Development of Cyber Security System to Protect Domestic Defense Industry Infrastructure
DOI:
https://doi.org/10.59890/ijist.v3i1.226Keywords:
Cybersecurity, Infrastructure, Defense IndustryAbstract
Indonesia can join global alliances focusing on cybersecurity to accelerate the adoption of new technologies and share intelligence on global threats. The aim of this study is to explore how an effective cybersecurity system can be developed to protect the domestic defense industry's infrastructure from evolving cyber threats and to identify the main challenges faced in implementing cybersecurity technologies within the defense industry's infrastructure. The findings of this study indicate that through integrated efforts involving strong regulations, responsive policies, and strategic collaboration, the cybersecurity system of the defense industry can become more resilient. This not only protects defense interests but also strengthens national sovereignty and stability in an increasingly challenging digital era.
References
Aji, M. P. (2023). Sistem Keamanan Siber Dan Kedaulatan Data Di Indonesia Dalam Perspektif Ekonomi Politik (Studi Kasus Perlindungan Data Pribadi) [Cyber Security System And Data Sovereignty In Indonesia In Political Economic Perspective]. Jurnal Politica Dinamika Masalah Politik Dalam Negeri Dan Hubungan Internasional, 13(2). Https://Doi.Org/10.22212/Jp.V13i2.3299
Al Humaid Alneyadi, M. R. M., & Normalini, M. K. (2023). Factors Influencing User’s Intention To Adopt Ai-Based Cybersecurity Systems In The Uae. Interdisciplinary Journal Of Information, Knowledge, And Management, 18. Https://Doi.Org/10.28945/5166
Aloseel, A., He, H., Shaw, C., & Khan, M. A. (2021). Analytical Review Of Cybersecurity For Embedded Systems. In Ieee Access (Vol. 9). Https://Doi.Org/10.1109/Access.2020.3045972
Elan Maulani, I., Rayhan Sunandar Putra, D., & Komarudin, K. (2023). Sistem Deteksi Intrusi Cerdas: Studi Perbandingan Algoritma Pembelajaran Mesin Untuk Keamanan Siber. Jurnal Sosial Teknologi, 3(11). Https://Doi.Org/10.59188/Jurnalsostech.V3i11.987
Faizal, M. A., Faizatul, Z., Asiyah, B. N., & Subagyo, R. (2023). Analisis Risiko Teknologi Informasi Pada Bank Syariah : Identifikasi Ancaman Dan Tantangan Terkini. Jurnal Asy-Syarikah: Jurnal Lembaga Keuangan, Ekonomi Dan Bisnis Islam, 5(2). Https://Doi.Org/10.47435/Asy-Syarikah.V5i2.2022
Farid, I., Reksoprodjo, A. H., & Suhirwan. (2023). Pemanfaatan Artificial Intelligence Dalam Pertahanan Siber. Nusantara: Jurnal Ilmu Pengetahuan Sosial , 10(2).
Fernandez De Arroyabe, I., Arranz, C. F. A., Arroyabe, M. F., & Fernandez De Arroyabe, J. C. (2023). Cybersecurity Capabilities And Cyber-Attacks As Drivers Of Investment In Cybersecurity Systems: A Uk Survey For 2018 And 2019. Computers And Security, 124. Https://Doi.Org/10.1016/J.Cose.2022.102954
Ferreira, L., Silva, D. C., & Itzazelaia, M. U. (2023). Recommender Systems In Cybersecurity. Knowledge And Information Systems, 65(12). Https://Doi.Org/10.1007/S10115-023-01906-6
Hajar, S. (2023). Digital Entrepreneurship Discourse In The National Economy. Innovative: Journal Of Social Science Research, 3(1).
