Literature Review on Computer Network Security in the Financial Sector in Indonesia Challenges and Solutions in Facing Digital Security Threats

Authors

  • Loso Judijanto IPOSS Jakarta Author
  • Faiz Muqorrir Kaaffah IAIN Syekh Nurjati Cirebon Author
  • Hanifah Nurul Muthmainah Universitas Siber Muhammadiyah Author
  • Arnes Yuli Vandika Universitas Bandar Lampung Author

DOI:

https://doi.org/10.58812/g28gwk06

Keywords:

Financial Sector Digitalization, Computer Network Security, Cybersecurity Challenges in Indonesia, Collaborative Solutions for Financial Cybersecurity

Abstract

In an era of rapid digitalization, the financial sector in Indonesia faces a transformative landscape, marked by technological innovation and an escalating array of digital security threats. This literature review explores the pivotal role of computer network security in safeguarding financial data, transactions, and customer trust within this dynamic context. As Indonesia's financial industry embraces digitalization, it becomes an appealing target for cybercriminals, necessitating a robust cybersecurity framework. Challenges such as resource constraints, evolving threats, and complex compliance issues underscore the need for collaborative efforts among financial institutions, policymakers, and stakeholders. This review comprehensively investigates the state of computer network security, identifies vulnerabilities and challenges, proposes effective solutions, and offers recommendations to fortify the cybersecurity posture of Indonesia's financial sector, underscoring its significance in an interconnected digital world.

Downloads

Download data is not yet available.

References

P. P. Sugarda and M. R. Wicaksono, “ENHANCING THE COMPETITIVENESS OF INDONESIA’S FINANCIAL SERVICES SECTOR IN THE DIGITAL ERA THROUGH OPEN BANKING: LESSONS LEARNED FROM THE UK’S EXPERIENCE,” Journal of Central Banking Law and Institutions, vol. 2, no. 1, pp. 153–178, 2023.

S. Atkins and C. Lawson, “Cooperation amidst competition: cybersecurity partnership in the US financial services sector,” J Cybersecur, vol. 7, no. 1, p. tyab024, 2021.

A. I. Al-Alawi and M. S. A. Al-Bassam, “The significance of cybersecurity system in helping managing risk in banking and financial sector,” Journal of Xidian University, vol. 14, no. 7, pp. 1523–1536, 2020.

H. Muttaqin and K. Ramli, “Designing An Information Security Framework For The Indonesia Water Industry Sector,” Cakrawala Repositori IMWI, vol. 6, no. 3, pp. 771–780, 2023.

I. Harsono and I. A. P. Suprapti, “The Role of Fintech in Transforming Traditional Financial Services,” Accounting Studies and Tax Journal (COUNT), vol. 1, no. 1, pp. 81–91, 2024.

M. Sidik, “Cyber Security Applied For Financial Sector In Indonesia,” Jurnal Pajak dan Bisnis (Journal of Tax and Business), vol. 1, no. 1, pp. 30–47, 2020.

A. Muftiasa, L. A. Wibowo, and A. Rahayu, “Is intellectual capital related to telecommunications industry financial performance during COVID-19?,” International Journal of Learning and Intellectual Capital, vol. 20, no. 1, pp. 29–46, 2023.

N. Surantha, F. Ivan, and R. Chandra, “A case analysis for Kubernetes network security of financial service industry in Indonesia using zero trust model,” Bulletin of Electrical Engineering and Informatics, vol. 12, no. 5, pp. 3134–3141, 2023.

M. A. Kafi and N. Akter, “Securing financial information in the digital realm: case studies in cybersecurity for accounting data protection,” American Journal of Trade and Policy, vol. 10, no. 1, pp. 15–26, 2023.

D. Riristuningsia, I. H. Wahyunadi, and I. Harsono, “Public Participation in Rural Development Planning,” Jurnal Ekonomi dan Studi Pembangunan, vol. 9, no. 1, pp. 57–65, 2017.

S. Vaithyasubramanian, A. Christy, and D. Saravanan, “Two factor authentications for secured login in support of effective information preservation and network security,” ARPN Journal of Engineering and Applied Sciences, vol. 10, no. 5, pp. 2053–2056, 2015.

