Cyber Security in Indonesian Higher Education Institutions: Lessons Learned from Recent Cyber Attacks
(1) Universitas Indonesia, Indonesia
(*) Corresponding Author
Abstract
Full Text:
PDFReferences
D. Ghifari, “I think Indonesia’s cybersecurity is run by 14-year olds’: Hackers,” Asian News, 2022. Accessed: Jan. 07, 2025. [Online]. Available: https://asianews.network/i-think-indonesias-cybersecurity-is-run-by-14-year-olds-hackers/
CNN Indonesia, “Data Pedulilindungi Tak Dienkripsi? Pakar Sindir Beda UCAP Dan Fakta,” CNN, 2022. Accessed: Jan. 07, 2025. [Online]. Available: https://www.cnnindonesia.com/teknologi/20221116133010-192-874507/data-pedulilindungi-tak-dienkripsi-pakar-sindir-beda-ucap-dan-fakta
K. H., F. M., M. R., and H. Fajraoui, “Cloud Computing Security Challenges in Higher Educational Institutions - A Survey,” Int. J. Comput. Appl., vol. 161, no. 6, pp. 22–29, Mar. 2017, doi: 10.5120/ijca2017913217.
Insetyonoto, “Gawat, data 125.000 Mahasiswa Undip Bobol!,” Gatra, 2021. Accessed: Jan. 07, 2025. [Online]. Available: https://www.gatra.com/news-500217-hukum-gawat-data-125000-mahasiswa-undip-bobol.html
International Telecommunication Union, “International Telecommunication Union, ITU-T Rec. X.1205, Overview of cybersecurity,” 2008. Accessed: Jan. 07, 2025. [Online]. Available: https://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.1205-200804-I!!PDF-E&type=items
L. Muniandy, B. Muniandy, and Z. Samsudin, “Cyber Security Behaviour among Higher Education Students in Malaysia,” J. Inf. Assur. Cybersecurity, pp. 1–13, Feb. 2017, doi: 10.5171/2017.800299.
A. Arina and A. Anatolie, “Cyber Security Threat Analysis In Higher Education Institutions As A Result Of Distance Learning,” Int. J. Sci. Technol. Res. , vol. 10, no. 3, pp. 128–133, Mar. 2021.
E. C. K. Cheng and T. Wang, “Institutional Strategies for Cybersecurity in Higher Education Institutions,” Information, vol. 13, no. 4, p. 192, Apr. 2022, doi: 10.3390/info13040192.
A.-C. Cojocariu, I. Verzea, and R. Chaib, “Aspects of Cyber-Security in Higher Education Institutions,” 2020, pp. 3–11. doi: 10.1007/978-3-030-44711-3_1.
M. J. Maranga and M. Nelson, “Emerging Issues in Cyber Security for Institutions of Higher Education,” Int. J. Comput. Sci. Netw., vol. 8, no. 4, pp. 371–379, Aug. 2019.
JOINT CHIEFS OF STAFF WASHINGTON DC, “Department of Defense Dictionary Of Military and Associated Terms,” Dec. 2010. doi: 10.21236/ADA536504.
A. Bendovschi, “Cyber-Attacks – Trends, Patterns and Security Countermeasures,” Procedia Econ. Financ., vol. 28, pp. 24–31, 2015, doi: 10.1016/S2212-5671(15)01077-1.
A. Alharthi, F. Yahya, R. J. Walters, and G. B. Wills, “An Overview of Cloud Services Adoption Challenges in Higher Education Institutions,” in Proceedings of the 2nd International Workshop on Emerging Software as a Service and Analytics, SCITEPRESS - Science and and Technology Publications, 2015, pp. 102–109. doi: 10.5220/0005529701020109.
N. Sultan, “Cloud computing for education: A new dawn?,” Int. J. Inf. Manage., vol. 30, no. 2, pp. 109–116, Apr. 2010, doi: 10.1016/j.ijinfomgt.2009.09.004.
V. H. Pardeshi, “Cloud Computing for Higher Education Institutes: Architecture, Strategy and Recommendations for Effective Adaptation,” Procedia Econ. Financ., vol. 11, pp. 589–599, 2014, doi: 10.1016/S2212-5671(14)00224-X.
Y. A. M. Qasem, R. Abdullah, Y. Y. Jusoh, R. Atan, and S. Asadi, “Cloud Computing Adoption in Higher Education Institutions: A Systematic Review,” IEEE Access, vol. 7, pp. 63722–63744, 2019, doi: 10.1109/ACCESS.2019.2916234.
S. Carlin and K. Curran, “Cloud Computing Security,” in Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments, IGI Global, pp. 12–17. doi: 10.4018/978-1-4666-2041-4.ch002.
