AN IMPROVED CYBER SECURITY FRAMEWORK FOR EDUCATION INSTITUTIONS IN INDONESIA

Authors

  • Syarif Hidayatulloh ARS University, bandung, Indonesia
  • Aedah Abd Rahman Asia e University, Kuala Lumpur, Malaysia

DOI:

https://doi.org/10.54443/ihert.v1i1.2

Keywords:

cyber security, educational technology, Security Framework

Abstract

One of the trends in the world of Education is Education technology. The COVID-19 pandemic forces us to accelerate using educational technology to keep the learning process in educational institutions around the world running. However, in adapting and using educational technology, it turns out that there is a factor of concern, namely cyber security. Because almost all educational technology platforms use the internet, cyber security is something that we inevitably have to deal with. Moreover, it turns out that during this covid19 pandemic, cybersecurity attacks have also increased along with the increase in the use of educational technology. Due to the high number of attacks and a large number of security holes in the Education technology platform adopted by educational institutions, So in this study, the authors will evaluate existing standards, models, and frameworks, identify fundamental and critical cybersecurity problems in several educational institutions in Indonesia, and propose a better security framework to address cybersecurity problems in educational technology in institutions.

Downloads

Download data is not yet available.

References

A.A, A. (2013). Information Security Management System: Emerging Issues and Prospect. IOSR Journal of Computer Engineering, 12(3), 96–102. https://doi.org/10.9790/0661-12396102

Abdul Majid, H., Abdul Majid, M., Ibrahim, M. I., Wan Manan, W. N. S., & Ramli, M. R. (2015). Investigation of security awareness on e-learning system among lecturers and students in Higher Education Institution. I4CT 2015 - 2015 2nd International Conference on Computer, Communications, and Control Technology, Art Proceeding, I4ct, 216–220. https://doi.org/10.1109/I4CT.2015.7219569

Adetoba B. T., A. O. and K. S. O. (2016). E-learning Security Issues and Challenges : A Review. Journal of Scientific Research and Studies, 3(5), 96–100.

Aldheleai, H. F., Bokhari, M. U., & Hamatta, H. S. A. (2015). User security in e-learning system. Proceedings - 2015 5th International Conference on Communication Systems and Network Technologies, CSNT 2015, 767–770. https://doi.org/10.1109/CSNT.2015.113

Bandara, I., Ioras, F., & Maher, K. (2014). Cyber Security Concerns in E-Learning Education. Proceedings of ICERI2014 Conference, November, 728–734.

Besimi, A., Shehu, V., Abazi-Bexheti, L., & Dika, Z. (2009). Managing security in a new learning management system (LMS). Proceedings of the International Conference on Information Technology Interfaces, ITI, 337–342. https://doi.org/10.1109/ITI.2009.5196105

Bhatia, M., Assistant Professor, SIES College of Arts, S. and C., Navi Mumbai, I., Meghnabhatia@rediffmail.com, Maitra, D. J. K., Professor, A., CS, D. of M. and, University, R., & Jabalpur, I. (2018). 2018 International Conference on Computational and Characterization Techniques in Engineering & Sciences (CCTES) : Integral University, Lucknow, India, Sep 14-15, 2018. 2018 International Conference on Computational and Characterization Techniques in Engineering & Sciences (CCTES), 276–285.

Bowen, P., Hash, J., & Wilson, M. (2006). Information Security Handbook: A Guide for Managers NIST Special Publication 800-100. NIST Special Publication 800-100, October, 137. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-100.pdf%0Ahttps://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-100.pdf

Buecker, A., Arunkumar, S., Blackshaw, B., Borrett, M., Brittenham, P., Flegr, J., Jacobs, J., Jeremic, V., Johnston, M., Mark, C., Marx, G., Daele, S. Van, & Vereecke, S. (2013). Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security. 1–240. http://www.redbooks.ibm.com/redbooks/pdfs/sg248100.pdf

Bustani, B., Khaddafi, M. ., & Nur Ilham, R. (2022). REGIONAL FINANCIAL MANAGEMENT SYSTEM OF REGENCY/CITY REGIONAL ORIGINAL INCOME IN ACEH PROVINCE PERIOD YEAR 2016-2020. International Journal of Educational Review, Law And Social Sciences (IJERLAS), 2(3), 459–468. https://doi.org/10.54443/ijerlas.v2i3.277

Calumpang, J. C., & Dilan, R. E. (2016). Evaluation Framework on System Security Requirements for Government-Owned Agencies in the Philippines. International Journal of Information and Education Technology, 6(5), 398–403. https://doi.org/10.7763/ijiet.2016.v6.721

Centre, N. C. S. (2019). Cyber Security Schools Audit 2019. 18.

