AN IMPROVED CYBER SECURITY FRAMEWORK FOR EDUCATION INSTITUTIONS IN INDONESIA
Main Article Content
One of the trends in the world of Education is Education technology. The COVID-19 pandemic forces us to accelerate using educational technology to keep the learning process in educational institutions around the world running. However, in adapting and using educational technology, it turns out that there is a factor of concern, namely cyber security. Because almost all educational technology platforms use the internet, cyber security is something that we inevitably have to deal with. Moreover, it turns out that during this covid19 pandemic, cybersecurity attacks have also increased along with the increase in the use of educational technology. Due to the high number of attacks and a large number of security holes in the Education technology platform adopted by educational institutions, So in this study, the authors will evaluate existing standards, models, and frameworks, identify fundamental and critical cybersecurity problems in several educational institutions in Indonesia, and propose a better security framework to address cybersecurity problems in educational technology in institutions.
A.A, A. (2013). Information Security Management System: Emerging Issues and Prospect. IOSR Journal of Computer Engineering, 12(3), 96–102. https://doi.org/10.9790/0661-12396102
Abdul Majid, H., Abdul Majid, M., Ibrahim, M. I., Wan Manan, W. N. S., & Ramli, M. R. (2015). Investigation of security awareness on e-learning system among lecturers and students in Higher Education Institution. I4CT 2015 - 2015 2nd International Conference on Computer, Communications, and Control Technology, Art Proceeding, I4ct, 216–220. https://doi.org/10.1109/I4CT.2015.7219569
Adetoba B. T., A. O. and K. S. O. (2016). E-learning Security Issues and Challenges : A Review. Journal of Scientific Research and Studies, 3(5), 96–100.
Aldheleai, H. F., Bokhari, M. U., & Hamatta, H. S. A. (2015). User security in e-learning system. Proceedings - 2015 5th International Conference on Communication Systems and Network Technologies, CSNT 2015, 767–770. https://doi.org/10.1109/CSNT.2015.113
Bandara, I., Ioras, F., & Maher, K. (2014). Cyber Security Concerns in E-Learning Education. Proceedings of ICERI2014 Conference, November, 728–734.
Besimi, A., Shehu, V., Abazi-Bexheti, L., & Dika, Z. (2009). Managing security in a new learning management system (LMS). Proceedings of the International Conference on Information Technology Interfaces, ITI, 337–342. https://doi.org/10.1109/ITI.2009.5196105
Bhatia, M., Assistant Professor, SIES College of Arts, S. and C., Navi Mumbai, I., Meghnabhatia@rediffmail.com, Maitra, D. J. K., Professor, A., CS, D. of M. and, University, R., & Jabalpur, I. (2018). 2018 International Conference on Computational and Characterization Techniques in Engineering & Sciences (CCTES) : Integral University, Lucknow, India, Sep 14-15, 2018. 2018 International Conference on Computational and Characterization Techniques in Engineering & Sciences (CCTES), 276–285.
Bowen, P., Hash, J., & Wilson, M. (2006). Information Security Handbook: A Guide for Managers NIST Special Publication 800-100. NIST Special Publication 800-100, October, 137. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-100.pdf%0Ahttps://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-100.pdf
Buecker, A., Arunkumar, S., Blackshaw, B., Borrett, M., Brittenham, P., Flegr, J., Jacobs, J., Jeremic, V., Johnston, M., Mark, C., Marx, G., Daele, S. Van, & Vereecke, S. (2013). Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security. 1–240. http://www.redbooks.ibm.com/redbooks/pdfs/sg248100.pdf
Bustani, B., Khaddafi, M. ., & Nur Ilham, R. (2022). REGIONAL FINANCIAL MANAGEMENT SYSTEM OF REGENCY/CITY REGIONAL ORIGINAL INCOME IN ACEH PROVINCE PERIOD YEAR 2016-2020. International Journal of Educational Review, Law And Social Sciences (IJERLAS), 2(3), 459–468. https://doi.org/10.54443/ijerlas.v2i3.277
Calumpang, J. C., & Dilan, R. E. (2016). Evaluation Framework on System Security Requirements for Government-Owned Agencies in the Philippines. International Journal of Information and Education Technology, 6(5), 398–403. https://doi.org/10.7763/ijiet.2016.v6.721
Centre, N. C. S. (2019). Cyber Security Schools Audit 2019. 18.
