{"id":128,"date":"2020-11-13T09:39:14","date_gmt":"2020-11-13T09:39:14","guid":{"rendered":"https:\/\/www.goldenfast.net\/blog\/?p=128"},"modified":"2024-01-03T15:06:13","modified_gmt":"2024-01-03T08:06:13","slug":"social-engineering-adalah","status":"publish","type":"post","link":"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/","title":{"rendered":"Kenali Bahaya Social Engineering Serta Cara Mencegahnya"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Masih ingat dengan kasus kebocoran <\/span><span style=\"font-weight: 400;\">3 miliar<\/span><span style=\"font-weight: 400;\"> akun email <a href=\"https:\/\/id.yahoo.com\/\" target=\"_blank\" rel=\"noopener\">Yahoo<\/a> pada 2013 lalu? Tahukah Anda jika kebocoran data perusahaan IT raksasa tersebut ternyata disebabkan oleh serangan social engineering melalui <\/span><a href=\"https:\/\/www.goldenfast.net\/blog\/phishing-adalah\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">spear phishing<\/span><\/a><span style=\"font-weight: 400;\"> email.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Kabar buruknya, social engineering attack bisa menyerang siapa saja, termasuk Anda. Oleh karena itu, yuk pelajari lebih lanjut apa itu social engineering! <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Semoga dengan memahaminya, Anda dapat terhindar dari segala percobaan serangan ini, dan mencegah terjadinya kebocoran data perusahaan Anda maupun segala ancaman kerugian lainnya. Selamat membaca!\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_83 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Daftar isi :<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-6a00ac9d6cb0b\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-6a00ac9d6cb0b\" checked aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#Apa_Itu_Social_Engineering\" >Apa Itu Social Engineering?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#Mengenal_Tipe-Tipe_Serangan_Social_Engineering\" >Mengenal Tipe-Tipe Serangan Social Engineering<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#1_Phishing\" >1. Phishing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#2_Baiting\" >2. Baiting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#3_Pretexting\" >3. Pretexting<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#4_Quid_Pro_Quo\" >4. Quid Pro Quo<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#5_Tailgating\" >5. Tailgating<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#6_Scareware\" >6. Scareware<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#Tips_Mencegah_Serangan_Social_Engineering\" >Tips Mencegah Serangan Social Engineering<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#1_Tingkatkan_Kesadaran_Akan_Bahaya_Social_Engineering\" >1. Tingkatkan Kesadaran Akan Bahaya Social Engineering<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#2_Manfaatkan_Layanan_Email_Terbaik\" >2. Manfaatkan Layanan Email Terbaik<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#3_Jangan_Ragu_untuk_Mengecek_Ulang_Riset_dan_Konfirmasi\" >3. Jangan Ragu untuk Mengecek Ulang, Riset, dan Konfirmasi<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#4_Gunakan_Multi-Factor_Authentication\" >4. Gunakan Multi-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#5_Amankan_Perangkat_Anda\" >5. Amankan Perangkat Anda<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#Kesimpulan\" >Kesimpulan<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Apa_Itu_Social_Engineering\"><\/span><strong>Apa Itu Social Engineering?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Social engineering merujuk kepada tindakan hackers memanipulasi korban agar bersedia memberikan informasi personal maupun akses terhadap perangkatnya. Informasi yang ingin attackers dapatkan dari serangan ini bisa bermacam-macam. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Namun pada umumnya, mereka menargetkan data akun (berupa username serta password) dan detail informasi kartu bank Anda.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Untuk melancarkan serangannya, pelaku akan berinteraksi dengan sang korban (baik secara online maupun langsung), kemudian mengeksploitasi aspek psikologisnya. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dalam hal ini, hackers memahami bahwa ketika seseorang berada dalam kondisi emosional tertentu (seperti takut, marah, sedih, dan bahkan gembira), ia dapat melakukan tindakan yang tidak masuk akal atau berbahaya sekalipun.