Chaudhry, P. E., Chaudhry, S. S., Reese, R., & Jones, D. S. (2012). Enterprise information systems security: A conceptual framework. Lecture Notes in Business Information Processing, 105 LNBIP, 118–128. https://doi.org/10.1007/978-3-642-28827-2_9

CSA Singapore. (2017). Security-by-Design Framework. 1–51. https://www.csa.gov.sg/~/media/csa/documents/legislation_supplementary_references/security_by_design_framework.pdf

Department of Defense. (2019). Defense Industrial Base (DIB) Guide to Implementing the Cybersecurity Framework.

Derawi, M. (2015). E-learning protection of open access platforms. 2014 International Conference on Web and Open Access to Learning, ICWOAL 2014. https://doi.org/10.1109/ICWOAL.2014.7009238

Falahuddin, F., Fuadi, . F., Munandar, M., Juanda, R. ., & Nur Ilham, R. . (2022). INCREASING BUSINESS SUPPORTING CAPACITY IN MSMES BUSINESS GROUP TEMPE BUNGONG NANGGROE KERUPUK IN SYAMTALIRA ARON DISTRICT, UTARA ACEH REGENCY. IRPITAGE JOURNAL, 2(2), 65–68. https://doi.org/10.54443/irpitage.v2i2.313

Framework, T., & Clear, P. (2014). The Cybersecurity Framework in Action : An Intel Use Case. Intel, 50. www.nist.

Gashgari, G., Walters, R., & Wills, G. (2017). A proposed best-practice framework for information security governance. IoTBDS 2017 - Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, IoTBDS, 295–301. https://doi.org/10.5220/0006303102950301

Geovani, I. ., Nurkhotijah, S. ., Kurniawan, H. ., Milanie, F., & Nur Ilham, R. . (2021). JURIDICAL ANALYSIS OF VICTIMS OF THE ECONOMIC EXPLOITATION OF CHILDREN UNDER THE AGE TO REALIZE LEGAL PROTECTION FROM HUMAN RIGHTS ASPECTS: RESEARCH STUDY AT THE OFFICE OF SOCIAL AND COMMUNITY EMPOWERMENT IN BATAM CITY. International Journal of Educational Review, Law And Social Sciences (IJERLAS), 1(1), 45–52. https://doi.org/10.54443/ijerlas.v1i1.10

Goud, N. (2018). Students are responsible for cyber attacks on Universities and Colleges. Cybersecurity Insiders. https://www.cybersecurity-insiders.com/students-are-responsible-for-cyber-attacks-on-universities-and-colleges/

Haufe, K., Colomo-Palacios, R., Dzombeta, S., Brandis, K., & Stantchev, V. (2016). A process framework for information security management. International Journal of Information Systems and Project Management, 4(4), 27–47. https://doi.org/10.12821/ijispm040402

Ilham, Rico Nur. et all (2019). Investigation of the Bitcoin Effects on the Country Revenues via Virtual Tax Transactions for Purchasing Management. International Journal of Suplly Management.Volume 8 No.6 December 2019.

Ilham, Rico Nur. et all (2019).. Comparative of the Supply Chain and Block Chains to Increase the Country Revenues via Virtual Tax Transactions and Replacing Future of Money. International Journal of Suplly Management.Volume 8 No.5 August 2019.

Jianming, Y. (2007). Security modelling for e-Learning. Proceedings of the 2007 1st International Symposium on Information Technologies and Applications in Education, ISITAE 2007, 1–5. https://doi.org/10.1109/ISITAE.2007.4409226

Kemp, S. (2020). Digital 2020: Global Digital Overview. Hootsuite.

Koskosas, I. (2013). A Short Literature Review in Information Systems Security. Business Excellence and Management, 3(2), 5–15.

