{"id":132,"date":"2020-11-19T09:08:46","date_gmt":"2020-11-19T09:08:46","guid":{"rendered":"https:\/\/www.goldenfast.net\/blog\/?p=132"},"modified":"2024-01-03T15:05:31","modified_gmt":"2024-01-03T08:05:31","slug":"cybercrime-adalah","status":"publish","type":"post","link":"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/","title":{"rendered":"Cybercrime: Pengertian, Tipe, dan Langkah Mencegahnya\u00a0"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Siapa saja dapat menjadi target dari ancaman cybercrime; baik itu individu, perusahaan, maupun pemerintah. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tidak tanggung-tanggung, perusahaan teknologi ternama sekelas <a href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Google<\/a>, <a href=\"https:\/\/id.yahoo.com\/\" target=\"_blank\" rel=\"noopener\">Yahoo<\/a>, dan <a href=\"https:\/\/www.apple.com\/id\/\" target=\"_blank\" rel=\"noopener\">Apple<\/a> pun pernah menjadi korban berbagai serangan siber, lho!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yuk pahami lebih dalam apa itu cybercrime, dampak, serta beberapa kategori dan tipenya. Semoga dengan memahaminya, <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Anda dapat semakin mengerti bahayanya ancaman ini bagi perangkat atau jaringan Anda, kemudian mampu melakukan segala tindakan pencegahan agar bisa selalu terlindungi saat menggunakan internet.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Selamat membaca!<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_83 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Daftar isi :<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-6a009b82be6dd\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-6a009b82be6dd\" checked aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#Apa_Itu_Cybercrime\" >Apa Itu Cybercrime?<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#Dampak_Negatif_Cybercrime\" >Dampak Negatif Cybercrime<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#1_Kerugian_Finansial\" >1. Kerugian Finansial<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#2_Merusak_Reputasi\" >2. Merusak Reputasi<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#3_Hilangnya_Data_Penting\" >3. Hilangnya Data Penting<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#Tipe_dan_Kategori_Cybercrime\" >Tipe dan Kategori Cybercrime<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#1_Identity_Theft\" >1. Identity Theft<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#2_Hacking\" >2. Hacking<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#3_PUPs_Potentially_Unwanted_Programs\" >3. PUPs (Potentially Unwanted Programs)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#4_Illegal_Content\" >4. Illegal Content<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#5_Cyberstalking\" >5. Cyberstalking<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#Lindungi_Diri_Anda_dari_Ancaman_Cybercrime\" >Lindungi Diri Anda dari Ancaman Cybercrime!<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Apa_Itu_Cybercrime\"><\/span><strong>Apa Itu Cybercrime?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Cybercrime adalah tindakan kriminal yang dilakukan oleh cybercriminals, hackers, atau cybercrooks melalui internet, dan menyasar komputer personal, jaringan, maupun perangkat dalam jaringan.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Aksi ilegal ini bisa dijalankan oleh individu maupun kelompok yang terorganisir. Beberapa cybercriminals bahkan merupakan kelompok yang sangat profesional, mempunyai technical skills yang mumpuni, dan mampu menggunakan pola serangan yang canggih.\u00a0\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ada beberapa motif yang biasanya mendasari aksi cybercrime ini, diantaranya meliputi:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Memperoleh sejumlah uang; baik dengan memeras korban secara langsung maupun dengan menjual data yang berhasil mereka curi ke pihak tertentu;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Merusak atau melumpuhkan perangkat maupun jaringan korban. Bisa jadi, pelaku ingin menyabotase kompetitornya agar bisa memenangkan persaingan bisnis;\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Tak jarang, hackers adalah bagian dari kelompok politik atau dikontrak oleh pihak peserta pemilihan umum untuk memanipulasi hasil pemungutan suara atau melakukan aksi lainnya demi mencapai tujuan politis;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Terkadang, cybercrooks menantang dirinya untuk bisa menembus keamanan digital perusahaan atau institusi tertentu. Atau, mereka ingin mendapatkan status atau pengakuan karena berhasil menembus sistem keamanan siber yang kuat;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Tak bisa dipungkiri, cybercrime seringkali juga merupakan bagian yang tak terpisahkan dari cyberwar\/cyberwarfare antara satu negara dengan negara lain.