Hariyadi, D., & Nastiti, F. E. (2021). Analisis Keamanan Sistem Informasi Menggunakan Sudomy Dan Owasp Zap Di Universitas Duta Bangsa Surakarta. Jurnal Komtika (Komputasi Dan Informatika), 5(1). Https://Doi.Org/10.31603/Komtika.V5i1.5134
Karpiuk, M. (2021). The Local Government’s Position In The Polish Cybersecurity System. Lex Localis, 19(3). Https://Doi.Org/10.4335/19.3.609-620(2021)
Khatun, M., Wagner, F., Jung, R., & Glaß, M. (2023). An Application Of Dematel And Fuzzy Dematel To Evaluate The Interaction Of Safety Management System And Cybersecurity Management System In Automated Vehicles. In Engineering Applications Of Artificial Intelligence (Vol. 124). Https://Doi.Org/10.1016/J.Engappai.2023.106566
Khlaponin, Y., Kozubtsova, L., Kozubtsov, I., & Shtonda, R. (2022). Functions Of The Information Security And Cybersecurity System Of Critical Information Infrastructure. Cybersecurity: Education, Science, Technique, 3(15). Https://Doi.Org/10.28925/2663-4023.2022.15.1241341
Khoironi, S. C. (2020). Pengaruh Analisis Kebutuhan Pelatihan Budaya Keamanan Siber Sebagai Upaya Pengembangan Kompetensi Bagi Aparatur Sipil Negara Di Era Digital. Jurnal Studi Komunikasi Dan Media, 24(1). Https://Doi.Org/10.31445/Jskm.2020.2945
Khotimah, H., Bimantoro, F., & Kabanga, R. S. (2022). Implementasi Security Information And Event Management (Siem) Pada Aplikasi Sms Center Pemerintah Daerah Provinsi Nusa Tenggara Barat. Jurnal Begawe Teknologi Informasi (Jbegati), 3(2). Https://Doi.Org/10.29303/Jbegati.V3i2.752
Kirshner, M. (2023). Model-Based Systems Engineering Cybersecurity For Space Systems. Aerospace, 10(2). Https://Doi.Org/10.3390/Aerospace10020116
Kryshtanovych, M., Lyubomudrova, N., Bondar, H., Motornyy, V., & Kuchmenko, V. (2023). An Intelligent Multi-Stage Model For Countering The Impact Of Disinformation On The Cybersecurity System. Ingenierie Des Systemes D’information, 28(1). Https://Doi.Org/10.18280/Isi.280105
Kuzior, A., Yarovenko, H., Brożek, P., Sidelnyk, N., Boyko, A., & Vasilyeva, T. (2023). Company Cybersecurity System: Assessment, Risks And Expectations. Production Engineering Archives, 29(4). Https://Doi.Org/10.30657/Pea.2023.29.43
Lee, D., Kim, D., Lee, C., Ahn, M. K., & Lee, W. (2022). Icstasy: An Integrated Cybersecurity Training System For Military Personnel. Ieee Access, 10. Https://Doi.Org/10.1109/Access.2022.3182383
Luthfah, D. (2023). Penguatan Keamanan Siber Pada Sektor Jasa Keuangan Indonesia. Jurnal Penelitian Dan Karya Ilmiah Lembaga Penelitian Universitas Trisakti. Https://Doi.Org/10.25105/Pdk.V9i1.18643
Macas, M., Wu, C., & Fuertes, W. (2024). Adversarial Examples: A Survey Of Attacks And Defenses In Deep Learning-Enabled Cybersecurity Systems. In Expert Systems With Applications (Vol. 238). Https://Doi.Org/10.1016/J.Eswa.2023.122223
Makbull Rizki. (2022). Perkembangan Sistem Pertahanan/Keamanan Siber Indonesia Dalam Menghadapi Tantangan Perkembangan Teknologi Dan Informasi. Politeia: Jurnal Ilmu Politik, 14(1). Https://Doi.Org/10.32734/Politeia.V14i1.6351
Mukhlis, M., Arsad, A., Mukhsin, Z., & Said, S. (2024). Transformasi Digital Dalam Ekonomi Modern. Jurnal Penkomi: Kajian Pendidikan Dan Ekonomi, 7(1).