B. Alouffi, M. Hasnain, A. Alharbi, W. Alosaimi, H. Alyami, and M. Ayaz, “A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies,” IEEE Access, vol. 9, pp. 57792–57807, 2021, doi: 10.1109/ACCESS.2021.3073203.
M. Almorsy, J. Grundy, and I. Müller, “An Analysis of the Cloud Computing Security Problem,” Sep. 2016.
R. Al Nafea and M. Amin Almaiah, “Cyber Security Threats in Cloud: Literature Review,” in 2021 International Conference on Information Technology (ICIT), IEEE, Jul. 2021, pp. 779–786. doi: 10.1109/ICIT52682.2021.9491638.
A. Garba, Maheyzah Binti Sirat, Siti Hajar, and Ibrahim Bukar Dauda, “Cyber Security Awareness Among University Students: A Case Study,” Sci. Proc. Ser., vol. 2, no. 1, pp. 82–86, Apr. 2020, doi: 10.31580/sps.v2i1.1320.
Microsoft, “Microsoft Digital Defense Report 2022,” 2022. Accessed: Jan. 07, 2025. [Online]. Available: https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE5bUvv?culture=en-us&country=us
X. Liu et al., “Cyber security threats: A never-ending challenge for e-commerce,” Front. Psychol., vol. 13, Oct. 2022, doi: 10.3389/fpsyg.2022.927398.
J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity,” J. Comput. Syst. Sci., vol. 80, no. 5, pp. 973–993, Aug. 2014, doi: 10.1016/j.jcss.2014.02.005.
J. Jeong, J. Mihelcic, G. Oliver, and C. Rudolph, “Towards an Improved Understanding of Human Factors in Cybersecurity,” in 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), IEEE, Dec. 2019, pp. 338–345. doi: 10.1109/CIC48465.2019.00047.
F. Khalid, M. Daud, M. Rahman, and M. Nasir, “An investigation of university students’ awareness on cyber security,” Int. J. Eng. Technol., vol. 7, no. 421, pp. 11–14, 2014.
L. Hadlington, “The ‘Human Factor’ in Cybersecurity,” in Research Anthology on Artificial Intelligence Applications in Security, IGI Global, 2020, pp. 1960–1977. doi: 10.4018/978-1-7998-7705-9.ch087.
M. Richardson, P. Lemoine, W. Stephens, and R. Weller, “Planning for Cyber Security in Schools: The Human Factor,” Educ. Plan., vol. 27, no. 2, pp. 23–39, 2020.
H. Snyder, “Literature review as a research methodology: An overview and guidelines,” J. Bus. Res., vol. 104, pp. 333–339, Nov. 2019, doi: 10.1016/j.jbusres.2019.07.039.
S. Shaw, J. Elston, and S. Abbott, “Comparative analysis of health policy implementation:,” Policy Stud., vol. 25, no. 4, pp. 259–266, Dec. 2004, doi: 10.1080/0144287042000288451.
W. Goddard and S. Melville, Research Methodology: An Introduction. Juta and Company, 2004.
G. A. Bowen, “Document Analysis as a Qualitative Research Method,” Qual. Res. J., vol. 9, no. 2, pp. 27–40, Aug. 2009, doi: 10.3316/QRJ0902027.
M. Bengtsson, “How to plan and perform a qualitative study using content analysis,” NursingPlus Open, vol. 2, pp. 8–14, 2016, doi: 10.1016/j.npls.2016.01.001.
R. Whittemore and K. Knafl, “The integrative review: updated methodology,” J. Adv. Nurs., vol. 52, no. 5, pp. 546–553, Dec. 2005, doi: 10.1111/j.1365-2648.2005.03621.x.
National CSIRT of Indonesia, “Lanskap Keamanan Siber Indonesia 2023,” 2023. Accessed: Jan. 07, 2025. [Online]. Available: https://csirt.kemenkeu.go.id/in/post/lanskap-keamanan-siber-indonesia-2023
Interpol, “ASEAN cyberthreat assessment 2020,” 2020. Accessed: Jan. 07, 2025. [Online]. Available: https://asean.org/wp-content/uploads/2021/01/ASEAN_CyberThreatAssessment_2020.pdf
DetikJateng, “Situs fib UGM diretas, hacker Tulis Pesan soal jual beli konten seks mahasiswa,” DetikJateng, 2022. Accessed: Jan. 07, 2025. [Online]. Available: https://www.detik.com/jateng/jogja/d-6365071/situs-fib-ugm-diretas-hacker-tulis-pesan-soal-jual-beli-konten-seks-mahasiswa
DOI: http://dx.doi.org/10.30645/jurasik.v10i1.876
DOI (PDF): http://dx.doi.org/10.30645/jurasik.v10i1.876.g851
Refbacks
- There are currently no refbacks.
JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika)
Published Papers Indexed/Abstracted By: