Claim Missing Document
Check
Articles

Found 32 Documents
Search

Enhancing Security in Cross-Border Payments: A Cyber Threat Modeling Approach Amiruddin, Amiruddin; Briliyant, Obrina Candra; Windarta, Susila; Setiadji, Muhammad Yusuf Bambang; Priambodo, Dimas Febriyan
JOIV : International Journal on Informatics Visualization Vol 9, No 6 (2025)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.9.6.3205

Abstract

Cross-border payment (CBP) systems are critical to the global economy but are increasingly susceptible to cyber threats due to their complex structures and diverse transaction models. This paper analyzes cyber vulnerabilities across four CBP models: correspondent banking (SWIFT), infrastructure (ApplePay), closed-loop (PayPal), and peer-to-peer (Ripple). It employs the STRIDE methodology and adapts the cyber threat modeling framework proposed by Khalil et al. Key objectives include identifying vulnerabilities, assessing the impact of threats, and proposing mitigation strategies. The corresponding banking model shows the highest threat impact due to extensive transaction elements crossing trust boundaries. In contrast, the closed-loop model demonstrates lower vulnerability because of fewer components outside its trust boundary. Peer-to-peer and infrastructure models present moderate risk levels influenced by blockchain transparency and infrastructure dependencies. Critical threats identified include abuse of authority, malware, and script injection, which can result in significant losses, such as financial theft, service outages, and data breaches. Results indicate that interactions between processes across trust boundaries exacerbate cyber risks. Strategic recommendations include reducing system complexity, reinforcing security protocols at trust boundaries, and integrating advanced threat detection mechanisms. The study highlights these vulnerabilities and risks and underscores the need for robust cybersecurity measures to protect CBP systems. This research contributes to the existing knowledge by providing a detailed threat assessment and practical insights for improving CBP security. Future studies should explore alternative modeling methods, update security contexts to reflect real-world scenarios, and analyze the impact of open banking technologies.
Embedded Wids Kismet Sebagai Perangkat Deteksi Serangan Data Link Layer Wi-Fi Access Point Fachrurozy, Rizky; Setiadji, Muhammad Yusuf Bambang; Priambodo, Dimas Febriyan
Jurnal Informatika: Jurnal Pengembangan IT Vol 8, No 1 (2023)
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v8i1.4551

Abstract

The rapid development of wireless network technology has an impact with a significant increase of users. Wi-Fi is one of the wireless technologies that is currently used widely by humans as a medium of transmission to exchange information. The increasing in the number of users is directly proportional to the increase the risk of crime occurring. In this case an attack on a Wi-Fi network aimed at taking certain advantage of the user or it’s victim was done by threatening aspects of information security. Wireless Intrusion Detection System (WIDS) is a tool used to detect intrusions that occur against wireless network technology, one of it is Wi-Fi into the form of logs. Kismet is one of the wids that is free and opensource with complete WiFi attack detection capability. The implementation of WIDS Kismet applied to Raspberry Pi 4 was shown as an alternative wids device that has a low cost for use in small Wi-Fi network environments such as home networks or small enterprise. The analysis is done by calculating the performance of accuracy, precision, recall, and f-measure values from the implementation results using confusion matrix method. The result of the calculation obtained by the highest value for each calculated performance with 99.83% accuracy, 97.96% precision, 100% recall, and 98.9% fmeasure. The calculation aims to provide information that can be utilized for users who want to do a similar implementation and use it to detect Wi-Fi networks. 
Co-Authors Abdul Abror Achmad, Fahdel Adiati, Nadia Paramita Retno Aditama, Whisnu Yudha Afif, Yusrizal Agus Reza Aristiadi Nurwa Ahmad Ashari Ajhari, Abdul Azzam Akhmad Rizal, Akhmad Amiruddin Amiruddin Amiruddin Amiruddin Amiruddin Annisa Nurul Puteri ARIZAL Arya, Primadona Asep Dadan Rifansyah Awalin, Lilik Jamilatul Azzahra, Arsya Dyani Beatrix, Yehezikha Briliyant, Obrina Candra Dhana Arvina Alwan Diaz Samsun Alif Dozy Arti Insani Fachrurozy, Rizky Fadlilah Izzatus Sabila Faizi, Achmad Husein Noor Farida, Yeni Furqan Zakiyabarsi Ghiffari Adhe Permana Girinoto Girinoto, Girinoto Gusti Agung Ngurah Gde K.T. D Hafidz Faqih Aldi Kusuma Handayani, Annisa Dini Henny Yulianti Hermawan Setiawan I Komang Setia Buana, I Komang Indarjani, Santi Ira Rosianal Hikmah Jayanti Yusmah Sari Jeckson Sidabutar La Ode Ahmad Saktianyah La Ode Hasnuddin S. Sagala Lestari, Andriani Adi Mahar Surya Malacca Muhammad Hasbi Muhammad Hasbi Muhammad Yusuf Bambang Setiadji Muhammad Yusuf Bambang Setiadji Mukhamad Najib Nanang Trianto Nanang Trianto Naufal Hafiz Nirsal Nirsal Noorhasanah Zainuddin Nurwa, Agus Reza Aristiadi Obrina Candra Briliyant Olga Geby Nabila Pandi Vigneshwaran Pandi Vigneshwaran Prasetyo, Arbain Nur Prayoga, Arga Prisma Megantoro Purwoko, Rahmat Rabiah Adawiyah Rahmat Purwoko Rahmat Purwoko Rahmawati, Fika Dwi Rizki Putra Prastio Rizky Fachrurozy Sabela Trisiana Oktavia Saptomo, Wawan Laksito Yuly Siswantyo, Sepha Sri Siswanti Suci Pricilia Lestari Suharsono Bantun Sunaringtyas, Septia Ulfa Syaban, Kharis Syahrul Syahrul Tiyas Yulita Wahyu Riski Aulia Putra Windarta, Susila Yulandi Yusuf Bambang Setiadji