Lasta Irawan, A. ., Briggs, D. ., Muhammad Azami, T. ., & Nurfaliza, N. (2021). THE EFFECT OF POSITION PROMOTION ON EMPLOYEE SATISFACTION WITH COMPENSATION AS INTERVENING VARIABLES: (Case Study on Harvesting Employees of PT. Karya Hevea Indonesia). International Journal of Social Science, Educational, Economics, Agriculture Research, and Technology (IJSET), 1(1), 11–20. https://doi.org/10.54443/ijset.v1i1.2

likdanawati, likdanawati, Yanita, Y., Hamdiah, H., Nur Ilham, R., & Sinta, I. (2022). EFFECT OF ORGANIZATIONAL COMMITMENT, WORK MOTIVATION AND LEADERSHIP STYLE ON EMPLOYEE PERFORMANCE OF PT. ACEH DISTRIBUS INDO RAYA. International Journal of Social Science, Educational, Economics, Agriculture Research, and Technology (IJSET), 1(8), 377–382. https://doi.org/10.54443/ijset.v1i8.41

Mahfud, M., Yudiana, I. K., & Sariyanto, S. (2022). HISTORY OF BANYUWANGI KALIKLATAK PLANTATION AND ITS IMPACT ON SURROUNDING COMMUNITIES. International Journal of Educational Review, Law And Social Sciences (IJERLAS), 3(1), 91–104. https://doi.org/10.54443/ijerlas.v3i1.492

Mahfud et all (2021). PEMANFAATAN TRADISI RESIK LAWON SUKU USING SEBAGAI SUMBER BELAJAR SEJARAH LOKAL PADA SMA DI BANYUWANGI. Media Bina Ilmiah Vol.16 No.3 Oktober 2021. http://ejurnal.binawakya.or.id/index.php/MBI/article/view/1294/pdf

Mahfud et all (2020). Developing a Problem-Based Learning Model through E-Learning for Historical Subjects to Enhance Students Learning Outcomes at SMA Negeri 1 Rogojampi. IOP Conf. Series: Earth and Environmental Science 485 (2020) 012014 doi:10.1088/1755-1315/485/1/012014

Majied Sumatrani Saragih, M. ., Hikmah Saragih, U. ., & Nur Ilham, R. . (2021). RELATIONSHIP BETWEEN MOTIVATION AND EXTRINSIC MOTIVATION TO ICREASING ENTREPRENEURSHIP IMPLEMENTATION FROM SPP AL-FALAH GROUP AT BLOK 10 VILLAGE DOLOK MASIHUL. MORFAI JOURNAL, 1(1), 1–12. https://doi.org/10.54443/morfai.v1i1.11

Negara, E. S., & Andryani, R. (2014). A Review : Security Framework Information Technology for University Based on Cloud Computing. February, 20–21.

Nur Ilham, R. ., Arliansyah, A., Juanda, R., Multazam, M. ., & Saifanur, A. . (2021). RELATHIONSIP BETWEEN MONEY VELOCITY AND INFLATION TO INCREASING STOCK INVESTMENT RETURN: EFFECTIVE STRATEGIC BY JAKARTA AUTOMATED TRADING SYSTEM NEXT GENERATION (JATS-NG) PLATFORM. International Journal of Economic, Business, Accounting, Agriculture Management and Sharia Administration (IJEBAS), 1(1), 87–92. https://doi.org/10.54443/ijebas.v1i1.27

Nur Ilham, R., Heikal, M. ., Khaddafi, M. ., F, F., Ichsan, I., F, F., Abbas, D. ., Fauzul Hakim Hasibuan, A. ., Munandar, M., & Chalirafi, C. (2021). Survey of Leading Commodities Of Aceh Province As Academic Effort To Join And Build The Country. IRPITAGE JOURNAL, 1(1), 13–18. https://doi.org/10.54443/irpitage.v1i1.19

Nur ilham, R., Likdanawati, L., Hamdiah, H., Adnan, A., & Sinta, I. . (2022). COMMUNITY SERVICE ACTIVITIES “SOCIALIZATION AVOID STUDY INVESTMENT” TO THE STUDENT BOND OF SERDANG BEDAGAI. IRPITAGE JOURNAL, 2(2), 61–64. https://doi.org/10.54443/irpitage.v2i2.312