Chaudhry, P. E., Chaudhry, S. S., Reese, R., & Jones, D. S. (2012). Enterprise information systems security: A conceptual framework. Lecture Notes in Business Information Processing, 105 LNBIP, 118–128. https://doi.org/10.1007/978-3-642-28827-2_9
CSA Singapore. (2017). Security-by-Design Framework. 1–51. https://www.csa.gov.sg/~/media/csa/documents/legislation_supplementary_references/security_by_design_framework.pdf
Department of Defense. (2019). Defense Industrial Base (DIB) Guide to Implementing the Cybersecurity Framework.
Derawi, M. (2015). E-learning protection of open access platforms. 2014 International Conference on Web and Open Access to Learning, ICWOAL 2014. https://doi.org/10.1109/ICWOAL.2014.7009238
Falahuddin, F., Fuadi, . F., Munandar, M., Juanda, R. ., & Nur Ilham, R. . (2022). INCREASING BUSINESS SUPPORTING CAPACITY IN MSMES BUSINESS GROUP TEMPE BUNGONG NANGGROE KERUPUK IN SYAMTALIRA ARON DISTRICT, UTARA ACEH REGENCY. IRPITAGE JOURNAL, 2(2), 65–68. https://doi.org/10.54443/irpitage.v2i2.313
Framework, T., & Clear, P. (2014). The Cybersecurity Framework in Action : An Intel Use Case. Intel, 50. www.nist.
Gashgari, G., Walters, R., & Wills, G. (2017). A proposed best-practice framework for information security governance. IoTBDS 2017 - Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, IoTBDS, 295–301. https://doi.org/10.5220/0006303102950301
Geovani, I. ., Nurkhotijah, S. ., Kurniawan, H. ., Milanie, F., & Nur Ilham, R. . (2021). JURIDICAL ANALYSIS OF VICTIMS OF THE ECONOMIC EXPLOITATION OF CHILDREN UNDER THE AGE TO REALIZE LEGAL PROTECTION FROM HUMAN RIGHTS ASPECTS: RESEARCH STUDY AT THE OFFICE OF SOCIAL AND COMMUNITY EMPOWERMENT IN BATAM CITY. International Journal of Educational Review, Law And Social Sciences (IJERLAS), 1(1), 45–52. https://doi.org/10.54443/ijerlas.v1i1.10
Goud, N. (2018). Students are responsible for cyber attacks on Universities and Colleges. Cybersecurity Insiders. https://www.cybersecurity-insiders.com/students-are-responsible-for-cyber-attacks-on-universities-and-colleges/
Haufe, K., Colomo-Palacios, R., Dzombeta, S., Brandis, K., & Stantchev, V. (2016). A process framework for information security management. International Journal of Information Systems and Project Management, 4(4), 27–47. https://doi.org/10.12821/ijispm040402
Ilham, Rico Nur. et all (2019). Investigation of the Bitcoin Effects on the Country Revenues via Virtual Tax Transactions for Purchasing Management. International Journal of Suplly Management.Volume 8 No.6 December 2019.
Ilham, Rico Nur. et all (2019).. Comparative of the Supply Chain and Block Chains to Increase the Country Revenues via Virtual Tax Transactions and Replacing Future of Money. International Journal of Suplly Management.Volume 8 No.5 August 2019.
Jianming, Y. (2007). Security modelling for e-Learning. Proceedings of the 2007 1st International Symposium on Information Technologies and Applications in Education, ISITAE 2007, 1–5. https://doi.org/10.1109/ISITAE.2007.4409226
Kemp, S. (2020). Digital 2020: Global Digital Overview. Hootsuite.
Koskosas, I. (2013). A Short Literature Review in Information Systems Security. Business Excellence and Management, 3(2), 5–15.
