Cybersecurity In The Digital Age: Developing Robust Strategies To Protect Against Evolving Global Digital Threats And Cyber Attacks

  • Theodorus Sendjaja Institut Keuangan Perbankan dan Informatika Asia Perbanas
  • Irwandi Universitas Islam Negeri Sunan Gunung Djati Bandung, Indonesia
  • Erwan Prastiawan Goacademica Research & Publishing
  • Yunita Suryani Universitas PGRI Ronggolawe, Tuban
  • Endang Fatmawati Universitas Diponegoro
Keywords: Cyber Security, Security Strategy, Digital Threats, Cyber Attacks, Digital Era.

Abstract

In today's digital era, cyber security is a growing challenge, considering increasingly sophisticated cyber attacks and increasing global digital threats. These threats not only pose risks to individual privacy but also to the security of critical infrastructure and the country's economic interests. The need to develop a robust and adaptive cybersecurity strategy is critical to protecting digital assets and maintaining information security. This research aims to analyze the global cyber threat landscape and develop effective cyber security strategies to counter evolving digital threats. The method used is a descriptive qualitative approach by collecting and analyzing data from relevant previous studies. The results of the research show that an effective cybersecurity strategy requires an adaptive and innovative approach, utilizing the latest technology and cross-sector collaboration. The importance of international collaboration and human resource development in the field of cyber security was emphasized as a key factor in building stronger defenses against cyber attacks. Analysis of global cyber threats and their threat actors provides insight into the importance of cybersecurity education and awareness at all levels of organizations and society. The security strategy developed must be able to adapt to changes in technology and attack tactics to ensure effective protection. Cross-sector collaboration and the development of a strong cybersecurity ecosystem are the foundations for facing future cybersecurity challenges.

References

Ahmad, A., Desouza, K. C., Maynard, S. B., Naseer, H., & Baskerville, R. L. (2020). How integration of cyber security management and incident response enables organizational learning. Journal of the Association for Information Science and Technology, 71(8), 939-953.

Alkhalil, Z., Hewage, C., Nawaf, L., & Khan, I. (2021). Phishing attacks: A recent comprehensive study and a new anatomy. Frontiers in Computer Science, 3, 563060.

Al-Rahmi, W. M., Alzahrani, A. I., Yahaya, N., Alalwan, N., & Kamin, Y. B. (2020). Digital communication: Information and communication technology (ICT) usage for education sustainability. Sustainability, 12(12), 5052.

Ande, R., Adebisi, B., Hammoudeh, M., & Saleem, J. (2020). Internet of Things: Evolution and technologies from a security perspective. Sustainable Cities and Society, 54, 101728.

Annarelli, A., Nonino, F., & Palombi, G. (2020). Understanding the management of cyber resilient systems. Computers & industrial engineering, 149, 106829.

Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333.

Caviglione, L., Choraś, M., Corona, I., Janicki, A., Mazurczyk, W., Pawlicki, M., & Wasielewska, K. (2020). Tight arms race: Overview of current malware threats and trends in their detection. IEEE Access, 9, 5371-5396.

Chowdhury, N., & Gkioulos, V. (2021). Cyber security training for critical infrastructure protection: A literature review. Computer Science Review, 40, 100361.

Dunn Cavelty, M., & Wenger, A. (2020). Cyber security meets security politics: Complex technology, fragmented politics, and networked science. Contemporary Security Policy, 41(1), 5-32.

Jaiswal, A., Arun, C. J., & Varma, A. (2022). Rebooting employees: Upskilling for artificial intelligence in multinational corporations. The International Journal of Human Resource Management, 33(6), 1179-1208.

Lallie, H. S., Shepherd, L. A., Nurse, J. R., Erola, A., Epiphaniou, G., Maple, C., & Bellekens, X. (2021). Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & security, 105, 102248.

Ma, C. (2021). Smart city and cyber-security; technologies used, leading challenges and future recommendations. Energy Reports, 7, 7999-8012.

Mishra, A., Alzoubi, Y. I., Anwar, M. J., & Gill, A. Q. (2022). Attributes impacting cybersecurity policy development: An evidence from seven nations. Computers & Security, 120, 102820.

Pour, M. S., Nader, C., Friday, K., & Bou-Harb, E. (2023). A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security. Computers & Security, 103123.

Reveron, D. S., & Savage, J. E. (2020). Cybersecurity convergence: digital human and national security. Orbis, 64(4), 555-570.

Riggs, H., Tufail, S., Parvez, I., Tariq, M., Khan, M. A., Amir, A., ... & Sarwat, A. I. (2023). Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure. Sensors, 23(8), 4060.

Safitra, M. F., Lubis, M., & Fakhrurroja, H. (2023). Counterattacking cyber threats: A framework for the future of cybersecurity. Sustainability, 15(18), 13369.

Sailio, M., Latvala, O. M., & Szanto, A. (2020). Cyber threat actors for the factory of the future. Applied Sciences, 10(12), 4334.

Singh, B., & Kumar, B. (2024). A Comprehensive Analysis Of Key Factors Causing Various Kinds Of Cyber-Attacks In Higher Educational Institute’s. Journal of Research Administration, 6(1).

Strupczewski, G. (2021). Defining cyber risk. Safety science, 135, 105143.

Thankappan, M., Rifà-Pous, H., & Garrigues, C. (2022). Multi-channel man-in-the-middle attacks against protected wi-fi networks: A state of the art review. Expert Systems with Applications, 118401.

Upadhyay, N. (2020). Demystifying blockchain: A critical analysis of challenges, applications and opportunities. International Journal of Information Management, 54, 102120.

van der Kleij, R., van ‘t Hoff—De Goede, S., van de Weijer, S., & Leukfeldt, R. (2023). Social engineering and the disclosure of personal identifiable information: Examining the relationship and moderating factors using a population-based survey experiment. Journal of Criminology, 26338076231162660.

Vasani, V., Bairwa, A. K., Joshi, S., Pljonkin, A., Kaur, M., & Amoon, M. (2023). Comprehensive analysis of advanced techniques and vital tools for detecting malware intrusion. Electronics, 12(20), 4299.

Wani, S., Imthiyas, M., Almohamedh, H., Alhamed, K. M., Almotairi, S., & Gulzar, Y. (2021). Distributed denial of service (DDoS) mitigation using blockchain—A comprehensive insight. Symmetry, 13(2), 227.

Published
2024-03-01
How to Cite
Sendjaja, T., Irwandi, Prastiawan, E., Suryani, Y., & Fatmawati, E. (2024). Cybersecurity In The Digital Age: Developing Robust Strategies To Protect Against Evolving Global Digital Threats And Cyber Attacks. International Journal of Science and Society, 6(1), 1008-1019. https://doi.org/10.54783/ijsoc.v6i1.1098