\u00a0<\/span><\/li>\n<\/ul>\n<p><strong>Baca Juga: <a href=\"https:\/\/www.goldenfast.net\/blog\/social-engineering-adalah\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kenali Bahaya Social Engineering Serta Cara Ampuh Mencegahnya<\/a>\u00a0\u00a0\u00a0<\/strong><\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-133 aligncenter\" src=\"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/cybercrime-pengertian-tipe-dan-langkah-mencegahnya.jpg\" alt=\"Cybercrime Pengertian, Tipe, dan Langkah Mencegahnya\" width=\"960\" height=\"420\" srcset=\"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/cybercrime-pengertian-tipe-dan-langkah-mencegahnya.jpg 960w, https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/cybercrime-pengertian-tipe-dan-langkah-mencegahnya-300x131.jpg 300w, https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/cybercrime-pengertian-tipe-dan-langkah-mencegahnya-768x336.jpg 768w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Dampak_Negatif_Cybercrime\"><\/span><strong>Dampak Negatif Cybercrime<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Cybercrime dapat menyebabkan pengaruh buruk kepada pihak yang menjadi korban. Beberapa diantaranya adalah:\u00a0<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"1_Kerugian_Finansial\"><\/span><strong>1. Kerugian Finansial<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">McAfee, dalam laporannya bertajuk <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/executive-summaries\/es-economic-impact-cybercrime.pdf\" target=\"_blank\" rel=\"noopener\">\u201cThe Economic Impact of Cybercrime\u2014No Slowing Down\u201d,<\/a> merilis bahwa cybercrime telah menyebabkan kerugian hingga <\/span><span style=\"font-weight: 400;\">$600 miliar<\/span><span style=\"font-weight: 400;\"> (USD) di seluruh dunia. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dalam laporan tersebut juga disebutkan bahwa cybercrime adalah ancaman terbesar ketiga bagi ekonomi dunia setelah korupsi dan narkotika.\u00a0<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"2_Merusak_Reputasi\"><\/span><strong>2. Merusak Reputasi<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Cybercrime dapat berakibat kepada hilangnya kepercayaan customers, investor, maupun perusahaan lain kepada suatu brand. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Pada akhirnya, korban akan kesulitan mendapatkan pelanggan baru dan mengalami kerugian finansial yang tidak sedikit.\u00a0\u00a0<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"3_Hilangnya_Data_Penting\"><\/span>3. Hilangnya Data Penting<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Tak diragukan, cybercrime adalah ancaman besar bagi keamanan data perusahaan dan pelanggan. Kabar buruknya, customers dapat menuntut Anda atas hilangnya atau bocornya data tersebut.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"> Tak hanya itu, Anda juga dapat dikenakan denda dan hukuman dari otoritas terkait.<\/span><\/p>\n<p><strong>Baca Juga: <a href=\"https:\/\/www.goldenfast.net\/blog\/apa-itu-spoofing\/\" target=\"_blank\" rel=\"noopener noreferrer\">Spoofing: Pengertian, Tipe, dan Cara Mencegahnya<\/a><\/strong><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Tipe_dan_Kategori_Cybercrime\"><\/span><strong>Tipe dan Kategori Cybercrime<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Merujuk kepada the U.S. Department of Justice (DOJ), cybercrime dibagi ke dalam tiga kategori, yakni:\u00a0<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Pertama, komputer sebagai objek cybercrime. Dalam kategori ini, cybercriminals akan menginfeksi perangkat target dengan <\/span><a href=\"https:\/\/www.goldenfast.net\/blog\/malware-adalah\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">malware<\/span><\/a><span style=\"font-weight: 400;\"> untuk melumpuhkannya atau mencuri data.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Kedua, komputer sebagai subjek cybercrime. Di sini, pelaku akan mengubah perangkat target (pengguna lain) menjadi subjek untuk melakukan cybercrime, misalnya untuk melancarkan <\/span><a href=\"https:\/\/www.goldenfast.net\/blog\/ddos-adalah\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">DDoS attack<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Ketiga, komputer sebagai instrumen atau alat untuk melakukan kejahatan. Misalnya, hackers menggunakan komputer untuk menyimpan data hasil curian atau data ilegal lainnya.