Nur Ilham, R., Arliansyah, A., Juanda, R. ., Sinta, I. ., Multazam, M. ., & Syahputri, L. . (2022). APPLICATION OF GOOD CORPORATE GOVERNANCE PRINCIPLES IN IMPROVING BENEFITS OF STATE-OWNED ENTERPRISES (An Emperical Evidence from Indonesian Stock Exchange at Moment of Covid-19). International Journal of Economic, Business, Accounting, Agriculture Management and Sharia Administration (IJEBAS), 2(5), 761–772. https://doi.org/10.54443/ijebas.v2i5.410

Nur ilham, R., Likdanawati, L., Hamdiah, H., Adnan, A., & Sinta, I. . (2022). COMMUNITY SERVICE ACTIVITIES “SOCIALIZATION AVOID STUDY INVESTMENT” TO THE STUDENT BOND OF SERDANG BEDAGAI. IRPITAGE JOURNAL, 2(2), 61–64. https://doi.org/10.54443/irpitage.v2i2.312

Nur Ilham, R., Arliansyah, A., Juanda, R. ., Sinta, I. ., Multazam, M. ., & Syahputri, L. . (2022). APPLICATION OF GOOD CORPORATE GOVERNANCE PRINCIPLES IN IMPROVING BENEFITS OF STATE-OWNED ENTERPRISES (An Emperical Evidence from Indonesian Stock Exchange at Moment of Covid-19). International Journal of Economic, Business, Accounting, Agriculture Management and Sharia Administration (IJEBAS), 2(5), 761–772. https://doi.org/10.54443/ijebas.v2i5.410

Oriyano, S.-P. (2017). Issaf. CEHTMv9, 549–564. https://doi.org/10.1002/9781119419303.app2

Patil, J. (2008). INFORMATION SECURITY FRAMEWORK: CASE STUDY OF A MANUFACTURING ORGANIZATION. Master Thesis, 1, 461. https://www.bertelsmann-stiftung.de/fileadmin/files/BSt/Publikationen/GrauePublikationen/MT_Globalization_Report_2018.pdf%0Ahttp://eprints.lse.ac.uk/43447/1/India_globalisation%2C society and inequalities%28lsero%29.pdf%0Ahttps://www.quora.com/What-is-the

Rahmaniar, R., Subhan, S., Saharuddin, S., Nur Ilham, R. ., & Anwar, K. . (2022). THE INFLUENCE OF ENTREPRENEURSHIP ASPECTS ON THE SUCCESS OF THE CHIPS INDUSTRY IN MATANG GLUMPANG DUA AND PANTON PUMP. International Journal of Social Science, Educational, Economics, Agriculture Research, and Technology (IJSET), 1(7), 337–348. https://doi.org/10.54443/ijset.v1i7.36

Rico Nur Ilham, Irada Sinta, & Mangasi Sinurat. (2022). THE EFFECT OF TECHNICAL ANALYSIS ON CRYPTOCURRENCY INVESTMENT RETURNS WITH THE 5 (FIVE) HIGHEST MARKET CAPITALIZATIONS IN INDONESIA. Jurnal Ekonomi, 11(02), 1022–1035. Retrieved from http://ejournal.seaninstitute.or.id/index.php/Ekonomi/article/view/481

Sadowsky, G., Dempsey, J. X., Greenberg, A., Mack, B. J., & Schwartz, A. (2003). Information Technology Security Handbook. http://infodev.org

Salimovna, F. D. (2019). Security issues in E-Learning system.

