html hit counter Stay Alert! Protect Our Data and Devices Together: Let’s Get to Know the Different Types of Cyberattacks! - Universitas Dian Nusantara

Stay Alert! Protect Our Data and Devices Together: Let’s Get to Know the Different Types of Cyberattacks!

07 Oktober 2025

The rapid advancement of technology today continues to move the world faster than we can predict or adapt to. New innovations emerge every second, aiming to provide a more efficient experience for society. In this era of the Internet of Things (IoT), the Internet plays a crucial role — not only in disseminating information quickly but also in connecting multiple devices seamlessly, without the limits of space or time.

However, behind the convenience and connectivity brought by technology and IoT integration, there also lie invisible threats that are increasingly dangerous, unpredictable, and complex.

Many of us are already familiar with the case of Bjorka, a hacker who successfully breached several national security systems in Indonesia. WIth cyberattacks have become a real and rapidly growing threat in the world of information technology. Various information systems, including those in the banking sector, are now prime targets for cybercriminals.

Cybercrime today poses a serious danger — not only capable of stealing confidential data from devices but also potentially crippling entire organizations and economies through large-scale data breaches. The emergence of Artificial Intelligence (AI) and Machine Learning (ML), while offering new opportunities for data management and automation, has also introduced new risks when misused by malicious actors.

According to IBM Security X-Force’s 2023 report, around 2% of cyberattacks were conducted using AI, which can infiltrate systems through algorithms and even learn online communication patterns. Meanwhile, data from awanpintar.id reported that in 2024, Indonesia experienced an average of 17 million cyberattacks.

There are several types of cyberattacks that the UNDIRA community should be aware of, including:

  1. Phishing: A type of online fraud designed to steal personal information such as passwords, email addresses, bank account details, and other confidential data. Phishing attacks are usually spread through deceptive messages containing links that lead unsuspecting users to malicious websites. These fake domains often contain software capable of recording passwords and other sensitive information. Once obtained, hackers can easily access user accounts, especially if the system lacks additional protection like CAPTCHA.

  1. Zero-Day Vulnerabilities: Known as one of the most dangerous types of cyber threats, zero-day vulnerabilities exploit weaknesses in software or systems that have not yet been patched by developers. These attacks often occur due to insufficient security testing, user negligence in downloading unverified software, or delays in installing security updates.

  1. Ransomware: A form of malware designed to restrict or completely lock access to user data and systems. Since ransomware attacks are typically one-directional and controlled remotely, victims are often forced to pay a ransom to regain access. Preventive measures include avoiding suspicious files, keeping backups, and regularly updating antivirus protection.

  1. DDoS (Distributed Denial of Service): An attack aimed at disabling networks or services by overwhelming servers with excessive traffic. Hackers exploit the target’s IP address to flood the system with fake requests, resulting in slowdowns or total shutdowns. Countermeasures include changing the IP address, being cautious when browsing the web or sharing device information, and contacting service providers such as Telkomsel, Smartfren, or XL for assistance.

  1. Man-in-the-Middle (MitM) Attack: This attack involves intercepting and hijacking data transfers between two parties. MitM exploits connected local networks, allowing hackers to easily access or modify transmitted data. Therefore, users should be extra cautious when connecting to public or unsecured Wi-Fi networks.

Facing cyber threats is essential to maintaining system stability and collaborative performance in the IoT era. With shared awareness and knowledge, we can prevent cyberattacks before they occur.

For those interested in cybersecurity and IT networks, the Informatics Engineering Program at Universitas Dian Nusantara (UNDIRA) is the right place to start. Supported by modern computer laboratories and professional lecturers, UNDIRA’s Informatics Engineering program is committed to producing graduates ready to face the challenges of the 2030 digital industry. With strong IT expertise, UNDIRA students are expected to contribute to building a secure, inclusive, and sustainable digital era for the nation.

Source of References:

Awanpintar - Layanan Penyedia Keamanan Data di Awan

Jenis Jenis serangan Siber di Era Digital - BPPTIK Komdigi

13 Jenis Serangan Cyber di Era Digital yang Harus Diwaspadai

Hanafi, M., et al. (2025). AI vs Cyber Threats: Menyelami Perang Digital di Era Kecerdasan Buatan. Jakarta: CISSReC – Lembaga Riset Siber Indonesia.

(Danang Respati Wicaksono / Humas UNDIRA)

Press Contact :

Biro Humas & Sekretariat Universitas Dian Nusantara

humas@undira.ac.id

Facebook : www.facebook.com/undiraofficial
Instagram : www.instagram.com/undiraofficial
Twitter : www.twitter.com/undiraofficial
www.undira.ac.id 

Other

Campus Tanjung Duren

Jln. Tanjung Duren Barat II No. 1

Grogol, Jakarta Barat. 11470

Campus Green Ville

JIn. Mangga XIV No. 3

Campus Cibubur

Jln. Rawa Dolar 65

Jatiranggon Kec. Jatisampurna, Bekasi. 17432