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Adapun beberapa tipe cybercrime adalah sebagai berikut:\u00a0<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"1_Identity_Theft\"><\/span><strong>1. Identity Theft<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Identity theft adalah tindakan cybercriminal mengakses data sensitif Anda.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"> Sebagai contoh, pelaku mencuri informasi kartu kredit Anda, lalu menggunakannya untuk melakukan transaksi tertentu. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dalam kasus lain, pelaku juga akan menjual data personal Anda melalui internet.\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"2_Hacking\"><\/span><strong>2. Hacking<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Hacking merujuk kepada aksi hackers mengakses perangkat Anda tanpa sepengetahuan atau izin dari Anda. Setelah berhasil masuk ke sistem atau jaringan Anda, pelaku lalu akan melakukan berbagai tindakan kriminal lain.<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"3_PUPs_Potentially_Unwanted_Programs\"><\/span><strong>3. PUPs (Potentially Unwanted Programs)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Suatu waktu, Anda menginstal suatu aplikasi\/software yang diunduh dari internet. Namun ternyata, Anda menemukan kalau ada beberapa program yang tidak diinginkan juga ikut terinstal. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Program-program tambahan itulah yang disebut dengan PUPs. Bahayanya, PUPs bisa saja berupa spyware atau adware yang sangat berbahaya.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"4_Illegal_Content\"><\/span><strong>4. Illegal Content<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Membagikan konten ilegal di internet juga termasuk ke dalam cybercrime.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"> Beberapa contoh konten ilegal meliputi pornografi, terorisme, tindakan kekerasan atau kejahatan, pelecehan anak, hoax, serta jenis konten lainnya yang melanggar hukum, menyalahi norma, dan mengganggu ketertiban umum.\u00a0\u00a0\u00a0<\/span><\/p>\n<h4><span class=\"ez-toc-section\" id=\"5_Cyberstalking\"><\/span><strong>5. Cyberstalking<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Cyberstalking (atau online stalking) adalah tindakan cybercriminals melecehkan, mengintimidasi, maupun menakut-nakuti korbannya dengan cara memantau aktivitasnya di internet. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Selain itu, cyberstalking juga mencakup aksi pelaku membuat tuduhan palsu, mengancam, menghina, atau mengganggu korban melalui sosial media, email, maupun forum tertentu.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Selain kelima hal tadi, beberapa jenis kejahatan lain seperti <\/span><a href=\"https:\/\/www.goldenfast.net\/blog\/phishing-adalah\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">phishing<\/span><\/a><span style=\"font-weight: 400;\">, cyberextortion, cryptojacking, dan software piracy juga termasuk ke dalam tipe cybercrime.<\/span><\/p>\n<p><strong>Baca Juga: <a href=\"https:\/\/www.goldenfast.net\/blog\/ransomware-adalah\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kenali Apa Itu Serangan Ransomware dan Cara Tepat Mencegahnya<\/a>\u00a0\u00a0\u00a0<\/strong><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Lindungi_Diri_Anda_dari_Ancaman_Cybercrime\"><\/span><strong>Lindungi Diri Anda dari Ancaman Cybercrime!<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Setelah mempelajari <a href=\"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/\" rel=\"\">apa itu cybercrime<\/a> serta dampak negatifnya, Anda sekarang tentu semakin memahami betapa pentingnya melindungi perangkat dan data Anda dari segala ancaman tersebut.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Meskipun upaya menghapuskan seluruh serangan cybercrime cukup sulit dan bisa dikatakan tidak memungkinkan, Anda setidaknya bisa melakukan tindakan pencegahan sebagai berikut:\u00a0\u00a0\u00a0<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Jangan pernah mengunduh file atau program apapun dari situs yang tidak terpercaya;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Hindari mengklik link atau mengunduh attachment yang diterima dari pengirim yang mencurigakan;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Gunakan kata sandi yang kuat. Anda bisa memanfaatkan password manager tool yang didukung dengan password generator\u2014yaitu sebuah fitur