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sebagai contoh, pelaku menyamar sebagai petugas pajak yang sedang melakukan investigasi terhadap kasus penipuan pajak yang melibatkan Anda. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Karena merasa ketakutan dan cemas akan tuduhan tersebut, Anda kemungkinan besar akan mengikuti instruksi yang diberikan sang pelaku dan memberikan data sensitif Anda.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Pada dasarnya, siklus serangan social engineering terjadi dalam empat fase, yakni:<\/span><\/p>\n<ul>\n<li><b>Investigation<\/b><span style=\"font-weight: 400;\">\u2014pelaku mengidentifikasi dan mengumpulkan detail informasi mengenai korban, kemudian menentukan metode serangan yang akan dilancarkan;\u00a0\u00a0<\/span><\/li>\n<li><b>Infiltration<\/b><span style=\"font-weight: 400;\">\u2014hackers mulai berinteraksi dengan korban dan mencoba membangun rasa percaya mereka;<\/span><\/li>\n<li><b>Exploitation<\/b><span style=\"font-weight: 400;\">\u2014attackers melancarkan serangan dan mengumpulkan data sensitif dari korban atau mengakses perangkat mereka;<\/span><\/li>\n<li><b>Disengagement<\/b><span style=\"font-weight: 400;\">\u2014pelaku mengakhiri interaksi tanpa menimbulkan kecurigaan dari korban.<\/span><b>\u00a0<\/b><\/li>\n<\/ul>\n<p><strong>Baca Juga: <a href=\"https:\/\/www.goldenfast.net\/blog\/ddos-adalah\/\" target=\"_blank\" rel=\"noopener noreferrer\">DDoS Attack: Pengertian, Tipe, dan Cara Mencegahnya<\/a>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/strong><\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-129 aligncenter\" src=\"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/kenali-bahaya-social-engineering-serta-cara-ampuh-mencegahnya.jpg\" alt=\"Kenali Bahaya Social Engineering Serta Cara Ampuh Mencegahnya\" width=\"960\" height=\"420\" srcset=\"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/kenali-bahaya-social-engineering-serta-cara-ampuh-mencegahnya.jpg 960w, https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/kenali-bahaya-social-engineering-serta-cara-ampuh-mencegahnya-300x131.jpg 300w, https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/kenali-bahaya-social-engineering-serta-cara-ampuh-mencegahnya-768x336.jpg 768w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Mengenal_Tipe-Tipe_Serangan_Social_Engineering\"><\/span><strong>Mengenal Tipe-Tipe Serangan Social Engineering<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Sekarang, mari kenali apa saja tipe serangan yang termasuk ke dalam social engineering. Beberapa diantaranya adalah:<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"1_Phishing\"><\/span><strong>1. Phishing<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Dalam phishing attack, hackers akan menyamar sebagai individu atau institusi terpercaya dan mendorong Anda untuk mengungkapkan data personal Anda. Tipe serangan phishing bisa bermacam-macam; mulai dari spear phishing, whaling, vishing, serta beberapa tipe lainnya.\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"2_Baiting\"><\/span><strong>2. Baiting<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Baiting adalah tindakan hackers memanfaatkan rasa penasaran atau keserakahan seseorang. Biasanya, pelaku akan mengiming-imingi hadiah seperti film atau lagu gratis jika korban bersedia log in menggunakan informasi akunnya.\u00a0\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"3_Pretexting\"><\/span><strong>3. Pretexting<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Untuk melancarkan serangan pretext, pelaku akan menggunakan identitas palsu (seperti berpura-pura menjadi rekan kerja), kemudian membuat pretext atau dalih yang menarik dan meyakinkan Anda. Jika kepercayaan telah tebangun, attackers akan mulai mendorong Anda untuk memberikan data sensitif Anda.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"4_Quid_Pro_Quo\"><\/span><strong>4. Quid Pro Quo<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Quid pro quo sebenarnya hampir mirip dengan baiting. Bedanya, jika baiting banyak menawarkan hadiah berupa barang, quid pro quo menjanjikan suatu layanan sebagai imbalan dari memberikan data personal. Sebagai contoh, pelaku akan menyamar sebagai tenaga ahli IT yang akan menawarkan Anda bantuan teknis dengan syarat mengisikan informasi personal.