Analysis of Threat Detection, Prevention Strategies, and Cyber Risk Management for Computer Network Security in Government Information Systems in Indonesia

Authors

  • Loso Judijanto  Indonesia Palm Oil Strategic Studies (IPOSS)
  • Rifky Lana Rahardian Institut Teknologi Dan Bisnis STIKOM BALI
  • Hanifah Nurul Muthmainah Universitas Siber Muhammadiyah
  • Moh. Erkamim Universitas Tunas Pembangunan Surakarta

DOI:

https://doi.org/10.58812/wsist.v1i02.479

Keywords:

Threat Detection, Prevention Strategies, Cyber Risk Management, Computer Network Security, Government Information Systems, Indonesia

Abstract

This research investigates the landscape of threat detection, prevention strategies, and cyber risk management within Government Information Systems in Indonesia. A quantitative approach, employing Structural Equation Modeling - Partial Least Squares (SEM-PLS), was utilized to analyze data collected from 150 participants across diverse government institutions. The study assessed perceived cyber threats, the effectiveness of threat detection mechanisms, prevention strategy implementation, and cyber risk management practices. Findings revealed significant regional variations in threat perception and underscored the importance of both technological and human-centric approaches. The Structural Equation Model demonstrated satisfactory fit, with notable path coefficients indicating strong relationships among latent variables. The study contributes valuable insights to cybersecurity practices in the Indonesian government sector, informing policymakers and practitioners on strategies to enhance network security resilience.

References

P. A. Winarsasi, M. C. Thalib, M. R. Moha, and N. F. Elfikri, “State Control Of Electronic Information Resources: Role And Efforts In The Modern Context,” J. Pamator J. Ilm. Univ. Trunojoyo, vol. 16, no. 2, pp. 405–418, 2023.

N. Ishak, “Guarantee of Information and Communication Technology Application Security in Indonesia: Regulations and Challenges?,” Audit. Comp. Law J., vol. 4, no. 2, pp. 108–117, 2023.

R. Kusumarani and R. P. A. Pramesti, “Exploring application portfolio management in Indonesia: A case study of the Indonesia agency for the assessment and application of technology,” Comput. Sci. Inf. Technol., vol. 4, no. 1, pp. 76–84, 2023.

Y. Evitha, S. N. Sari, D. Suprayitno, and J. Irrianda, “Digital Communication Management Government of the Republic of Indonesia for Inclusive and Sustainable Economic Recovery in Indonesia,” KnE Soc. Sci., pp. 621–631, 2023.

H. Al Asyari, “Between Freedom And Protection: A Critical Review Of Indonesia’S Cyberspace Law,” Prophet. Law Rev., vol. 5, no. 1, pp. 79–103, 2023.

D. Junaedi and M. R. Arsyad, “Potensi Disruptif Digital di Negara Berkembang,” Com. Commun. Inf. Technol. J., vol. 1, no. 1, pp. 50–70, 2023.

A. Dudhat and V. Agarwal, “Indonesia’s Digital Economy’s Development,” IAIC Trans. Sustain. Digit. Innov., vol. 4, no. 2, pp. 109–118, 2023.

C. S. Hartati and A. Muhammad, “Combating Cybercrime and Cyberterrorism in Indonesia,” J. Hub. Int., vol. 11, no. 2, pp. 45–56, 2023.

B. Buchanan, The cybersecurity dilemma: Hacking, trust, and fear between nations. Oxford University Press, 2016.

M. M. Alam, A. M. Fawzi, M. M. Islam, and J. Said, “Impacts of COVID-19 pandemic on national security issues: Indonesia as a case study,” Secur. J., pp. 1–20, 2021.

F. Cloramidine and M. Badaruddin, “Mengukur Keamanan Siber Indonesia Melalui Indikator Pilar Kerjasama Dalam Global Cybersecurity Index (GCI),” Popul. J. Sos. dan Hum., vol. 8, no. 1, pp. 57–73, 2023.

T. H. Fadillah, “E-Commerce: A New Media that Creates New Disasters,” 2023.

A. Uksan, P. Widodo, and H. Saragi, “The Role of The Kopassus 81 Unit in Dealing With Cyber Terrorism: A Conflict Resolution Effort in Indonesia,” Int. J. Soc. Sci., vol. 2, no. 6, pp. 2351–2356, 2023.

S. Bera, L. Glenn, A. Raghavan, E. Meno, T. Cody, and P. A. Beling, “Deterring Adversarial Learning in Penetration Testing by Exploiting Domain Adaptation Theory,” in 2023 Systems and Information Engineering Design Symposium (SIEDS), IEEE, 2023, pp. 314–318.

A. Rathee, P. Malik, and M. K. Parida, “Network Intrusion Detection System using Deep Learning Techniques,” in 2023 International Conference on Communication, Circuits, and Systems (IC3S), IEEE, 2023, pp. 1–6.