Lasta Irawan, A. ., Briggs, D. ., Muhammad Azami, T. ., & Nurfaliza, N. (2021). THE EFFECT OF POSITION PROMOTION ON EMPLOYEE SATISFACTION WITH COMPENSATION AS INTERVENING VARIABLES: (Case Study on Harvesting Employees of PT. Karya Hevea Indonesia). International Journal of Social Science, Educational, Economics, Agriculture Research, and Technology (IJSET), 1(1), 11–20. https://doi.org/10.54443/ijset.v1i1.2
likdanawati, likdanawati, Yanita, Y., Hamdiah, H., Nur Ilham, R., & Sinta, I. (2022). EFFECT OF ORGANIZATIONAL COMMITMENT, WORK MOTIVATION AND LEADERSHIP STYLE ON EMPLOYEE PERFORMANCE OF PT. ACEH DISTRIBUS INDO RAYA. International Journal of Social Science, Educational, Economics, Agriculture Research, and Technology (IJSET), 1(8), 377–382. https://doi.org/10.54443/ijset.v1i8.41
Mahfud, M., Yudiana, I. K., & Sariyanto, S. (2022). HISTORY OF BANYUWANGI KALIKLATAK PLANTATION AND ITS IMPACT ON SURROUNDING COMMUNITIES. International Journal of Educational Review, Law And Social Sciences (IJERLAS), 3(1), 91–104. https://doi.org/10.54443/ijerlas.v3i1.492
Mahfud et all (2021). PEMANFAATAN TRADISI RESIK LAWON SUKU USING SEBAGAI SUMBER BELAJAR SEJARAH LOKAL PADA SMA DI BANYUWANGI. Media Bina Ilmiah Vol.16 No.3 Oktober 2021. http://ejurnal.binawakya.or.id/index.php/MBI/article/view/1294/pdf
Mahfud et all (2020). Developing a Problem-Based Learning Model through E-Learning for Historical Subjects to Enhance Students Learning Outcomes at SMA Negeri 1 Rogojampi. IOP Conf. Series: Earth and Environmental Science 485 (2020) 012014 doi:10.1088/1755-1315/485/1/012014
Majied Sumatrani Saragih, M. ., Hikmah Saragih, U. ., & Nur Ilham, R. . (2021). RELATIONSHIP BETWEEN MOTIVATION AND EXTRINSIC MOTIVATION TO ICREASING ENTREPRENEURSHIP IMPLEMENTATION FROM SPP AL-FALAH GROUP AT BLOK 10 VILLAGE DOLOK MASIHUL. MORFAI JOURNAL, 1(1), 1–12. https://doi.org/10.54443/morfai.v1i1.11
Negara, E. S., & Andryani, R. (2014). A Review : Security Framework Information Technology for University Based on Cloud Computing. February, 20–21.
