n\n<li>Kerugian Finansial: Kehilangan uang atau aset karena penipuan atau pencurian akibat serangan ini.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Dampak_terhadap_perusahaan_dan_organisasi\"><\/span>Dampak terhadap perusahaan dan organisasi.<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Kerugian Finansial: Akses ke informasi keuangan bisa menyebabkan kerugian besar bagi perusahaan. Selain itu, biaya pemulihan data setelah serangan juga dapat mengurangi pasokan uang perusahaan.<\/li>\n\n\n\n<li>Gangguan Operasional: Serangan social engineering dapat mengganggu operasi bisnis sehari-hari. Karyawan yang menjadi korban manipulasi psikologis mungkin tidak dapat bekerja efisien, menghambat produktivitas.<\/li>\n\n\n\n<li>Rusaknya Reputasi Brand: Kepercayaan pelanggan bisa rusak akibat insiden keamanan. Reputasi brand perusahaan dapat tercemar jika data pribadi bocor atau terjadi insiden serius.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cara_Mencegah_dan_Melindungi_Diri_dari_Social_Engineering\"><\/span>Cara Mencegah dan Melindungi Diri dari Social Engineering<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Edukasi_dan_kesadaran_karyawan\"><\/span>Edukasi dan kesadaran karyawan.<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Pastikan Anda memiliki program pelatihan kesadaran keamanan komprehensif yang diperbarui secara berkala untuk mengatasi ancaman phishing umum dan ancaman siber baru yang ditargetkan. Ingat, ini bukan hanya tentang mengklik tautan.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Penggunaan_teknologi_dan_perangkat_lunak_keamanan\"><\/span>Penggunaan teknologi dan perangkat lunak keamanan.<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Menjaga perangkat lunak dan sistem tetap up to date sangat penting, karena social engineering sering mengeksploitasi kerentanan yang diketahui. Pembaruan rutin dan manajemen patch mengurangi potensi.&nbsp; Organisasi menilai praktik keamanan vendor dan mitra pihak ketiga untuk memastikan mereka tidak memperkenalkan kerentanan yang dapat dieksploitasi oleh penyerang.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Prosedur_dan_kebijakan_keamanan_di_perusahaan\"><\/span>Prosedur dan kebijakan keamanan di perusahaan.<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Tambahkan kontrol ekstra, jika perlu. Ingatlah bahwa pemisahan tugas dan perlindungan lainnya dapat dikompromikan di beberapa titik oleh ancaman orang dalam, sehingga tinjauan risiko mungkin perlu dianalisis ulang mengingat meningkatnya ancaman.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Tertarik_Untuk_Menggunakan_VPS_dengan_teknologi_terbaik_dari_Nevacloud\"><\/span>Tertarik Untuk Menggunakan VPS dengan teknologi terbaik dari Nevacloud?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Kasus penggunaan social engineering di dunia nyata menekankan dampaknya yang luas pada individu dan bisnis. Untuk mengatasi ancaman yang terus berkembang ini, perusahaan menumbuhkan budaya kesadaran keamanan, menerapkan langkah-langkah keamanan berlapis-lapis, dan terus menyesuaikan strategi mereka untuk mengurangi risiko yang ditimbulkan oleh social engineering. Pertempuran melawan social engineering menuntut kombinasi teknologi, pendidikan, dan kewaspadaan untuk secara efektif melindungi data sensitif dan menjaga kepercayaan di dunia digital.Terlepas dari itu, jika anda sedang mencari VPS dengan teknologi terbaik, anda dapat menggunakan VPS dari Nevacloud. Tunggu apalagi? kunjungi website <a href=\"https:\/\/nevacloud.com\/\">Nevacloud<\/a> dan temukan beragam penawaran menariknya!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>social engineering adalah seni mengeksploitasi psikologi manusia, bukan teknik peretasan teknis, untuk mendapatkan akses ke bangunan, sistem, atau data. Latih diri Anda untuk melihat tanda-tandanya. Apa Itu Social Engineering? social engineering, dalam konteks keamanan siber, adalah proses menipu orang agar membocorkan informasi pribadi yang dapat berguna dalam serangan siber. Ada banyak jenis serangan social engineering. [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":1897,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-1896","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Apa Itu Social Engineering, Cara Kerja, dan Cara Mencegahnya<\/title>\n<meta name=\"description\" content=\"Pelajari apa itu social engineering dan pengaruhnya terhadap keamanan siber. Jelajahi cara kerja dan cara pencegahannya\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apa Itu Social Engineering, Cara Kerja, dan Cara Mencegahnya\" \/>\n<meta property=\"og:description\" content=\"Pelajari apa itu social engineering dan pengaruhnya terhadap keamanan siber. Jelajahi cara kerja dan cara pencegahannya\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog Nevacloud\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-27T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-19T06:48:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/07\/social-engineering.