P. Sharma and B. Dash, “Impact of big data analytics and ChatGPT on cybersecurity,” in 2023 4th International Conference on Computing and Communication Systems (I3CS), IEEE, 2023, pp. 1–6.

E. Drozda, “Conclusion—Final Contributions to a Research Agenda on Social Threats,” Soc. Under Threat A Pluri-Disciplinary Approach, vol. 3, p. 217, 2020.

K. Amorosa and B. Yankson, “Human Error-A Critical Contributing Factor to the Rise in Data Breaches: A Case Study of Higher Education,” HOLISTICA–Journal Bus. Public Adm., vol. 14, no. 1, pp. 110–132, 2023.

K. Kannelønning and S. K. Katsikas, “A systematic literature review of how cybersecurity-related behavior has been assessed,” Inf. Comput. Secur., 2023.

N. H. Al-Kumaim and S. K. Alshamsi, “Determinants of Cyberattack Prevention in UAE Financial Organizations: Assessing the Mediating Role of Cybersecurity Leadership,” Appl. Sci., vol. 13, no. 10, p. 5839, 2023.

G. Kassar, “Exploring Cybersecurity Awareness and Resilience of SMEs amid the Sudden Shift to Remote Work during the Coronavirus Pandemic: A Pilot Study,” in ARPHA Conference Abstracts, Pensoft Publishers, 2023, p. e107358.

M. Nkongolo and M. Tokmak, “Zero-day threats detection for critical infrastructures,” arXiv Prepr. arXiv2306.06366, 2023.

S. Mahmood, M. Chadhar, and S. Firmin, “Cybersecurity challenges in blockchain technology: A scoping review,” Hum. Behav. Emerg. Technol., vol. 2022, pp. 1–11, 2022.

I. D. Sánchez-García, J. Mejía, and T. San Feliu Gilabert, “Cybersecurity Risk Assessment: A Systematic Mapping Review, Proposal, and Validation,” Appl. Sci., vol. 13, no. 1, p. 395, 2022.

J. Crotty and E. Daniel, “Cyber threat: its origins and consequence and the use of qualitative and quantitative methods in cyber risk assessment,” Appl. Comput. Informatics, no. ahead-of-print, 2022.

M. Angelelli, S. Arima, C. Catalano, and E. Ciavolino, “Cyber-risk Perception and Prioritization for Decision-Making and Threat Intelligence,” arXiv Prepr. arXiv2302.08348, 2023.

A. A. Latiffi, S. Mohd, N. Kasim, and M. S. Fathi, “Building information modeling (BIM) application in Malaysian construction industry,” Int. J. Constr. Eng. Manag., vol. 2, no. 4A, pp. 1–6, 2013.

A. Ghosh, “Robustness concerns in high-dimensional data analyses and potential solutions,” in Big Data Analytics in Chemoinformatics and Bioinformatics, Elsevier, 2023, pp. 37–60.

A. Azade, R. Saini, and D. Naik, “Visual Question Answering Using Convolutional and Recurrent Neural Networks,” in International Conference on Machine Intelligence and Signal Processing, Springer, 2022, pp. 23–33.

Y. Haji-Othman and M. S. S. Yusuff, “Assessing reliability and validity of attitude construct using partial least squares structural equation modeling (PLS-SEM),” Int. J. Acad. Res. Bus. Soc. Sci., vol. 12, no. 5, pp. 378–385, 2022.

C. M. Davis, J. E. Tate, and T. J. Overbye, “Wide area phasor data visualization,” in 2007 39th North American Power Symposium, IEEE, 2007, pp. 246–252.

T. Gebel, E. Lechtenberg-Auffarth, and C. Guhe, “About hazard and risk assessment: Regulatory approaches in assessing safety in the European Union chemicals legislation,” Reprod. Toxicol., vol. 28, no. 2, pp. 188–195, 2009.

M. Portalatin, O. Keskin, S. Malneedi, O. Raza, and U. Tatar, “Data Analytics for Cyber Risk Analysis Utilizing Cyber Incident Datasets,” in 2021 Systems and Information Engineering Design Symposium (SIEDS), IEEE, 2021, pp. 1–6.

H. Kure and S. Islam, “Cyber threat intelligence for improving cybersecurity and risk management in critical infrastructure,” J. Univers. Comput. Sci., vol. 25, no. 11, pp. 1478–1502, 2019.

Downloads

Published

2023-12-30

How to Cite

Judijanto, L., Rahardian, R. L., Muthmainah, H. N., & Erkamim, M. (2023). Analysis of Threat Detection, Prevention Strategies, and Cyber Risk Management for Computer Network Security in Government Information Systems in Indonesia. West Science Information System and Technology, 1(02), 90–98. https://doi.org/10.58812/wsist.v1i02.479