Initial Cybersecurity Framework in the New Capital City of Indonesia: Factors, Objectives, and Technology
Abstract
:1. Introduction
2. Methodology
3. Results
4. Discussion
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Pemerintah Indones. Undang-Undang Republik Indonesia Nomor 3 Tahun 2022 Tentang Ibu Kota Negara. 2022. Available online: https://www.presidenri.go.id/ (accessed on 13 October 2022).
- Presiden Republik Indonesia. Peraturan Presiden Republik Indonesia Nomor 63 Tahun 2022 Tentang Perincian Rencana Induk Ibu Kota Nusantara. 2022. Available online: https://www.presidenri.go.id/ (accessed on 1 November 2022).
- Bailes, A.J.K. Business and Security Public—Private Sector Relationships; Stockholm International Peace Research Institute: Solna, Sweden, 2004. [Google Scholar]
- Lin, H.; Bergmann, N.W. IoT Privacy and Security Challenges for Smart Home Environments. Information 2016, 7, 44. [Google Scholar] [CrossRef] [Green Version]
- Economist Intelligence. The Global Liveability Index 2022. Available online: https://www.eiu.com/n/campaigns/global-liveability-index-2022/?utm_medium=website&utm_source=archdaily.com (accessed on 1 November 2022).
- Pemerintah Republik Indonesia. Peraturan Presiden Nomor 95 Tahun 2018 tentang Sistem Pemerintahan Berbasis Elektronik. Media Huk 110. 2018. Available online: https://www.presidenri.go.id/ (accessed on 12 October 2022).
- Maja, P.W.; Meyer, J.; Von Solms, S. Development of Smart Rural Village Indicators in Line With Industry 4.0. IEEE Access 2020, 8, 152017–152033. [Google Scholar] [CrossRef]
- Ceballos, G.R.; Larios, V.M. A model to promote citizen driven government in a smart city: Use case at GDL smart city. In Proceedings of the IEEE 2nd Int Smart Cities Conf Improv Citizens Qual Life, ISC2 2016, Trento, Italy, 12–15 September 2016. [Google Scholar] [CrossRef]
- Ukwandu, E.; Ben-Farah, M.A.; Hindy, H.; Bures, M.; Atkinson, R.; Tachtatzis, C.; Andonovic, I.; Bellekens, X. Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends. Information 2022, 13, 146. [Google Scholar] [CrossRef]
- Andrew, M.; Rashid, A.; Chivers, H.; Schneider, S.; Lupu, E.; Danezis, G. The Cyber Security Body of Knowledge; University of Bristol: Bristol, UK, 2021; p. 22. [Google Scholar]
- ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection. In ISO/IEC 27032: 2012 Information Technology—Security Techniques—Guidelines for Cybersecurity; International Electrotechnical Commission (IEC): Geneva, Switzerland, 2012.
- Kitchenham, B.; Pretorius, R.; Budgen, D.; Brereton, O.P.; Turner, M.; Niazi, M.; Linkman, S. Systematic literature reviews in software engineering—A tertiary study. Inf. Softw. Technol. 2010, 52, 792–805. [Google Scholar] [CrossRef]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. Syst. Rev. 2021, 88, 105906. [Google Scholar]
- Kitchenham, B.A.; Madeyski, L.; Budgen, D. SEGRESS: Software Engineering Guidelines for REporting Secondary Studies. IEEE Trans. Softw. Eng. 2022, 1, 1. [Google Scholar] [CrossRef]
- Penmetsa, M.K.K.; Bruque-Camara, S. A framework for building a sustainable digital nation: Essential elements and challenges. Digit. Policy Regul. Gov. 2021, 23, 262–286. [Google Scholar] [CrossRef]
- Dai, X.; Yao, L. A classification method and implementation of Trojan and BotNet infected user based on threat matrix model. In Proceedings of the 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Leicester, UK, 19–23 August 2019; pp. 1231–1236. [Google Scholar]
- Gamec, J.; Basan, E.; Basan, A.; Nekrasov, A.; Fidge, C.; Sushkin, N. An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes. Sensors 2021, 21, 6116. [Google Scholar] [CrossRef] [PubMed]
- Himdi, T.; Ishaque, M.; Ahmed, J. Cybersecurity challenges during pandemic in smart cities. In Proceedings of the 2021 8th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 17–19 March 2021; Institute of Electrical and Electronics Engineers Inc., Jeddah International College, Department of Computer Science: Jeddah, Saudi Arabia, 2021; pp. 445–449. [Google Scholar]
