Implementation Strategy Analysis of Network Security using dalo RADIUS and Pi-hole DNS
Server to enhance Computer Network Security, Case Study: XYZ as a Fintech Company
Indonesian Journal of Social Technology, Vol. 5, No. 10, October 2024 4365
for example, in a company engaged in Finance and Technology (Fintech). If an
organization or agency tasked with managing digital assets, such as a financial technology
company, is deemed unreliable, it can undeniably have a deleterious effect on civil
society. According to the annual report by the National Encryption Agency in 2023,
Indonesia had the highest number of cyber-attack sources, with over 147 million attacks,
which has increased quite rapidly compared to the last 3 years. Several online media
platforms have reported incidents of this nature over the past three years (Wardhono et
al., 2023). Fintech companies have a high potential for attacks in terms of information
security. In a Fintech Company, a lot of Sensitive Data (PII) is the main target for a
hacker. They start from the full name, telephone number, and address to the names of the
customer's parents. If the data falls into the hands of a hacker, then that is when the data
is pressed to have leaked. Which in the end will be detrimental to the customer himself
because his data has been misused. Not only companies engaged in Fintech, but other
agencies also engaged in the same field such as insurance agencies, public health
agencies, Freeport, and Startup Companies, all of which store sensitive personal data and
information belonging to the public (Charnade, 2022).
Based on the number of cyber security cases in Indonesia, it is evident that many
agencies are unaware of their security vulnerabilities. Unfortunately, these types of
incidents seem to repeat themselves across different agencies in similar ways, from
phishing attacks to ransomware and data breaches. Human error contributes to these
issues, which can create security loopholes. (Edbert & Putra, 2023) Hackers often target
humans since they're the weakest element of vulnerability in the security chain and prone
to mistakes. A hacker can use various methods to access a victim's computer system by
anticipating their behavior. The most common way is to send a phishing email that
contains a link or an application installer with a .apk extension. When the link is clicked,
it gives the hacker unauthorized access to the victim's computer, and eventually, they can
gain access to the whole company network.
The presence of security vulnerabilities in a network can potentially lead to data
leaks and network attacks by malware. These vulnerabilities often stem from user
ignorance, such as when users download files from advertisements found on unofficial or
even illegal websites, including pornographic sites. To address this issue, the Ministry of
Communication and Information in Indonesia has introduced the Constitution of the
Minister of Communication and Information Number 19 of 2014, which outlines
measures for dealing with negatively charged internet sites. (Ramdhan et al., 2024).
According to Chapter 1 Article 1 of the regulation, negative content can be blocked. This
includes pornography, which is mentioned in Chapter 3 Article 4 paragraph 1 point as a
form of negative content. This regulation serves as the basis for closing any security
loopholes that may pose a threat to network security, particularly for Fintech Companies.
One effective measure is to block access to pornographic content, as it is known to contain
numerous vulnerabilities that can compromise network security.
Every organization has its own set of policies and procedures regarding employee
access to the Internet network. These access rights policies aim to safeguard the network's