Nur Ilham, R. ., Arliansyah, A., Juanda, R., Multazam, M. ., & Saifanur, A. . (2021). RELATHIONSIP BETWEEN MONEY VELOCITY AND INFLATION TO INCREASING STOCK INVESTMENT RETURN: EFFECTIVE STRATEGIC BY JAKARTA AUTOMATED TRADING SYSTEM NEXT GENERATION (JATS-NG) PLATFORM. International Journal of Economic, Business, Accounting, Agriculture Management and Sharia Administration (IJEBAS), 1(1), 87–92. https://doi.org/10.54443/ijebas.v1i1.27
Nur Ilham, R., Heikal, M. ., Khaddafi, M. ., F, F., Ichsan, I., F, F., Abbas, D. ., Fauzul Hakim Hasibuan, A. ., Munandar, M., & Chalirafi, C. (2021). Survey of Leading Commodities Of Aceh Province As Academic Effort To Join And Build The Country. IRPITAGE JOURNAL, 1(1), 13–18. https://doi.org/10.54443/irpitage.v1i1.19
Nur ilham, R., Likdanawati, L., Hamdiah, H., Adnan, A., & Sinta, I. . (2022). COMMUNITY SERVICE ACTIVITIES “SOCIALIZATION AVOID STUDY INVESTMENT” TO THE STUDENT BOND OF SERDANG BEDAGAI. IRPITAGE JOURNAL, 2(2), 61–64. https://doi.org/10.54443/irpitage.v2i2.312
Nur Ilham, R., Arliansyah, A., Juanda, R. ., Sinta, I. ., Multazam, M. ., & Syahputri, L. . (2022). APPLICATION OF GOOD CORPORATE GOVERNANCE PRINCIPLES IN IMPROVING BENEFITS OF STATE-OWNED ENTERPRISES (An Emperical Evidence from Indonesian Stock Exchange at Moment of Covid-19). International Journal of Economic, Business, Accounting, Agriculture Management and Sharia Administration (IJEBAS), 2(5), 761–772. https://doi.org/10.54443/ijebas.v2i5.410
Nur ilham, R., Likdanawati, L., Hamdiah, H., Adnan, A., & Sinta, I. . (2022). COMMUNITY SERVICE ACTIVITIES “SOCIALIZATION AVOID STUDY INVESTMENT” TO THE STUDENT BOND OF SERDANG BEDAGAI. IRPITAGE JOURNAL, 2(2), 61–64. https://doi.org/10.54443/irpitage.v2i2.312
Nur Ilham, R., Arliansyah, A., Juanda, R. ., Sinta, I. ., Multazam, M. ., & Syahputri, L. . (2022). APPLICATION OF GOOD CORPORATE GOVERNANCE PRINCIPLES IN IMPROVING BENEFITS OF STATE-OWNED ENTERPRISES (An Emperical Evidence from Indonesian Stock Exchange at Moment of Covid-19). International Journal of Economic, Business, Accounting, Agriculture Management and Sharia Administration (IJEBAS), 2(5), 761–772. https://doi.org/10.54443/ijebas.v2i5.410
Oriyano, S.-P. (2017). Issaf. CEHTMv9, 549–564. https://doi.org/10.1002/9781119419303.app2
Patil, J. (2008). INFORMATION SECURITY FRAMEWORK: CASE STUDY OF A MANUFACTURING ORGANIZATION. Master Thesis, 1, 461. https://www.bertelsmann-stiftung.de/fileadmin/files/BSt/Publikationen/GrauePublikationen/MT_Globalization_Report_2018.pdf%0Ahttp://eprints.lse.ac.uk/43447/1/India_globalisation%2C society and inequalities%28lsero%29.pdf%0Ahttps://www.quora.com/What-is-the
Rahmaniar, R., Subhan, S., Saharuddin, S., Nur Ilham, R. ., & Anwar, K. . (2022). THE INFLUENCE OF ENTREPRENEURSHIP ASPECTS ON THE SUCCESS OF THE CHIPS INDUSTRY IN MATANG GLUMPANG DUA AND PANTON PUMP. International Journal of Social Science, Educational, Economics, Agriculture Research, and Technology (IJSET), 1(7), 337–348. https://doi.org/10.54443/ijset.v1i7.36
Rico Nur Ilham, Irada Sinta, & Mangasi Sinurat. (2022). THE EFFECT OF TECHNICAL ANALYSIS ON CRYPTOCURRENCY INVESTMENT RETURNS WITH THE 5 (FIVE) HIGHEST MARKET CAPITALIZATIONS IN INDONESIA. Jurnal Ekonomi, 11(02), 1022–1035. Retrieved from http://ejournal.seaninstitute.or.id/index.php/Ekonomi/article/view/481
Sadowsky, G., Dempsey, J. X., Greenberg, A., Mack, B. J., & Schwartz, A. (2003). Information Technology Security Handbook. http://infodev.org
Salimovna, F. D. (2019). Security issues in E-Learning system.