I. HARSONO, “The Impact Of E-Money On Inflation In Indonesia,” Ganec Swara, vol. 17, no. 3, pp. 1160–1164, 2023.

M. A. Rahman, “Subduing Cyber Threats to Secure the Financial Sector of Bangladesh,” Cybersecurity, Privacy, & Networks eJournal, vol. 2, no. 78, 2019.

M. R. Islam and M. M. Rashid, “A Survey on Blockchain Security and Its Impact Analysis,” in 2023 9th International Conference on Computer and Communication Engineering (ICCCE), IEEE, 2023, pp. 317–321.

H. U. Khan, M. Z. Malik, S. Nazir, and F. Khan, “Utilizing bio metric system for enhancing cyber security in banking sector: a systematic analysis,” IEEE Access, 2023.

I. Harsono, “Determinants of Economic Growth, Poverty, and Unemployment: A Path Analysis Study,” Jurnal Ilmu Sosial dan Humaniora, vol. 12, no. 2, pp. 359–366, 2023.

S. Dambra, L. Bilge, and D. Balzarotti, “SoK: Cyber insurance–technical challenges and a system security roadmap,” in 2020 IEEE Symposium on Security and Privacy (SP), IEEE, 2020, pp. 1367–1383.

L. Judijanto, R. L. Rahardian, H. N. Muthmainah, and M. Erkamim, “Analysis of Threat Detection, Prevention Strategies, and Cyber Risk Management for Computer Network Security in Government Information Systems in Indonesia,” West Science Information System and Technology, vol. 1, no. 02, pp. 90–98, 2023.

D. Setyantoro, V. Afifah, R. A. Hasibuan, N. Aprilia, and N. P. Sari, “The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS,” JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer), vol. 7, no. 2, pp. 105–110, 2022.

S. Mishra, “Exploring the Impact of AI-Based Cyber Security Financial Sector Management,” Applied Sciences, vol. 13, no. 10, p. 5875, 2023.

A. Y. A. B. Ahmad, S. S. Kumari, S. MahabubBasha, S. K. Guha, A. Gehlot, and B. Pant, “Blockchain Implementation in Financial Sector and Cyber Security System,” in 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), IEEE, 2023, pp. 586–590.

S. D. Rosadi, S. Yuniarti, and R. Fauzi, “Protection of Data Privacy in The Era of Artificial Intelligence in The Financial Sector in Indonesia,” Journal of Central Banking Law and Institutions, vol. 1, no. 2, pp. 353–366, 2022.

C. Alcaraz and J. Lopez, “Digital twin: A comprehensive survey of security threats,” IEEE Communications Surveys & Tutorials, vol. 24, no. 3, pp. 1475–1503, 2022.

B. Hammi, S. Zeadally, and J. Nebhen, “Security threats, countermeasures, and challenges of digital supply chains,” ACM Comput Surv, 2023.

H. M. Alzoubi et al., “Cyber Security Threats on Digital Banking,” in 2022 1st International Conference on AI in Cybersecurity (ICAIC), IEEE, 2022, pp. 1–4.

A. N. Alahmadi, S. U. Rehman, H. S. Alhazmi, D. G. Glynn, H. Shoaib, and P. Solé, “Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture,” Sensors, vol. 22, no. 9, p. 3520, 2022.

J. Zhang, “Research on Information Security Threats and Defense Strategies of Smart Grid,” in E3S Web of Conferences, EDP Sciences, 2020, p. 02003.

M. A. Haque, S. Haque, K. Kumar, and N. K. Singh, “A comprehensive study of cyber security attacks, classification, and countermeasures in the internet of things,” in Handbook of research on digital transformation and challenges to data security and privacy, IGI Global, 2021, pp. 63–90.

J. Zhang, “Research on Information Security Threats and Defense Strategies of Smart Grid,” in E3S Web of Conferences, EDP Sciences, 2020, p. 02003.

S. El Kafhali, I. El Mir, and M. Hanini, “Security threats, defense mechanisms, challenges, and future directions in cloud computing,” Archives of Computational Methods in Engineering, vol. 29, no. 1, pp. 223–246, 2022.

