CYBER SECURITY CHALLENGES IN THE AGE OF DIGITALISATION: HOW CAN COMPUTERS BE PROTECTED?

Authors

  • Loso Judijanto IPOSS Jakarta, Indonesia Author
  • Al-Amin Universitas Airlangga, Surabaya, Indonesia Author

Keywords:

Cyber Security, Digitalisation Era, Computers

Abstract

In the era of growing digitalisation, cybersecurity challenges have become critical issues that require serious attention from individuals and organisations. Various types of cyber threats such as ransomware, phishing, and DDoS attacks are increasingly sophisticated and diverse, demanding a comprehensive and proactive approach to digital asset protection. Ensuring computers are protected requires a combination of up-to-date security technologies such as antivirus, firewalls, data encryption, and multifactor authentication, as well as strict security policy implementation and ongoing education. Success in meeting these challenges also depends on adaptability and rapid response to dynamic threats, with the development of effective emergency response plans. The right combination of technology, policy and operational preparedness will provide robust and responsive protection amidst the complexity of today's digital landscape.

Downloads

Download data is not yet available.

References

Achar, S., Vijayendra, K., Hussain, S., & ... (2022). Business Trends in Digital Era: A Review. Journal of …, Query date: 2024-10-23 19:23:27. http://publish7promo.com/id/eprint/1645/

Aditya, A., Wulandari, C., & Loso, L. (2022). Cyber Notary: Between Notary Opportunities And Challenges In Facing The Era Of Digital Disruption 4.0 Towards 5.0.

International Journal of Law …, Query date: 2024-10-23 19:23:27. https://jurnal.unissula.ac.id/index.php/ijls/article/view/20365

Al-Rbeawi, S. (2023). A review of modern approaches of digitalization in oil and gas industry. Upstream Oil and Gas Technology, Query date: 2024-10-23 19:23:27. https://www.sciencedirect.com/science/article/pii/S2666260423000130

Azambuja, A. D., Plesker, C., Schützer, K., Anderl, R., & ... (2023). Artificial intelligence- based cyber security in the context of industry 4.0—A survey. Electronics, Query date: 2024-10-23 19:23:27. https://www.mdpi.com/2079-9292/12/8/1920

Bala, I., Mijwil, M., Ali, G., & Sadıkoğlu, E. (2023). Analysing the connection between ai and industry 4.0 from a cybersecurity perspective: Defending the smart revolution. dir.muni.ac.ug. http://dir.muni.ac.ug/handle/20.500.12260/568

Bellatreche, L., Chernishev, G., Corral, A., Ouchani, S., & ... (2021). Advances in Model and Data Engineering in the Digitalization Era. Springer. https://doi.org/10.1007/978-3- 030-87657-9

Dariyabayevichc, U. (2023). A Comprehensive Analysis of Ecological Law in the Cyber Era. International Journal of Law and Policy, Query date: 2024-10-23 19:23:27. https://irshadjournals.com/index.php/ijlp/article/view/58

Firman, F.-. (2018). PENELITIAN KUALITATIF DAN KUANTITATIF. Query date: 2024-05-25

20:59:55. https://doi.org/10.31227/osf.io/4nq5e

Georgiou, K., Mittas, N., Mamalikidis, I., & ... (2021). Analyzing the roles and competence demand for digitalization in the oil and gas 4.0 era. IEEE …, Query date: 2024-10- 23 19:23:27. https://ieeexplore.ieee.org/abstract/document/9598932/

Gombár, M., Vagaská, A., Korauš, A., & Račková, P. (2024). Application of Structural Equation Modelling to Cybersecurity Risk Analysis in the Era of Industry 4.0. Mathematics, Query date: 2024-10-23 19:23:27. https://www.mdpi.com/2227- 7390/12/2/343

Holovkin, B., Tavolzhanskyi, O., & ... (2021). Corruption as a cybersecurity threat in the new world order. … : The Quarterly Journal, Query date: 2024-10-23 19:23:27. https://procon.bg/ru/system/files/20.2.07_corruption.pdf

Husain, M., Faisal, M., Sadia, H., Ahmad, T., & Shukla, S. (2023). Advances in Cyberology and the Advent of the Next-gen Information Revolution. books.google.com. https://books.google.com/books?hl=en&lr=&id=hinKEAAAQBAJ&oi=fnd&pg=P R1&dq=cyber+digitalization+era+computer&ots= lNEmN5Wi&sig=RbZ81fG7G k0xLorLCW6TNiaeyRM