Munawar, Z. (2020). Mekanisme Keselamatan, Keamanan Dan Keberlanjutan Untuk Sistem Siber Fisik. Tematik, 7(1). Https://Doi.Org/10.38204/Tematik.V7i1.371
Nugroho, I. I., Pratiwi, R., & Az Zahro, S. R. (2021). Optimalisasi Penanggulangan Kebocoran Data Melalui Regulatory Blockchain Guna Mewujudkan Keamanan Siber Di Indonesia. Ikatan Penulis Mahasiswa Hukum Indonesia Law Journal, 1(2). Https://Doi.Org/10.15294/Ipmhi.V1i2.53698
Putri, A. W. O. K., Aditya, A. R. M., Musthofa, D. L., & Widodo, P. (2022). Serangan Hacking Tools Sebagai Ancaman Siber Dalam Sistem Pertahanan Negara (Studi Kasus: Predator). Global Political Studies Journal, 6(1). Https://Doi.Org/10.34010/Gpsjournal.V6i1.6698
Rizki, M. (2022). Perkembangan Sistem Pertahanan/Keamanan Siber Indonesia Dalam Menghadapi Tantangan Perkembangan Teknologi Dan Informasi. Politeia: Jurnal Ilmu Politik , 14(1).
Sahrudin, S., & Ulum, M. B. (2023). Penerapan Keamanan Siber Pada Sistem Transportasi Laut. Jurnal Ilmiah Universitas Batanghari Jambi, 23(3). Https://Doi.Org/10.33087/Jiubj.V23i3.3839
Shulha, O., Yanenkova, I., Kuzub, M., Muda, I., & Nazarenko, V. (2022). Banking Information Resource Cybersecurity System Modeling. Journal Of Open Innovation: Technology, Market, And Complexity, 8(2). Https://Doi.Org/10.3390/Joitmc8020080
Sigiro, F. H., Runturambi, A. J. S., & Widiawan, B. (2023). Collaborative Sharing Intelijen Ancaman Pada Komunitas Csirt Dalam Memperkuat Keamanan Siber Nasional. Syntax Literate ; Jurnal Ilmiah Indonesia, 7(9). Https://Doi.Org/10.36418/Syntax-Literate.V7i9.14245
Soesanto, E., Romadhon, A., Dwi Mardika, B., & Fahmi Setiawan, M. (2023). Analisis Dan Peningkatan Keamanan Cyber: Studi Kasus Ancaman Dan Solusi Dalam Lingkungan Digital Untuk Mengamankan Objek Vital Dan File. Sammajiva : Jurnal Penelitian Bisnisdan Manajemen, 1(2).
Soewardi, B. A. (2013). Perlunya Pembangunan Sistem Pertahanan Siber (Cyber Defense) Yang Tangguh Bagi Indonesia. Potensi Pertahanan.
Svintsytsky, A. V. (2022). The System Of Cybersecurity Bodies In Ukraine. Revista Cientifica General Jose Maria Cordova, 20(38). Https://Doi.Org/10.21830/19006586.903
Tashtoush, Y. M., Darweesh, D. A., Husari, G., Darwish, O. A., Darwish, Y., Issa, L. B., & Ashqar, H. I. (2022). Agile Approaches For Cybersecurity Systems, Iot And Intelligent Transportation. Ieee Access, 10. Https://Doi.Org/10.1109/Access.2021.3136861
Vania, C., Markoni, M., Saragih, H., & Widarto, J. (2023). Tinjauan Yuridis Terhadap Perlindungan Data Pribadi Dari Aspek Pengamanan Data Dan Keamanan Siber. Jurnal Multidisiplin Indonesia, 2(3). Https://Doi.Org/10.58344/Jmi.V2i3.157