yang bisa membantu Anda membuat kata sandi yang unik dan kuat untuk setiap akun;\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Maksimalkan two-factor authentication (2FA) untuk membekali akun Anda dengan layer keamanan berlapis;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Bekali sistem dan jaringan Anda dengan security patches dan update software terbaru;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Backup data Anda secara reguler untuk mencegah hilang maupun rusaknya data Anda;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Selalu berhati-hati ketika menggunakan Wifi publik. Ada baiknya Anda menggunakan <\/span><span style=\"font-weight: 400;\">VPN<\/span><span style=\"font-weight: 400;\"> untuk mengenkripsi data Anda;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Instal anti-virus atau anti-malware software untuk memindai, mendeteksi, dan menghapus segala ancaman siber pada perangkat Anda;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Jangan memberikan data sensitif Anda, kecuali jika Anda telah meriset dan mengkonfirmasikan kebenaran identitas pihak yang meminta tersebut.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Selanjutnya, yuk perdalam terus pengetahuan Anda tentang berbagai ancaman keamanan siber serta tips jitu mencegahnya di blog <\/span><b>GoldenFast Network<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bagi Anda yang sedang mengelola website bisnis, Anda juga dapat meningkatkan keamanan web Anda dengan memilih <\/span><a href=\"https:\/\/www.goldenfast.net\/blog\/server-adalah\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">server<\/span><\/a><span style=\"font-weight: 400;\"> yang reliabel dan mempunyai fitur keamanan yang handal.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sebagai rekomendasi, Anda bisa menggunakan layanan <\/span><strong>dedicated server<\/strong>, <strong>colocation server<\/strong><span style=\"font-weight: 400;\">, maupun <\/span><strong>VPS server<\/strong><span style=\"font-weight: 400;\"> dari <\/span><a href=\"https:\/\/www.goldenfast.net\/\" target=\"_blank\" rel=\"nofollow noopener\"><b>GoldenFast Network<\/b><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Kabar baiknya, semua layanan tersebut didukung dengan fasilitas 24\/4 monitoring, 24\/7 customer service, hardware kelas enterprise, UPS backup, serta berbagai fitur dan fasilitas keamanan terbaik lainnya untuk melindungi web Anda dari ancaman cybercrime.\u00a0\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Siapa saja dapat menjadi target dari ancaman cybercrime; baik itu individu, perusahaan, maupun pemerintah. Tidak tanggung-tanggung, perusahaan teknologi ternama sekelas Google, Yahoo, dan Apple pun pernah menjadi korban berbagai serangan siber, lho! Yuk pahami lebih dalam apa itu cybercrime, dampak, serta beberapa kategori dan tipenya. Semoga dengan memahaminya, Anda dapat semakin mengerti bahayanya ancaman ini [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":133,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,71,3],"tags":[145,153,143,146,147,150,149,152,144,148,151],"class_list":["post-132","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-glossary","category-security","category-tips","tag-apa-itu-cybercrime","tag-cara-mencegah-cybercrime","tag-cybercrime-adalah","tag-dampak-cybercrime","tag-dampak-negatif-cybercrime","tag-jenis-cybercrime","tag-kategori-cybercrime","tag-langkah-mencegah-langkah-mencegah","tag-pengertian-cybercrime","tag-tipe-cybercrime","tag-tips-mencegah-cybercrime"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercrime: Pengertian, Tipe, dan Langkah Mencegahnya\u00a0<\/title>\n<meta name=\"description\" content=\"Cybercrime adalah aksi kriminal yang bisa mengancam siapa saja. Yuk pelajari pengertian, dampak, tipe, dan cara mencegah cybercrime!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime: Pengertian, Tipe, dan Langkah Mencegahnya\u00a0\" \/>\n<meta property=\"og:description\" content=\"Cybercrime adalah aksi kriminal yang bisa mengancam siapa saja. Yuk pelajari pengertian, dampak, tipe, dan cara mencegah cybercrime!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/\" \/>\n<meta property=\"og:site_name\" content=\"GFN Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-19T09:08:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-03T08:05:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/cybercrime-pengertian-tipe-dan-langkah-mencegahnya.