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1792\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Hiqbal Fauzi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@NevacloudHQ\" \/>\n<meta name=\"twitter:site\" content=\"@NevacloudHQ\" \/>\n<meta name=\"twitter:label1\" content=\"Ditulis oleh\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hiqbal Fauzi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimasi waktu membaca\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 menit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/\"},\"author\":{\"name\":\"Hiqbal Fauzi\",\"@id\":\"https:\/\/nevacloud.com\/blog\/#\/schema\/person\/74bed182425c6117419fa7b5caa51319\"},\"headline\":\"Apa Itu Social Engineering, Cara Kerja, dan Cara Mencegahnya\",\"datePublished\":\"2024-07-27T09:00:00+00:00\",\"dateModified\":\"2024-07-19T06:48:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/\"},\"wordCount\":1096,\"publisher\":{\"@id\":\"https:\/\/nevacloud.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/07\/social-engineering.webp\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"id\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/\",\"url\":\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/\",\"name\":\"Apa Itu Social Engineering, Cara Kerja, dan Cara Mencegahnya\",\"isPartOf\":{\"@id\":\"https:\/\/nevacloud.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/07\/social-engineering.webp\",\"datePublished\":\"2024-07-27T09:00:00+00:00\",\"dateModified\":\"2024-07-19T06:48:20+00:00\",\"description\":\"Pelajari apa itu social engineering dan pengaruhnya terhadap keamanan siber. Jelajahi cara kerja dan cara pencegahannya\",\"breadcrumb\":{\"@id\":\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#breadcrumb\"},\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#primaryimage\",\"url\":\"https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/07\/social-engineering.webp\",\"contentUrl\":\"https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/07\/social-engineering.webp\",\"width\":1792,\"height\":1024,\"caption\":\"social engineering\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/nevacloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apa Itu Social Engineering, Cara Kerja, dan Cara Mencegahnya\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nevacloud.com\/blog\/#website\",\"url\":\"https:\/\/nevacloud.com\/blog\/\",\"name\":\"Blog Nevacloud\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/nevacloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nevacloud.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/nevacloud.com\/blog\/#organization\",\"name\":\"Nevacloud\",\"url\":\"https:\/\/nevacloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\/\/nevacloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/02\/logo.png\",\"contentUrl\":\"https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/02\/logo.png\",\"width\":577,\"height\":500,\"caption\":\"Nevacloud\"},\"image\":{\"@id\":\"https:\/\/nevacloud.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/NevacloudHQ\",\"https:\/\/www.instagram.com\/nevacloud\/\",\"https:\/\/www.linkedin.com\/company\/nevacloud-id\",\"https:\/\/www.youtube.com\/@nevacloud\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/nevacloud.com\/blog\/#\/schema\/person\/74bed182425c6117419fa7b5caa51319\",\"name\":\"Hiqbal Fauzi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\/\/nevacloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8df9e5856c52bc84147aec3930e562bf42265e09affcb49b5be1264db7b4ab55?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8df9e5856c52bc84147aec3930e562bf42265e09affcb49b5be1264db7b4ab55?s=96&d=mm&r=g\",\"caption\":\"Hiqbal Fauzi\"},\"description\":\"As SEO Specialist at Deneva with a bachelor's in animal husbandry, passionate about digital marketing, especially in SEO.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/hiqbalfauzi\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apa Itu Social Engineering, Cara Kerja, dan Cara Mencegahnya","description":"Pelajari apa itu social engineering dan pengaruhnya terhadap keamanan siber. Jelajahi cara kerja dan cara pencegahannya","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/","og_locale":"id_ID","og_type":"article","og_title":"Apa Itu Social Engineering, Cara Kerja, dan Cara Mencegahnya","og_description":"Pelajari apa itu social engineering dan pengaruhnya terhadap keamanan siber. Jelajahi cara kerja dan cara pencegahannya","og_url":"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/","og_site_name":"Blog Nevacloud","article_published_time":"2024-07-27T09:00:00+00:00","article_modified_time":"2024-07-19T06:48:20+00:00","og_image":[{"width":1792,"height":1024,"url":"https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/07\/social-engineering.webp","type":"image\/webp"}],"author":"Hiqbal