- Yan, C.; Huang, Z.; Ke, C.; Xie, J.; Wang, J. A topology-aware access control model for collaborative cyber-physical spaces: Specification and verification. Comput. Secur. 2019, 87, 101478. [Google Scholar]
- Tommaso, Z.; Ceccarelli, A.; Mori, M. A tool for evolutionary threat analysis of smart grids. In Smart Grid Inspired Future Technologies; Springer: Cham, Switzerland, 2017; Volume 203, pp. 205–211. [Google Scholar]
- Duan, Y.; Lu, Z.; Zhou, Z.; Sun, X.; Wu, J. Data Privacy Protection for Edge Computing of Smart City in a DIKW Architecture. Eng. Appl. Artif. Intell. 2019, 81, 323–335. [Google Scholar] [CrossRef]
- Kertis, T.; Prochazkova, D. Cyber curity of usenderground railway system operation. In Proceedings of the 2017 Smart City Symposium Prague (SCSP), SCSP 2017, Prague, Czech Republic, 25–26 May 2017; pp. 1–6. [Google Scholar]
- Lupton, B.; Zappe, M.; Thom, J.; Sengupta, S.; Feil-Seifer, D. Analysis and Prevention of Security Vulnerabilities in a Smart City. In Proceedings of the 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 26–29 January 2022; pp. 702–708. [Google Scholar]
- Lim, M.K.; Xiong, W.; Lei, Z. Theory, supporting technology and application analysis of cloud manufacturing: A systematic and comprehensive literature review. Ind. Manag. Data Syst. 2020, 120, 1585–1614. [Google Scholar] [CrossRef]
- ISO/IEC 27001:2022; Information Security, Cybersecurity and Privacy Protection-Information Security Management System-Requirements. International Electrotechnical Commission (IEC): Geneva, Switzerland, 2022.
- Kiss-Leizer, G.K. Environmental safety and living in a smart city. Interdiscip. Descr. Complex Syst. 2020, 18, 360–368. [Google Scholar] [CrossRef]
- Appio, F.P.; Lima, M.; Paroutis, S. Understanding Smart Cities: Innovation ecosystems, technological advancements, and societal challenges. Technol. Soc. Chang. 2019, 142, 1–14. [Google Scholar] [CrossRef]
- Espada, R.; Apan, A.; McDougall, K. Vulnerability assessment of urban community and critical infrastructures for integrated flood risk management and climate adaptation strategies. Int. J. Disaster Resil. Built Environ. 2017, 8, 375–411. [Google Scholar] [CrossRef]
- Erastus, L.; Jere, N.; Shava, F.B. Secure Information Infrastructure Framework Components for a Smart City: A Case Study of Windhoek. In Proceedings of the 2020 IST-Africa Conference (IST-Africa), Kampala, Uganda, 18–22 May 2020; Institute of Electrical and Electronics Engineers Inc.: New York, NY, USA, 2020; pp. 1–10. [Google Scholar]
- Malatji, M.; Marnewick, A.L.; von Solms, S. Cybersecurity capabilities for critical infrastructure resilience. Inf. Comput. Secur. 2021, 30, 255–279. [Google Scholar] [CrossRef]
- Tse, D.; Li, R.; Zheng, H. Risks facing smart city information security in Hangzhou. In Proceedings of the 2019 3rd International Conference on Software and e-Business, Tokyo, Japan, 9–11 December 2019; pp. 29–33. [Google Scholar]
- Vitunskaite, M.; He, Y.; Brandstetter, T.; Janicke, H. Smart cities and cyber security: Are we there yet?A comparative study on the role of standards, third party risk management and security ownership. Comput. Secur. 2019, 83, 313–331. [Google Scholar] [CrossRef] [Green Version]
- Cui, L.; Xie, G.; Qu, Y.; Gao, L.; Yang, Y. Security and Privacy in Smart Cities: Challenges and Opportunities. IEEE Access 2018, 6, 46134–46145. [Google Scholar] [CrossRef]
- Braun, T.; Fung, B.C.; Iqbal, F.; Shah, B. Security and privacy challenges in smart cities. Sustain. Cities Soc. 2018, 39, 499–507. [Google Scholar] [CrossRef]
- Shukla, M.; Johnson, S.D.; Jones, P. Does the NIS implementation strategy effectively address cyber security risks in the UK? In Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Oxford, UK, 3–4 June 2019; pp. 1–11. [Google Scholar]
- Hasbini, M.A.; Eldabi, T.; Aldallal, A. Investigating the information security management role in smart city organisations. World J. Entrep. Manag. Sustain. Dev. 2018, 14, 86–98. [Google Scholar] [CrossRef] [Green Version]