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"420\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Amera P. Safira\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amera P. Safira\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/cybercrime-adalah\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/cybercrime-adalah\\\/\"},\"author\":{\"name\":\"Amera P. Safira\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#\\\/schema\\\/person\\\/c916afa27bf5efd317c18ac835b33dff\"},\"headline\":\"Cybercrime: Pengertian, Tipe, dan Langkah Mencegahnya\u00a0\",\"datePublished\":\"2020-11-19T09:08:46+00:00\",\"dateModified\":\"2024-01-03T08:05:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/cybercrime-adalah\\\/\"},\"wordCount\":1015,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/cybercrime-adalah\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/cybercrime-pengertian-tipe-dan-langkah-mencegahnya.jpg\",\"keywords\":[\"apa itu cybercrime\",\"cara mencegah cybercrime\",\"cybercrime adalah\",\"dampak cybercrime\",\"dampak negatif cybercrime\",\"jenis cybercrime\",\"kategori cybercrime\",\"langkah mencegah langkah mencegah\",\"pengertian cybercrime\",\"tipe cybercrime\",\"tips mencegah cybercrime\"],\"articleSection\":[\"Glossary\",\"Security\",\"Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/cybercrime-adalah\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/cybercrime-adalah\\\/\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/cybercrime-adalah\\\/\",\"name\":\"Cybercrime: Pengertian, Tipe, dan Langkah Mencegahnya\u00a0\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/cybercrime-adalah\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/cybercrime-adalah\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/cybercrime-pengertian-tipe-dan-langkah-mencegahnya.jpg\",\"datePublished\":\"2020-11-19T09:08:46+00:00\",\"dateModified\":\"2024-01-03T08:05:31+00:00\",\"description\":\"Cybercrime adalah aksi kriminal yang bisa mengancam siapa saja. Yuk pelajari pengertian, dampak, tipe, dan cara mencegah cybercrime!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/cybercrime-adalah\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/cybercrime-adalah\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/cybercrime-adalah\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/cybercrime-pengertian-tipe-dan-langkah-mencegahnya.jpg\",\"contentUrl\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/cybercrime-pengertian-tipe-dan-langkah-mencegahnya.jpg\",\"width\":960,\"height\":420,\"caption\":\"Cybercrime Pengertian, Tipe, dan Langkah Mencegahnya\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/cybercrime-adalah\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime: Pengertian, Tipe, dan Langkah Mencegahnya\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/\",\"name\":\"GFN Blog\",\"description\":\"Blog | GoldenFast Network\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#organization\",\"name\":\"Goldenfast Network\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logogoldenfast.png\",\"contentUrl\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logogoldenfast.png\",\"width\":232,\"height\":80,\"caption\":\"Goldenfast Network\"},\"image\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#\\\/schema\\\/person\\\/c916afa27bf5efd317c18ac835b33dff\",\"name\":\"Amera P. Safira\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g\",\"caption\":\"Amera P. Safira\"},\"description\":\"With a newfound love of the IT world, Amera likes to turn complex topics into easy-to-read and comprehensive articles. In her spare times, Amera enjoys playing video games and reading every book she can find.\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/author\\\/amera-p-safira\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrime: Pengertian, Tipe, dan Langkah Mencegahnya\u00a0","description":"Cybercrime adalah aksi kriminal yang bisa mengancam siapa saja. Yuk pelajari pengertian, dampak, tipe, dan cara mencegah cybercrime!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/","og_locale":"en_US","og_type":"article","og_title":"Cybercrime: Pengertian, Tipe, dan Langkah Mencegahnya\u00a0","og_description":"Cybercrime adalah aksi kriminal yang bisa mengancam siapa saja. Yuk pelajari pengertian, dampak, tipe, dan cara mencegah cybercrime!","og_url":"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/","og_site_name":"GFN Blog","article_published_time":"2020-11-19T09:08:46+00:00","article_modified_time":"2024-01-03T08:05:31+00:00","og_image":[{"width":960,"height":420,"url":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/cybercrime-pengertian-tipe-dan-langkah-mencegahnya.jpg","type":"image\/jpeg"}],"author":"Amera P. Safira","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Amera P. Safira","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#article","isPartOf":{"@id":"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/"},"author":{"name":"Amera P. Safira","@id":"https:\/\/www.goldenfast.net\/blog\/#\/schema\/person\/c916afa27bf5efd317c18ac835b33dff"},"headline":"Cybercrime: Pengertian, Tipe, dan Langkah Mencegahnya\u00a0","datePublished":"2020-11-19T09:08:46+00:00","dateModified":"2024-01-03T08:05:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/"},"wordCount":1015,"commentCount":0,"publisher":{"@id":"https:\/\/www.goldenfast.