Kouroupis, K., & Sotiropoulos, L. (2024). Cyber Challenges amid the Digital Revolution in Maritime Transport. Jurid. Trib.-Rev. Compar. &Int’l L., Query date: 2024-10-23 19:23:27. https://heinonline.org/hol-cgi-

bin/get_pdf.cgi?handle=hein.journals/juridtrib14§ion=25

Kumar, S., Gupta, U., Singh, A., & Singh, A. (2023). Artificial intelligence: Revolutionizing cyber security in the digital era. Journal of Computers …, Query date: 2024-10-23 19:23:27. https://jcmm.co.in/index.php/jcmm/article/view/64

Maulana, Y., & Fajar, I. (2023). Analysis of cyber diplomacy and its challenges for the digital era community. IAIC Transactions on Sustainable Digital …, Query date: 2024-10-23 19:23:27. https://aptikom-journal.id/itsdi/article/view/587

Nair, M., Deshmukh, A., & Tyagi, A. (2024). Artificial intelligence for cyber security: Current trends and future challenges. … Secure Computing for Next …, Query date: 2024-10-23 19:23:27. https://doi.org/10.1002/9781394213948.ch5

Oruj, Z. (2023). Cyber Security: Contemporary cyber threats and National Strategies. Distance Education in Ukraine: Innovative, Normative …, Query date: 2024-10-23 19:23:27. https://jrnl.nau.edu.ua/index.php/DEU/article/view/17309

Perwej, Y., Abbas, S., Dixit, J., Akhtar, N., & ... (2021). A systematic literature review on the cyber security. International Journal of …, Query date: 2024-10-23 19:23:27. https://hal.science/hal-03509116/

Safitra, M., Lubis, M., & Fakhrurroja, H. (2023). Counterattacking cyber threats: A framework for the future of cybersecurity. Sustainability, Query date: 2024-10-23 19:23:27. https://www.mdpi.com/2071-1050/15/18/13369

Saniuk, S., & Grabowska, S. (2021). The concept of cyber-physical networks of small and medium enterprises under personalized manufacturing. Energies, Query date: 2024-10-23 19:23:27. https://www.mdpi.com/1996-1073/14/17/5273

Suyitno. (2021). METODE PENELITIAN KUALITATIF KONSEP, PRINSIP DAN OPERASIONALNYA. Query date: 2024-05-25 20:59:55.

https://doi.org/10.31219/osf.io/auqfr

Tan, K., Chi, C., & Lam, K. (2022). Analysis of digital sovereignty and identity: From digitization to digitalization. arXiv Preprint arXiv:2202.10069, Query date: 2024-10- 23 19:23:27. https://arxiv.org/abs/2202.10069

Thakur, M. (2024). Cyber security threats and countermeasures in digital age. Journal of Applied Science and Education (JASE), Query date: 2024-10-23 19:23:27. http://jase.a2zjournals.com/index.php/ase/article/view/42

Vadiyala, V. (2021). Byte by Byte: Navigating the Chronology of Digitization and Assessing its Dynamic Influence on Economic Landscapes, Employment Trends, and Social …. Digitalization & Sustainability Review, Query date: 2024-10-23 19:23:27. https://www.researchgate.net/profile/Vishal-Reddy- Vadiyala/publication/377387435_Byte_by_Byte_Navigating_the_Chronology_of

_Digitization_and_Assessing_its_Dynamic_Influence_on_Economic_Landscape s_Employment_Trends_and_Social_Structures/links/65a37ed940ce1c5902dac01 e/Byte-by-Byte-Navigating-the-Chronology-of-Digitization-and-Assessing-its-

Dynamic-Influence-on-Economic-Landscapes-Employment-Trends-and-Social- Structures.pdf

Verma, A., Surendra, R., Reddy, B., & ... (2021). Cyber security in digital sector. … Intelligence and Smart …, Query date: 2024-10-23 19:23:27. https://ieeexplore.ieee.org/abstract/document/9395933/

Zhang, B., Yang, B., Wang, C., Wang, Z., Liu, B., & Fang, T. (2021). Computer vision-based construction process sensing for cyber–physical systems: A review. Sensors, Query date: 2024-10-23 19:23:27. https://www.mdpi.com/1424-8220/21/16/5468

Downloads

Published

03-12-2025