Sandi, H. ., Afni Yunita, N. ., Heikal, M. ., Nur Ilham, R. ., & Sinta, I. . (2021). RELATIONSHIP BETWEEN BUDGET PARTICIPATION, JOB CHARACTERISTICS, EMOTIONAL INTELLIGENCE AND WORK MOTIVATION AS MEDIATOR VARIABLES TO STRENGTHENING USER POWER PERFORMANCE: AN EMPERICAL EVIDENCE FROM INDONESIA GOVERNMENT. MORFAI JOURNAL, 1(1), 36–48. https://doi.org/10.54443/morfai.v1i1.14
Saudi Arabian Monetary Authority (SAMA). (2017). Cyber Security Framework. May, 1–56. http://www.sama.gov.sa/en-US/Laws/BankingRules/SAMA Cyber Security Framework.pdf
Savulescu, C., Polkowski, Z., Cosmin, D. I., & Elena, B. C. (2015). Security in e-learning systems. Proceedings of the 2015 7th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2015, WE19–WE24. https://doi.org/10.1109/ECAI.2015.7301225
Shen, Y.-T., Lin, F., Tapie Rohm, C., & Tapie, C. (2009). A Framework for Enterprise Security Architecture and Its Application in Information Security Incident Management. Communications of the IIMA, 9(4). http://scholarworks.lib.csusb.edu/ciimahttp://scholarworks.lib.csusb.edu/ciima/vol9/iss4/2
Shivshankar, S., & Paul, S. (2016). E-Learning Environment-The Security and Privacy Challenges Focusing on the Counter Measures. Proceedings - 2015 International Conference on Developments in ESystems Engineering, DeSE 2015, 176–179. https://doi.org/10.1109/DeSE.2015.31
Sinurat, M. ., Heikal, M. ., Simanjuntak, A. ., Siahaan, R. ., & Nur Ilham, R. . (2021). PRODUCT QUALITY ON CONSUMER PURCHASE INTEREST WITH CUSTOMER SATISFACTION AS A VARIABLE INTERVENING IN BLACK ONLINE STORE HIGH CLICK MARKET: Case Study on Customers of the Tebing Tinggi Black Market Online Store. MORFAI JOURNAL, 1(1), 13–21. https://doi.org/10.54443/morfai.v1i1.12
Stewart, J. M. (2016). Cybersecurity Frameworks to Consider for Organization-wide Integration. 1–9. www.globalknowledge.com
Ula, M., Ismail, Z., & Sidek, Z. (2011). A Framework for the Governance of Information Security in Banking System. Journal of Information Assurance & Cybersecurity, 2011, 1–12. https://doi.org/10.5171/2011.726196
Violettas, G. E., Theodorou, T. L., & Stephanides, G. C. (2013). E-learning software security: Tested for security vulnerabilities and issues. Proceedings - 2013 4th International Conference on e-Learning Best Practices in Management, Design and Development of e-Courses: Standards of Excellence and Creativity, ECONF 2013, 233–240. https://doi.org/10.1109/ECONF.2013.66
Wijayanto, H., & Kom, M. (2020). P O L I C Y B R I E F KESIAPAN PERGURUAN TINGGI WILAYAH JAWA TENGAH DALAM MENGHADAPI SERANGAN SIBER.
Wayan Mertha, I. ., & Mahfud, M. (2022). HISTORY LEARNING BASED ON WORDWALL APPLICATIONS TO IMPROVE STUDENT LEARNING RESULTS CLASS X IPS IN MA AS’ADIYAH KETAPANG. International Journal of Educational Review, Law And Social Sciences (IJERLAS), 2(5), 507–612. https://doi.org/10.54443/ijerlas.v2i5.369
Yusuf Iis, E., Wahyuddin, W., Thoyib, A., Nur Ilham, R., & Sinta, I. (2022). THE EFFECT OF CAREER DEVELOPMENT AND WORK ENVIRONMENT ON EMPLOYEE PERFORMANCE WITH WORK MOTIVATION AS INTERVENING VARIABLE AT THE OFFICE OF AGRICULTURE AND LIVESTOCK IN ACEH. International Journal of Economic, Business, Accounting, Agriculture Management and Sharia Administration (IJEBAS), 2(2), 227–236. https://doi.org/10.54443/ijebas.v2i2.191