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#primaryimage"},"thumbnailUrl":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/cybercrime-pengertian-tipe-dan-langkah-mencegahnya.jpg","keywords":["apa itu cybercrime","cara mencegah cybercrime","cybercrime adalah","dampak cybercrime","dampak negatif cybercrime","jenis cybercrime","kategori cybercrime","langkah mencegah langkah mencegah","pengertian cybercrime","tipe cybercrime","tips mencegah cybercrime"],"articleSection":["Glossary","Security","Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/","url":"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/","name":"Cybercrime: Pengertian, Tipe, dan Langkah Mencegahnya\u00a0","isPartOf":{"@id":"https:\/\/www.goldenfast.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#primaryimage"},"image":{"@id":"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#primaryimage"},"thumbnailUrl":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/cybercrime-pengertian-tipe-dan-langkah-mencegahnya.jpg","datePublished":"2020-11-19T09:08:46+00:00","dateModified":"2024-01-03T08:05:31+00:00","description":"Cybercrime adalah aksi kriminal yang bisa mengancam siapa saja. Yuk pelajari pengertian, dampak, tipe, dan cara mencegah cybercrime!","breadcrumb":{"@id":"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#primaryimage","url":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/cybercrime-pengertian-tipe-dan-langkah-mencegahnya.jpg","contentUrl":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/11\/cybercrime-pengertian-tipe-dan-langkah-mencegahnya.jpg","width":960,"height":420,"caption":"Cybercrime Pengertian, Tipe, dan Langkah Mencegahnya"},{"@type":"BreadcrumbList","@id":"https:\/\/www.goldenfast.net\/blog\/cybercrime-adalah\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.goldenfast.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybercrime: Pengertian, Tipe, dan Langkah Mencegahnya\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.goldenfast.net\/blog\/#website","url":"https:\/\/www.goldenfast.net\/blog\/","name":"GFN Blog","description":"Blog | GoldenFast Network","publisher":{"@id":"https:\/\/www.goldenfast.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.goldenfast.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.goldenfast.net\/blog\/#organization","name":"Goldenfast Network","url":"https:\/\/www.goldenfast.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.goldenfast.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2021\/04\/logogoldenfast.png","contentUrl":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2021\/04\/logogoldenfast.png","width":232,"height":80,"caption":"Goldenfast Network"},"image":{"@id":"https:\/\/www.goldenfast.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.goldenfast.net\/blog\/#\/schema\/person\/c916afa27bf5efd317c18ac835b33dff","name":"Amera P. Safira","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g","caption":"Amera P. Safira"},"description":"With a newfound love of the IT world, Amera likes to turn complex topics into easy-to-read and comprehensive articles. In her spare times, Amera enjoys playing video games and reading every book she can find.","url":"https:\/\/www.goldenfast.net\/blog\/author\/amera-p-safira\/"}]}},"_links":{"self":[{"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/posts\/132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/comments?post=132"}],"version-history":[{"count":6,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/posts\/132\/revisions"}],"predecessor-version":[{"id":3303,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/posts\/132\/revisions\/3303"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/media\/133"}],"wp:attachment":[{"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/media?parent=132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/categories?post=132"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/tags?post=132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}