\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"5_Tailgating\"><\/span><strong>5. Tailgating<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Tailgating, atau dikenal juga dengan piggybacking, merujuk kepada aksi attackers untuk menyusup ke area terlarang di sebuah gedung. Misalnya, pelaku menyamar sebagai seorang kurir yang akan mengantarkan barang. Mereka lalu memanfaatkan seorang staf yang mempunyai akses ke dalam gedung untuk memperbolehkan mereka masuk ke area terlarang tersebut.\u00a0\u00a0\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"6_Scareware\"><\/span><strong>6. Scareware<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Dengan scareware, hackers akan membuat korban berpikir bahwa perangkatnya terkena <\/span><a href=\"https:\/\/www.goldenfast.net\/blog\/malware-adalah\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">malware<\/span><\/a><span style=\"font-weight: 400;\">. Untuk melancarkan serangannya, attacker akan memunculkan notifikasi palsu di perangkat korban sehingga membuat mereka panik, kemudian mengarahkan mereka memasang software tertentu (yang tentunya berbahaya atau telah disisipi <\/span><span style=\"font-weight: 400;\">malware<\/span><span style=\"font-weight: 400;\">).\u00a0<\/span><\/p>\n<p><strong>Baca Juga: <a href=\"https:\/\/www.goldenfast.net\/blog\/colocation-server\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apa Itu Colocation Server? Pengertian, Kelebihan & Kekurangannya<\/a>\u00a0\u00a0<\/strong><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Tips_Mencegah_Serangan_Social_Engineering\"><\/span><strong>Tips Mencegah Serangan Social Engineering<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Selanjutnya, mari kita ulas beberapa cara ampuh mencegah serangan social engineering.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"1_Tingkatkan_Kesadaran_Akan_Bahaya_Social_Engineering\"><\/span><strong>1. Tingkatkan Kesadaran Akan Bahaya Social Engineering<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Semua orang dapat menjadi target dari social engineering attack; termasuk Anda, perusahaan Anda, maupun pegawai Anda. Oleh karena itu, selalu pastikan bahwa semua lini di perusahaan telah memahami secara mendalam segala jenis dan teknik serangan social engineering. \u00a0 \u00a0 <\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"2_Manfaatkan_Layanan_Email_Terbaik\"><\/span><strong>2. Manfaatkan Layanan Email Terbaik<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Anda juga dapat memanfaatkan layanan email marketing yang dibekali dengan authentication protocols mumpuni. Fitur ini dapat membantu Anda menangkal serangan spam, phishing, <\/span><a href=\"https:\/\/www.goldenfast.net\/blog\/apa-itu-spoofing\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">spoofing<\/span><\/a><span style=\"font-weight: 400;\">, malware, serta mampu mengidentifikasi identitas pengirim yang mencurigakan.\u00a0\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"3_Jangan_Ragu_untuk_Mengecek_Ulang_Riset_dan_Konfirmasi\"><\/span><strong>3. Jangan Ragu untuk Mengecek Ulang, Riset, dan Konfirmasi<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Jangan langsung terkecoh ketika mendapatkan penawaran yang menggiurkan. Cek dan riset terlebih dahulu siapa pengirim\/pihak yang menawarkan hadiah tersebut. Jika pelaku mengatasnamakan suatu layanan, Anda juga dapat mengkonfirmasikan kebenaran informasi tersebut secara langsung kepada kontak resmi (yang biasanya tersedia di website perusahaan).\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"4_Gunakan_Multi-Factor_Authentication\"><\/span><strong>4. Gunakan Multi-Factor Authentication<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Dengan multi-factor authentication, akun Anda akan dibekali dengan layer keamanan tambahan untuk mengamankan data dan privasi Anda. Attackers juga akan kesulitan membuka akun Anda karena diharuskan menyelesaikan mekanisme autentikasi ganda seperti memindai sidik jari, memasukan kode rahasia, atau berbagai metode lainnya.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"5_Amankan_Perangkat_Anda\"><\/span><strong>5. Amankan Perangkat Anda<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Ingat, pelaku social engineering juga tak jarang menginginkan akses terhadap perangkat Anda. Oleh sebab itu, bekali perangkat Anda dengan software keamanan seperti antivirus, <\/span><a href=\"https:\/\/www.goldenfast.net\/blog\/apa-itu-firewall\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">firewalls<\/span><\/a><span style=\"font-weight: 400;\">, hingga <\/span><span style=\"font-weight: 400;\">VPN<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tak kalah pentingnya, Anda juga harus selalu memperbarui versi sistem operasi dan aplikasi Anda. Pasalnya, software terbaru membawa security patches\/updates yang bisa melindungi perangkat Anda dari segala serangan hackers.