Sandi, H. ., Afni Yunita, N. ., Heikal, M. ., Nur Ilham, R. ., & Sinta, I. . (2021). RELATIONSHIP BETWEEN BUDGET PARTICIPATION, JOB CHARACTERISTICS, EMOTIONAL INTELLIGENCE AND WORK MOTIVATION AS MEDIATOR VARIABLES TO STRENGTHENING USER POWER PERFORMANCE: AN EMPERICAL EVIDENCE FROM INDONESIA GOVERNMENT. MORFAI JOURNAL, 1(1), 36–48. https://doi.org/10.54443/morfai.v1i1.14

Saudi Arabian Monetary Authority (SAMA). (2017). Cyber Security Framework. May, 1–56. http://www.sama.gov.sa/en-US/Laws/BankingRules/SAMA Cyber Security Framework.pdf

Savulescu, C., Polkowski, Z., Cosmin, D. I., & Elena, B. C. (2015). Security in e-learning systems. Proceedings of the 2015 7th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2015, WE19–WE24. https://doi.org/10.1109/ECAI.2015.7301225

Shen, Y.-T., Lin, F., Tapie Rohm, C., & Tapie, C. (2009). A Framework for Enterprise Security Architecture and Its Application in Information Security Incident Management. Communications of the IIMA, 9(4). http://scholarworks.lib.csusb.edu/ciimahttp://scholarworks.lib.csusb.edu/ciima/vol9/iss4/2

Shivshankar, S., & Paul, S. (2016). E-Learning Environment-The Security and Privacy Challenges Focusing on the Counter Measures. Proceedings - 2015 International Conference on Developments in ESystems Engineering, DeSE 2015, 176–179. https://doi.org/10.1109/DeSE.2015.31

Sinurat, M. ., Heikal, M. ., Simanjuntak, A. ., Siahaan, R. ., & Nur Ilham, R. . (2021). PRODUCT QUALITY ON CONSUMER PURCHASE INTEREST WITH CUSTOMER SATISFACTION AS A VARIABLE INTERVENING IN BLACK ONLINE STORE HIGH CLICK MARKET: Case Study on Customers of the Tebing Tinggi Black Market Online Store. MORFAI JOURNAL, 1(1), 13–21. https://doi.org/10.54443/morfai.v1i1.12

Stewart, J. M. (2016). Cybersecurity Frameworks to Consider for Organization-wide Integration. 1–9. www.globalknowledge.com

Ula, M., Ismail, Z., & Sidek, Z. (2011). A Framework for the Governance of Information Security in Banking System. Journal of Information Assurance & Cybersecurity, 2011, 1–12. https://doi.org/10.5171/2011.726196

Violettas, G. E., Theodorou, T. L., & Stephanides, G. C. (2013). E-learning software security: Tested for security vulnerabilities and issues. Proceedings - 2013 4th International Conference on e-Learning Best Practices in Management, Design and Development of e-Courses: Standards of Excellence and Creativity, ECONF 2013, 233–240. https://doi.org/10.1109/ECONF.2013.66

Wijayanto, H., & Kom, M. (2020). P O L I C Y B R I E F KESIAPAN PERGURUAN TINGGI WILAYAH JAWA TENGAH DALAM MENGHADAPI SERANGAN SIBER.

Wayan Mertha, I. ., & Mahfud, M. (2022). HISTORY LEARNING BASED ON WORDWALL APPLICATIONS TO IMPROVE STUDENT LEARNING RESULTS CLASS X IPS IN MA AS’ADIYAH KETAPANG. International Journal of Educational Review, Law And Social Sciences (IJERLAS), 2(5), 507–612. https://doi.org/10.54443/ijerlas.v2i5.369

Yusuf Iis, E., Wahyuddin, W., Thoyib, A., Nur Ilham, R., & Sinta, I. (2022). THE EFFECT OF CAREER DEVELOPMENT AND WORK ENVIRONMENT ON EMPLOYEE PERFORMANCE WITH WORK MOTIVATION AS INTERVENING VARIABLE AT THE OFFICE OF AGRICULTURE AND LIVESTOCK IN ACEH. International Journal of Economic, Business, Accounting, Agriculture Management and Sharia Administration (IJEBAS), 2(2), 227–236. https://doi.org/10.54443/ijebas.v2i2.191

Downloads

Published

2019-12-30

How to Cite

Hidayatulloh, S., & Abd Rahman, A. (2019). AN IMPROVED CYBER SECURITY FRAMEWORK FOR EDUCATION INSTITUTIONS IN INDONESIA. International Conference on Health Science, Green Economics, Educational Review and Technology, 1(1), 1–10. https://doi.org/10.54443/ihert.v1i1.2

Similar Articles

<< < 1 2 3 4 5 6 

You may also start an advanced similarity search for this article.