IMPLEMENTASI SOPHOS INTERCEPT X SEBAGAI APLIKASI KEAMANAN PERANGKAT DIGITAL PADA KOMUNITAS POS PAUD PANDANWANGI BANDUNG
DOI:
https://doi.org/10.62567/jpi.v2i1.1949Keywords:
Sophos Intercept X, Keamanan Perangkat Digital, Pos PAUD PandanwangiAbstract
Maraknya kepemilikan perangkat digital khususnya smartphone di tiap individu memudahkan dalam kebutuhan akan informasi dan bertranksaksi. Namun tidak banyak yang menyadari pentingnya keamanan pada smartphone mereka. Untuk itu maka kegiatan pengabdian masyarakat ini diadakan bukan hanya berupa edukasi namun sekaligus tutorial praktis menginstal aplikasi keamanan perangkat digital menggunakan Sophos Intercept X. Penelitian ini adalah penelitian kualitatif yang menggunakan pendekatan normatif, grup diskusi, dan simulasi di komunitas Pos PAUD Pandanwangi Kota Bandung. Studi ini menemukan bahwa masih banyak peserta yang membutuhkan pemahaman dan panduan praktis tentang penggunaan aplikasi anti malware di perangkat digital mereka. Melalui kegiatan ini maka level literasi keamanan anti malware di kalangan peserta menjadi lebih baik dari sebelumnya.
References
Abdulkader, M. (2025). Navigating privacy and usability: A user-centric study of public WiFi networks.
Akbar, A., Kuswanto, A., & Kartawinata, B. R. (2025). MAINTAINING FAMILY PRIVACY AND SECURITY IN THE DIGITAL AGE. Jurnal Pengabdian Indonesia (JPI), 1(2), 119–125.
Al Qwaid, M. (2025). Cybersecurity Threats: Ransomware, Phishing, and Social Engineering. In Complexities and Challenges for Securing Digital Assets and Infrastructure (pp. 399–434). IGI Global Scientific Publishing.
Ali, M. M., & Mohd Zaharon, N. F. (2024). Phishing—A cyber fraud: The types, implications and governance. International Journal of Educational Reform, 33(1), 101–121.
Ananta, K. D., Ambodo, T., & Tohawi, A. (2024). Pengaruh Media Sosial terhadap Peningkatan Kejahatan Siber di Indonesia. Islamic Law: Jurnal Siyasah, 9(2), 113–118.
Babak, V., Babak, S., Eremenko, V., Kuts, Y., & Zaporozhets, A. (2025). Protection of Measurement Information from Unauthorized Access. In Information-Measuring Systems: Theory and Application (pp. 409–458). Springer.
Beretas, C. (2024). Information systems security, detection and recovery from cyber attacks. Universal Library of Engineering Technology, 1(1).
Bharathi, M., Sandhyakumari, G., Madhurima, V., Tabassum, S., Kumar, N. A., & Neelima, K. (2025). Protecting Your Digital Life From Cyber Threats and Vulnerabilities. In Convergence of Cybersecurity and Cloud Computing (pp. 457–472). IGI Global Scientific Publishing.
Feng, S., & Tramèr, F. (2024). Privacy backdoors: Stealing data with corrupted pretrained models. ArXiv Preprint ArXiv:2404.00473.
Gallo, L., Gentile, D., Ruggiero, S., Botta, A., & Ventre, G. (2024). The human factor in phishing: Collecting and analyzing user behavior when reading emails. Computers & Security, 139, 103671.
Garfinkel, S. (2024). Complete Delete: In Practice, Clicking’Delete’Rarely Deletes. Should it?
Gilsenan, C. (2025). Exploring the Security and Privacy Impacts of Using 2FA Apps.
Halfacree, G. (2025). The official Raspberry Pi Beginner’s Guide: How to use your new computer. Raspberry Pi Press.
Henry, V. (2018). Verizon 2018 data breach investigations report (DBIR). Retrieved from https://www.verizon.com/business/resources/reports/DBIR_2018_Report.pdf
Jabid, T., Masum, S., Shams, R. A., Chowdhury, A., Islam, M. M., Ferdaus, M. H., … Islam, M. (2024). A brief history of ransomware. In Ransomware Evolution (pp. 3–17). CRC Press.
Kaspersky, I. C. S. (2021). Threat landscape for industrial automation systems. Statistics for H, 1, 2021.
Kissell, J. (2024). Take Control of 1password. alt concepts.
Korkes, E., Munyendo, C. W., Isaac, A., Hennemann, V., & Aviv, A. J. (2024). “ I’m going to try her birthday”: Investigating How Friends Guess Each Other’s Smartphone Unlock PINs in the Lab. In Proceedings of the 2024 European Symposium on Usable Security (pp. 220–234).
Le, K. (2025). Are We Safe in the Digital World? Why We Still Fall Victim to Cybercrime.
Mclaughlin, K. L., & Elliott, E. S. A. (2023). UNLEASHING THE POWER OF MOBILE THREAT HUNTING TOOLKITS: WHY THEY ARE CRUCIAL IN TODAY’S CYBERSECURITY LANDSCAPE. EDPACS, 68(3), 1–6.
Puspitaningrum, N., & Insani, K. T. K. C. (2024). KESADARAN AKAN KEAMANAN DIGITAL. TRANSFORMASI PEMBELAJARAN Anak Usia Dini Di Zaman Digital, 116.
Sadik, J., & Ruoti, S. (2025). A large-scale survey of password entry practices on non-desktop devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 9(3), 1–30.
Salman, M., Ikram, M., & Kaafar, M. A. (2024). Investigating evasive techniques in SMS spam filtering: A comparative analysis of machine learning models. IEEE Access, 12, 24306–24324.
Santoso, J. T. (2023). Teknologi Keamanan Siber (Cyber Security). Penerbit Yayasan Prima Agus Teknik, 1–173.
Saylor, M. J., & Saylor, M. (2025). The mobile wave: How mobile intelligence will change everything. Hachette+ ORM.
Shafik, W. (2025). Data Loss Software Reason and Hardware Reason. In Data Recovery Techniques for Computer Forensics (pp. 27–61). Bentham Science Publishers.
Shahid, S. Z., Bangash, M. A., Hussain, M. R., & Arshad, S. (2024). CyberCure-Malware Defense System. In 2024 4th International Conference on Innovations in Computer Science (ICONICS) (pp. 1–7). IEEE.
Siber, B., & Negara, S. (2022). Laporan tahunan keamanan siber di Indonesia. Jakarta: BSSN.
Suarti, I. (2024). Deteksi situs Phishing berbasis Neural Network. Universitas Islam Negeri Maulana Malik Ibrahim, Malang.
Symantec, C. (2019). Internet security threat report: Volume 24. Symantee Enterprise Security.
Tanti, R. (2024). Study of Phishing Attack and their Prevention Techniques. International Journal of Scientific Research in Engineering and Management, 8(10), 1–8.
Triantafyllou, G. P. (2024). Malware analysis. Πανεπιστήμιο Πειραιώς.
Vishwakarma, R., & Dhakad, R. (2024). Online advertising and fraud click in online advertisement: A survey. International Journal of Computer Applications, 186(1), 975–8887.
Vitali, S., & Giuliani, M. (2024). Emerging digital technologies and auditing firms: Opportunities and challenges. International Journal of Accounting Information Systems, 53, 100676.
Wibowo, A., & Yulianingsih, S. (2025). Hukum Teknologi Informasi. Penerbit Yayasan Prima Agus Teknik.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Aldi Akbar, Budi Rustandi Kartawinata

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.