\u00a0<\/span><\/p>\n<p><strong>Baca Juga: <a href=\"https:\/\/www.goldenfast.net\/blog\/dedicated-server-adalah\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kenali Apa Itu Dedicated Server, Kelebihan, dan Kekurangannya<\/a>\u00a0\u00a0\u00a0\u00a0<\/strong><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Kesimpulan\"><\/span><span style=\"font-weight: 400;\">Kesimpulan<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Dalam artikel ini, Anda telah memahami banyak hal mengenai <a href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/\" rel=\"\">social engineering<\/a>; mulai dari pengertian, siklus, tipe, hingga tips mencegahnya. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Perlu diingat, social engineering dapat mengancam siapa saja, baik secara online maupun offline. Dan cara terbaiknya untuk mencegahnya adalah dengan mengedukasi diri Anda secara terus menerus mengenai pola dan teknik serangan yang digunakan oleh attackers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Selain itu, jika Anda adalah seorang webmaster, pastikan juga kalau layanan web <\/span><span style=\"font-weight: 400;\">hosting<\/span><span style=\"font-weight: 400;\">\/server yang Anda gunakan mempunyai fitur dan fasilitas keamanan untuk mencegah serangan social engineering.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sebagai rekomendasi, Anda bisa menggunakan layanan <\/span><strong>dedicated server<\/strong><span style=\"font-weight: 400;\">, <\/span><strong>colocation server<\/strong><span style=\"font-weight: 400;\"><strong>,<\/strong> maupun <\/span><span style=\"font-weight: 400;\"><b>Cloud VPS Server <\/b>d<\/span><span style=\"font-weight: 400;\">ari <strong>GoldenFast Network<\/strong>. Seluruh opsi server tersebut didukung dengan fasilitas 24\/4 monitoring, 24\/7 customer service, hardware kelas enterprise, UPS backup, dan berbagai fitur\/fasilitas keamanan terbaik lainnya.\u00a0 <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Masih ingat dengan kasus kebocoran 3 miliar akun email Yahoo pada 2013 lalu? Tahukah Anda jika kebocoran data perusahaan IT raksasa tersebut ternyata disebabkan oleh serangan social engineering melalui spear phishing email.\u00a0 Kabar buruknya, social engineering attack bisa menyerang siapa saja, termasuk Anda. Oleh karena itu, yuk pelajari lebih lanjut apa itu social engineering! Semoga [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":129,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,71],"tags":[138,142,137,135,139,136,140,141],"class_list":["post-128","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-glossary","category-security","tag-apa-itu-social-engineering","tag-cara-mencegah-social-engineering","tag-pengertian-social-engineering","tag-social-engineering","tag-social-engineering-adalah","tag-social-engineering-attack","tag-tipe-social-engineering","tag-tips-mencegah-social-engineering"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kenali Bahaya Social Engineering Serta Cara Mencegahnya<\/title>\n<meta name=\"description\" content=\"Mari pahami apa itu social engineering attack dan bahayanya bagi bisnis Anda. Kenali juga tipe-tipe social engineering dan cara mencegahnya.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kenali Bahaya Social Engineering Serta Cara Mencegahnya\" \/>\n<meta property=\"og:description\" content=\"Mari pahami apa itu social engineering attack dan bahayanya bagi bisnis Anda. Kenali juga tipe-tipe social engineering dan cara mencegahnya.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/\" \/>\n<meta property=\"og:site_name\" content=\"GFN Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-13T09:39:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-03T08:06:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/kenali-bahaya-social-engineering-serta-cara-ampuh-mencegahnya.