- Kumar, P.M.; Rawal, B.; Gao, J. Blockchain-enabled Privacy Preserving of IoT Data for Sustainable Smart Cities using Machine Learning. In Proceedings of the 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), Bangalore, India, 4–8 January 2022; Institute of Electrical and Electronics Engineers Inc.: New York, NY, USA, 2022; pp. 1–6. [Google Scholar]
- Esposito, C.; Ficco, M.; Gupta, B.B. Blockchain-based authentication and authorization for smart city applications. Inf. Process. Manag. 2020, 58, 102468. [Google Scholar] [CrossRef]
- Sengupta, N. Designing cyber security system for smart cities. In Smart Cities Symposium; Institution of Engineering and Technology, Department of IT, University College of Bahrain: Manama, Bahrain, 2018; pp. 1–6. [Google Scholar]
- Mohammad, R.M.A.; Abdulqader, M.M. Exploring cyber security measures in smart cities. In Proceedings of the 2020 21st International Arab Conference on Information Technology (ACIT), Giza, Egypt, 28–30 November 2020; Institute of Electrical and Electronics Engineers Inc., College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, Department of Computer Information Systems: Dammam, Saudi Arabia, 2020; pp. 1–7. [Google Scholar]
- Alromaihi, S.; Elmedany, W.; Balakrishna, C. Cyber security challenges of deploying IoT in smart cities for healthcare applications. In Proceedings of the 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Barcelona, Spain, 6–8 August 2018; pp. 140–145. [Google Scholar]
- Elsaeidy, A.; Elgendi, I.; Munasinghe, K.S.; Sharma, D.; Jamalipour, A. A smart city cyber security platform for narrowband networks. In Proceedings of the 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, VIC, Australia, 22–24 November 2017; pp. 1–6. [Google Scholar]
Protocol Attributes | Description |
---|---|
Keyword | cybersecurity AND ((smart AND city) OR (livable AND city) OR (critical AND infrastructure)) |
Publication Type | Journal Article and Conference Proceeding |
Years | 2016 to 2022 |
Language | English |
Databases | Emerald, IEEE Xplore, ProQuest, ScienceDirect, Scopus |
Literature | Research Focus | IKN Factors | Objectives | ||||||
---|---|---|---|---|---|---|---|---|---|
SC | LC | CI | C | I | A | P | S | ||
[26] | Smart City Security | x | x | x | x | x | |||
[27] | Information Security Technology | x | x | x | x | x | x | ||
[28] | Natural Risk Assessment | x | x | x | |||||
[29] | Critical Information Infrastructure Protection | x | x | x | x | ||||
[30] | Critical Information Infrastructure Protection | x | x | x | x | ||||
[31] | Information Security Objective | x | x | x | x | x | |||
[32] | Security Standard | x | x | x | x | x | |||
[33] | Cybersecurity Control | x | x | x | x | x | |||
[34] | Information Security Technology | x | x | x | x | x | |||
[35] | Cybersecurity Control | x | x | x | x | ||||
[36] | Information Security Management System | x | x | x | x | ||||
[37] | Privacy Protection | x | x | ||||||
[38] | Blockchain Authentication | x | x | ||||||
[39] | Cybersecurity Framework | x | x | ||||||
[40] | Cybersecurity Measurement | x | x | x | |||||
[41] | Healthcare Application | x | x | x | |||||
[42] | Smart City Security | x | x |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sensuse, D.I.; Putro, P.A.W.; Rachmawati, R.; Sunindyo, W.D. Initial Cybersecurity Framework in the New Capital City of Indonesia: Factors, Objectives, and Technology. Information 2022, 13, 580. https://doi.org/10.3390/info13120580
Sensuse DI, Putro PAW, Rachmawati R, Sunindyo WD. Initial Cybersecurity Framework in the New Capital City of Indonesia: Factors, Objectives, and Technology. Information. 2022; 13(12):580. https://doi.org/10.3390/info13120580
Chicago/Turabian StyleSensuse, Dana Indra, Prasetyo Adi Wibowo Putro, Rini Rachmawati, and Wikan Danar Sunindyo. 2022. "Initial Cybersecurity Framework in the New Capital City of Indonesia: Factors, Objectives, and Technology" Information 13, no. 12: 580. https://doi.org/10.3390/info13120580
APA StyleSensuse, D. I., Putro, P. A. W., Rachmawati, R., & Sunindyo, W. D. (2022). Initial Cybersecurity Framework in the New Capital City of Indonesia: Factors, Objectives, and Technology. Information, 13(12), 580. https://doi.org/10.3390/info13120580