Computer Network Security: A Review And Implementation For Beginner Users

Authors

  • Muhammad Farhan Politeknik Aceh Selatan, Indonesia
  • Rudi Arif Candra Politeknik Aceh Selatan, Indonesia
  • Ihsan Anwar Politeknik Aceh Selatan, Indonesia
  • Fardiansyah Politeknik Aceh Selatan, Indonesia
  • Dina Miftahul Jannah Politeknik Aceh Selatan, Indonesia
  • Devi Satria Saputra Politeknik Aceh Selatan, Indonesia

DOI:

https://doi.org/10.62671/jataed.v3i1.96

Keywords:

computer network security, cyber threats, beginner users, firewall, literature review

Abstract

Computer network security has become a crucial aspect in the digital era as users increasingly depend on network technologies for daily activities. Beginner users represent one of the most vulnerable groups to cyber security threats due to limited technical knowledge and low security awareness. This article aims to provide a comprehensive review of fundamental concepts, common threat types, and basic network security strategies that are relevant for beginner users.

The research method employed is a descriptive literature review of scientific articles and academic publications related to computer network security published between 2018 and 2025. The collected literature was analyzed to identify dominant threats and effective protection mechanisms for beginner users.

The results indicate that threats such as malware, phishing, ransomware, and unauthorized access remain major security issues. The implementation of basic security mechanisms, including strong password policies, firewalls, antivirus and anti-malware software, regular system updates, and improved user awareness, has proven effective in minimizing security risks. With adequate understanding and proper implementation of these measures, beginner users are expected to apply network security practices more safely, responsibly, and efficiently.

References

Andriansyah, R., & Pratama, A. (2021). A literature review of network security. Jurnal Jaringan Komputer dan Keamanan, 3(2), 45–54.

Ardiansyah, D., & Nugroho, Y. (2022). Implementation of network security systems using firewalls and intrusion detection systems. Jurnal Mumin Informatika, 4(2), 112–120. https://ejournal.sisfokomtek.org/index.php/jumin/article/view/6763

Astuti, S., & Hidayat, R. (2020). Computer network security protection in educational environments. International Journal of Natural Science and Engineering, 4(1), 23–30. https://ejournal.undiksha.ac.id/index.php/IJNSE/article/view/22175

Galib, A., Bahri, S., & Rahman, A. (2024). Latest challenges and trends in network security: Facing cyber threats in the digital era. Journal of Cyber Security Studies, 6(1), 1–12.

Miracle, N. O. (2024). The importance of network security in protecting sensitive data and information. International Journal of Research and Innovation in Applied Science, 9(3), 15–22.

Prasetyo, A., & Wijaya, D. (2021). User data security in wireless networks using passwords, MAC filtering, and two-factor authentication. Jurnal Jupiter, 13(2), 89–97. https://jurnal.polsri.ac.id/index.php/jupiter/article/view/4385

Siregar, M., & Lubis, R. (2021). Network security implementation using intrusion detection systems. Jurnal Ilmu Komputer dan Multimedia, 3(1), 34–42. https://journal.dcircle.org/index.php/jikum/article/view/184

Wulandari, D., & Rahman, A. (2021). Wireless computer network management security analysis. Jurnal Ilmu dan Teknologi Komputer, 6(2), 101–109. https://ejournal.nusamandiri.ac.id/index.php/jitk/article/view/2786

Yani, S., & Maulana, I. (2020). Computer network security analysis. Jurnal Nasional Komputasi dan Teknologi Informasi, 3(1), 1–8. https://ojs.serambimekkah.ac.id/jnkti/article/download/3106/pdf

Zhang, Y., Chen, X., & Li, H. (2023). Cyber security: State of the art, challenges, and future directions. Computers & Security, 122, 102115. https://doi.org/10.1016/j.cose.2022.102115

Downloads

Published

2025-12-26

How to Cite

Computer Network Security: A Review And Implementation For Beginner Users. (2025). JATAED: Journal of Appropriate Technology for Agriculture, Environment, and Development, 3(1), 16-19. https://doi.org/10.62671/jataed.v3i1.96

Most read articles by the same author(s)