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"420\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Amera P. Safira\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amera P. Safira\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/social-engineering-adalah\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/social-engineering-adalah\\\/\"},\"author\":{\"name\":\"Amera P. Safira\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#\\\/schema\\\/person\\\/c916afa27bf5efd317c18ac835b33dff\"},\"headline\":\"Kenali Bahaya Social Engineering Serta Cara Mencegahnya\",\"datePublished\":\"2020-11-13T09:39:14+00:00\",\"dateModified\":\"2024-01-03T08:06:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/social-engineering-adalah\\\/\"},\"wordCount\":946,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/social-engineering-adalah\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/kenali-bahaya-social-engineering-serta-cara-ampuh-mencegahnya.jpg\",\"keywords\":[\"apa itu social engineering\",\"cara mencegah social engineering\",\"pengertian social engineering\",\"social engineering\",\"social engineering adalah\",\"social engineering attack\",\"tipe social engineering\",\"tips mencegah social engineering\"],\"articleSection\":[\"Glossary\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/social-engineering-adalah\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/social-engineering-adalah\\\/\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/social-engineering-adalah\\\/\",\"name\":\"Kenali Bahaya Social Engineering Serta Cara Mencegahnya\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/social-engineering-adalah\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/social-engineering-adalah\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/kenali-bahaya-social-engineering-serta-cara-ampuh-mencegahnya.jpg\",\"datePublished\":\"2020-11-13T09:39:14+00:00\",\"dateModified\":\"2024-01-03T08:06:13+00:00\",\"description\":\"Mari pahami apa itu social engineering attack dan bahayanya bagi bisnis Anda. Kenali juga tipe-tipe social engineering dan cara mencegahnya.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/social-engineering-adalah\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/social-engineering-adalah\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/social-engineering-adalah\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/kenali-bahaya-social-engineering-serta-cara-ampuh-mencegahnya.jpg\",\"contentUrl\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/kenali-bahaya-social-engineering-serta-cara-ampuh-mencegahnya.jpg\",\"width\":960,\"height\":420,\"caption\":\"Kenali Bahaya Social Engineering Serta Cara Ampuh Mencegahnya\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/social-engineering-adalah\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kenali Bahaya Social Engineering Serta Cara Mencegahnya\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/\",\"name\":\"GFN Blog\",\"description\":\"Blog | GoldenFast Network\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#organization\",\"name\":\"Goldenfast Network\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logogoldenfast.png\",\"contentUrl\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logogoldenfast.png\",\"width\":232,\"height\":80,\"caption\":\"Goldenfast Network\"},\"image\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#\\\/schema\\\/person\\\/c916afa27bf5efd317c18ac835b33dff\",\"name\":\"Amera P. Safira\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g\",\"caption\":\"Amera P. Safira\"},\"description\":\"With a newfound love of the IT world, Amera likes to turn complex topics into easy-to-read and comprehensive articles. In her spare times, Amera enjoys playing video games and reading every book she can find.\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/author\\\/amera-p-safira\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kenali Bahaya Social Engineering Serta Cara Mencegahnya","description":"Mari pahami apa itu social engineering attack dan bahayanya bagi bisnis Anda. Kenali juga tipe-tipe social engineering dan cara mencegahnya.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/","og_locale":"en_US","og_type":"article","og_title":"Kenali Bahaya Social Engineering Serta Cara Mencegahnya","og_description":"Mari pahami apa itu social engineering attack dan bahayanya bagi bisnis Anda. Kenali juga tipe-tipe social engineering dan cara mencegahnya.","og_url":"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/","og_site_name":"GFN Blog","article_published_time":"2020-11-13T09:39:14+00:00","article_modified_time":"2024-01-03T08:06:13+00:00","og_image":[{"width":960,"height":420,"url":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/kenali-bahaya-social-engineering-serta-cara-ampuh-mencegahnya.jpg","type":"image\/jpeg"}],"author":"Amera P. Safira","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Amera P. Safira","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#article","isPartOf":{"@id":"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/"},"author":{"name":"Amera P. Safira","@id":"https:\/\/www.goldenfast.net\/blog\/#\/schema\/person\/c916afa27bf5efd317c18ac835b33dff"},"headline":"Kenali Bahaya Social Engineering Serta Cara Mencegahnya","datePublished":"2020-11-13T09:39:14+00:00","dateModified":"2024-01-03T08:06:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/"},"wordCount":946,"commentCount":0,"publisher":{"@id":"https:\/\/www.goldenfast.