Fauzi","twitter_card":"summary_large_image","twitter_creator":"@NevacloudHQ","twitter_site":"@NevacloudHQ","twitter_misc":{"Ditulis oleh":"Hiqbal Fauzi","Estimasi waktu membaca":"6 menit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#article","isPartOf":{"@id":"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/"},"author":{"name":"Hiqbal Fauzi","@id":"https:\/\/nevacloud.com\/blog\/#\/schema\/person\/74bed182425c6117419fa7b5caa51319"},"headline":"Apa Itu Social Engineering, Cara Kerja, dan Cara Mencegahnya","datePublished":"2024-07-27T09:00:00+00:00","dateModified":"2024-07-19T06:48:20+00:00","mainEntityOfPage":{"@id":"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/"},"wordCount":1096,"publisher":{"@id":"https:\/\/nevacloud.com\/blog\/#organization"},"image":{"@id":"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/07\/social-engineering.webp","articleSection":["Blog"],"inLanguage":"id"},{"@type":"WebPage","@id":"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/","url":"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/","name":"Apa Itu Social Engineering, Cara Kerja, dan Cara Mencegahnya","isPartOf":{"@id":"https:\/\/nevacloud.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#primaryimage"},"image":{"@id":"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/07\/social-engineering.webp","datePublished":"2024-07-27T09:00:00+00:00","dateModified":"2024-07-19T06:48:20+00:00","description":"Pelajari apa itu social engineering dan pengaruhnya terhadap keamanan siber. Jelajahi cara kerja dan cara pencegahannya","breadcrumb":{"@id":"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#breadcrumb"},"inLanguage":"id","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/"]}]},{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#primaryimage","url":"https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/07\/social-engineering.webp","contentUrl":"https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/07\/social-engineering.webp","width":1792,"height":1024,"caption":"social engineering"},{"@type":"BreadcrumbList","@id":"https:\/\/nevacloud.com\/blog\/apa-itu-social-engineering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nevacloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Apa Itu Social Engineering, Cara Kerja, dan Cara Mencegahnya"}]},{"@type":"WebSite","@id":"https:\/\/nevacloud.com\/blog\/#website","url":"https:\/\/nevacloud.com\/blog\/","name":"Blog Nevacloud","description":"","publisher":{"@id":"https:\/\/nevacloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nevacloud.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id"},{"@type":"Organization","@id":"https:\/\/nevacloud.com\/blog\/#organization","name":"Nevacloud","url":"https:\/\/nevacloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/nevacloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/02\/logo.png","contentUrl":"https:\/\/nevacloud.com\/blog\/wp-content\/uploads\/2024\/02\/logo.png","width":577,"height":500,"caption":"Nevacloud"},"image":{"@id":"https:\/\/nevacloud.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/NevacloudHQ","https:\/\/www.instagram.com\/nevacloud\/","https:\/\/www.linkedin.com\/company\/nevacloud-id","https:\/\/www.youtube.com\/@nevacloud"]},{"@type":"Person","@id":"https:\/\/nevacloud.com\/blog\/#\/schema\/person\/74bed182425c6117419fa7b5caa51319","name":"Hiqbal Fauzi","image":{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/nevacloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8df9e5856c52bc84147aec3930e562bf42265e09affcb49b5be1264db7b4ab55?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8df9e5856c52bc84147aec3930e562bf42265e09affcb49b5be1264db7b4ab55?s=96&d=mm&r=g","caption":"Hiqbal Fauzi"},"description":"As SEO Specialist at Deneva with a bachelor's in animal husbandry, passionate about digital marketing, especially in SEO.","sameAs":["https:\/\/www.linkedin.com\/in\/hiqbalfauzi\/"]}]}},"_links":{"self":[{"href":"https:\/\/nevacloud.com\/blog\/wp-json\/wp\/v2\/posts\/1896","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nevacloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nevacloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nevacloud.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/nevacloud.com\/blog\/wp-json\/wp\/v2\/comments?post=1896"}],"version-history":[{"count":1,"href":"https:\/\/nevacloud.com\/blog\/wp-json\/wp\/v2\/posts\/1896\/revisions"}],"predecessor-version":[{"id":1899,"href":"https:\/\/nevacloud.com\/blog\/wp-json\/wp\/v2\/posts\/1896\/revisions\/1899"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nevacloud.com\/blog\/wp-json\/wp\/v2\/media\/1897"}],"wp:attachment":[{"href":"https:\/\/nevacloud.com\/blog\/wp-json\/wp\/v2\/media?parent=1896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nevacloud.com\/blog\/wp-json\/wp\/v2\/categories?post=1896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nevacloud.com\/blog\/wp-json\/wp\/v2\/tags?post=1896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}