M. Xue, C. Yuan, H. Wu, Y. Zhang, and W. Liu, “Machine learning security: Threats, countermeasures, and evaluations,” IEEE Access, vol. 8, pp. 74720–74742, 2020.

H. Muttaqin and K. Ramli, “Designing An Information Security Framework For The Indonesia Water Industry Sector,” Cakrawala Repositori IMWI, vol. 6, no. 3, pp. 771–780, 2023.

N. S. Sulaiman, M. A. Fauzi, S. Hussain, and W. Wider, “Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks,” Information, vol. 13, no. 9, p. 413, 2022.

N. P. SINAGA, “Perlindungan Hukum Bagi Konsumen Yang Data Pribadinya Diperjualbelikan Di Aplikasi Fintech Peer-To-Peer Lending,” 2021.

K. Razikin and A. Widodo, “General Cybersecurity Maturity Assessment Model: Best Practice to Achieve Payment Card Industry-Data Security Standard (PCI-DSS) Compliance,” CommIT (Communication and Information Technology) Journal, vol. 15, no. 2, pp. 91–104, 2021.

F. Akpan, G. Bendiab, S. Shiaeles, S. Karamperidis, and M. Michaloliakos, “Cybersecurity challenges in the maritime sector,” Network, vol. 2, no. 1, pp. 123–138, 2022.

V. Maphosa, “An overview of cybersecurity in Zimbabwe’s financial services sector,” F1000Res, vol. 12, p. 1251, 2023.

T. Alquraan, A. Alqisie, and A. Al Shorafa, “Do behavioral finance factors influence stock investment decisions of individual investors?(Evidences from Saudi Stock Market),” Am Int J Contemp Res, vol. 6, no. 3, pp. 159–169, 2016.

R. M. Permana, “Analysis of the Financial Performance of State-Owned Enterprises (SOEs) in the Mining Sector Listed on the Indonesia Stock Exchange in 2018-2022,” Indo-Fintech Intellectuals: Journal of Economics and Business, vol. 3, no. 2, pp. 371–383, Sep. 2023, doi: 10.54373/ifijeb.v3i2.250.

M. Makbul and M. Ismail, “KEBIJAKAN CYBER DEFEND INDONESIA DALAM RANGKA MENANGANI INTERNATIONAL CYBER THREATS,” Jurnal Yustitia, vol. 23, no. 2, 2023.

S. Sjamsoeddin, P. Yusgiantoro, H. J. R. Saragih, and B. S. Soepandji, “The Analysis of Civil-Military Cooperation in Implementation of Indonesia National Defense Policy,” Journal of Namibian Studies: History Politics Culture, vol. 33, pp. 56–66, 2023.

A. S. Rahim, P. Widodo, A. H. S. Reksoprodjo, and A. Alsodiq, “Identify Cyber Intelligence Threats in Indonesia,” International Journal Of Humanities Education and Social Sciences, vol. 3, no. 1, 2023.

A. Rizki and F. G. C. Timur, “SYNERGY OF MULTI-STAKEHOLDERS IN DEFENDING INDONESIA FROM CYBER THREATS,” Journal of Social Political Sciences, vol. 2, no. 4, pp. 342–354, 2021.

M. S. Rofii, “Strengthening digital ecosystems for sustainable development in Indonesia: anticipating cyber threats,” in IOP Conference Series: Earth and Environmental Science, IOP Publishing, 2020, p. 012026.

H. S. Tsai, M. Jiang, S. Alhabash, R. LaRose, N. J. Rifon, and S. R. Cotten, “Understanding online safety behaviors: A protection motivation theory perspective,” Comput Secur, vol. 59, pp. 138–150, 2016.

R. Dwianto, H. W. Utama, F. D. Saputra, G. A. Wijaya, F. Aisyah, and E. Kartini, “Peran Otoritas Jasa Keuangan Dalam Menjaga Stabilitas dan Keamanan Sistem Keuangan,” Jurnal Ilmu Manajemen, Ekonomi dan Kewirausahaan, vol. 3, no. 2, pp. 120–127, 2023.

D. Maček, I. Magdalenić, and N. Ivković, “Risk Assessment of the Bank’s Noncompliance with Payment Card Industry Data Security Standard,” in Information Systems Security: Central European Conference on Information and Intelligent Systems (CECIIS 2012), 2012, pp. 19–21.