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#primaryimage"},"thumbnailUrl":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/kenali-bahaya-social-engineering-serta-cara-ampuh-mencegahnya.jpg","keywords":["apa itu social engineering","cara mencegah social engineering","pengertian social engineering","social engineering","social engineering adalah","social engineering attack","tipe social engineering","tips mencegah social engineering"],"articleSection":["Glossary","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/","url":"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/","name":"Kenali Bahaya Social Engineering Serta Cara Mencegahnya","isPartOf":{"@id":"https:\/\/www.goldenfast.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#primaryimage"},"image":{"@id":"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#primaryimage"},"thumbnailUrl":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/kenali-bahaya-social-engineering-serta-cara-ampuh-mencegahnya.jpg","datePublished":"2020-11-13T09:39:14+00:00","dateModified":"2024-01-03T08:06:13+00:00","description":"Mari pahami apa itu social engineering attack dan bahayanya bagi bisnis Anda. Kenali juga tipe-tipe social engineering dan cara mencegahnya.","breadcrumb":{"@id":"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#primaryimage","url":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/kenali-bahaya-social-engineering-serta-cara-ampuh-mencegahnya.jpg","contentUrl":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/kenali-bahaya-social-engineering-serta-cara-ampuh-mencegahnya.jpg","width":960,"height":420,"caption":"Kenali Bahaya Social Engineering Serta Cara Ampuh Mencegahnya"},{"@type":"BreadcrumbList","@id":"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.goldenfast.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Kenali Bahaya Social Engineering Serta Cara Mencegahnya"}]},{"@type":"WebSite","@id":"https:\/\/www.goldenfast.net\/blog\/#website","url":"https:\/\/www.goldenfast.net\/blog\/","name":"GFN Blog","description":"Blog | GoldenFast Network","publisher":{"@id":"https:\/\/www.goldenfast.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.goldenfast.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.goldenfast.net\/blog\/#organization","name":"Goldenfast Network","url":"https:\/\/www.goldenfast.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.goldenfast.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2021\/04\/logogoldenfast.png","contentUrl":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2021\/04\/logogoldenfast.png","width":232,"height":80,"caption":"Goldenfast Network"},"image":{"@id":"https:\/\/www.goldenfast.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.goldenfast.net\/blog\/#\/schema\/person\/c916afa27bf5efd317c18ac835b33dff","name":"Amera P. Safira","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g","caption":"Amera P. Safira"},"description":"With a newfound love of the IT world, Amera likes to turn complex topics into easy-to-read and comprehensive articles. In her spare times, Amera enjoys playing video games and reading every book she can find.","url":"https:\/\/www.goldenfast.net\/blog\/author\/amera-p-safira\/"}]}},"_links":{"self":[{"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/posts\/128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/comments?post=128"}],"version-history":[{"count":6,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/posts\/128\/revisions"}],"predecessor-version":[{"id":3305,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/posts\/128\/revisions\/3305"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/media\/129"}],"wp:attachment":[{"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/media?parent=128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/categories?post=128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/tags?post=128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}