H. Eka, “Investment opportunity and industrial growth in Indonesia,” International journal of business and society, vol. 19, no. 2, pp. 295–312, 2018.

R. Mendelsohn and S. N. Seo, “Environmental and social safeguards framework,” 2007.

A. P. G. Putra, F. Humani, F. W. Zakiy, M. R. Shihab, and B. Ranti, “Maturity Assessment of Cyber Security in The Workforce Management Domain: A Case Study in Bank Indonesia,” in 2020 International Conference on Information Technology Systems and Innovation (ICITSI), IEEE, 2020, pp. 89–94.

R. Ganesen, A. A. Bakar, R. Ramli, F. A. Rahim, and M. N. A. Zawawi, “Cybersecurity Risk Assessment: Modeling Factors Associated with Higher Education Institutions,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 8, 2022.

I. Almomani, M. Ahmed, and L. Maglaras, “Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia,” PeerJ Comput Sci, vol. 7, p. e703, 2021.

A. Aliyu et al., “A holistic cybersecurity maturity assessment framework for higher education institutions in the United Kingdom,” Applied Sciences, vol. 10, no. 10, p. 3660, 2020.

L. Oliveira et al., “Assessing Cybersecurity Hygiene and Cyber Threats Awareness in the Campus-A Case Study of Higher Education Institutions in Portugal and Poland,” in 2023 IEEE International Conference on Cyber Security and Resilience (CSR), IEEE, 2023, pp. 168–173.

O. P. Onyia and J. Tuyon, “Disruptions, innovations and transformations in the global financial services market: the impacts of emerging cybersecurity, geopolitical and sustainability risks,” Journal of Financial Services Marketing, pp. 1–4, 2023.

K. Lampropoulos et al., “White paper on cybersecurity in the healthcare sector. The HEIR solution,” arXiv preprint arXiv:2310.10139, 2023.

H. S. Lallie et al., “Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic,” Comput Secur, vol. 105, p. 102248, 2021.

I. Mustapha, Y. Vaicondam, A. Jahanzeb, B. A. Usmanovich, and S. H. B. Yusof, “Cybersecurity Challenges and Solutions in the Fintech Mobile App Ecosystem.,” International Journal of Interactive Mobile Technologies, vol. 17, no. 22, 2023.

H. Muttaqin and K. Ramli, “Designing An Information Security Framework For The Indonesia Water Industry Sector,” Cakrawala Repositori IMWI, vol. 6, no. 3, pp. 771–780, 2023.

H. Muttaqin and K. Ramli, “Designing An Information Security Framework For The Indonesia Water Industry Sector,” Cakrawala Repositori IMWI, vol. 6, no. 3, pp. 771–780, 2023.

N. S. Sulaiman, M. A. Fauzi, S. Hussain, and W. Wider, “Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks,” Information, vol. 13, no. 9, p. 413, 2022.

K. Razikin and A. Widodo, “General Cybersecurity Maturity Assessment Model: Best Practice to Achieve Payment Card Industry-Data Security Standard (PCI-DSS) Compliance,” CommIT (Communication and Information Technology) Journal, vol. 15, no. 2, pp. 91–104, 2021.

N. P. SINAGA, “Perlindungan Hukum Bagi Konsumen Yang Data Pribadinya Diperjualbelikan Di Aplikasi Fintech Peer-To-Peer Lending,” 2021.

D. M. A. Putri, S. T. Cantika, R. C. Ningtyas, and F. M. Leon, “Determining Factors in the Indirect Financial Distress Cost in Companies in the Basic and Chemical Industry Sector Listed on the Indonesia Stock Exchange”.

N. S. Sulaiman, M. A. Fauzi, S. Hussain, and W. Wider, “Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks,” Information, vol. 13, no. 9, p. 413, 2022.

Downloads

Published

2024-02-07

How to Cite

Literature Review on Computer Network Security in the Financial Sector in Indonesia Challenges and Solutions in Facing Digital Security Threats. (2024). Sciences Du Nord Nature Science and Technology, 1(01), 20-27. https://doi.org/10.58812/g28gwk06