Claim Missing Document
Check
Articles

Found 3 Documents
Search

Zero Trust Architecture as a New Paradigm in Cyber Security Andi M. Yusuf; Dian Megah Sari; Hilda Ashari; Hamdy Nur Saidy; Musawwir
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 2 (2025): June 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i2.8272

Abstract

The traditional perimeter-based security model has proven inadequate in addressing modern cybersecurity challenges characterized by cloud adoption, remote work, and sophisticated cyber threats. This mixed-methods study examines Zero Trust Architecture (ZTA) as an emerging paradigm that fundamentally shifts security principles from "trust but verify" to "never trust, always verify." Through systematic literature review of 156 peer-reviewed articles and analysis of 12 cross-sector implementation case studies, this research explores the core principles, implementation strategies, benefits, and challenges of ZTA adoption. Key quantitative findings demonstrate that organizations implementing ZTA achieve 67% reduction in breach costs, 48% improvement in threat detection, and 52% enhancement in incident response capabilities. However, implementation faces significant barriers including technical complexity (78% of organizations), cultural resistance (65%), and skills gaps (72%). This study contributes a novel cross-sector ZTA maturity framework and provides evidence-based insights for cybersecurity professionals and organizational leaders considering ZTA adoption.
Inferioritas Pada Siswa Smp dan Mts Di Pulau Ternate Musawwir; Zubair, Arie Gunawan Hazairin; Inayah, Nurul
Nosipakabelo: Jurnal Bimbingan dan Konseling Islam Vol. 2 No. 1 (2021): NOSIPAKABELO: JURNAL BIMBINGAN KONSELING KEISLAMAN
Publisher : Program Studi Bimbingan dan Konseling Islam IAIN Palu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24239/nosipakabelo.v2i1.760

Abstract

This study aims to describe the inferiority that exists in junior high school students in Ternate Island. Inferiority is due to feeling that there is a deficiency in yourself or an imperfection in an individual's life. This feeling will encourage someone to be insecure and tend to feel fail. The method used in this research is descriptive quantitative approach. The sample that will be involved in this research is around 648 students of SMP / MTs at Ternate city. This sample size was obtained by dividing the sample size of 24 students per school, 8 students per batch (grades 1-3), consisting of 4 boys and 4 girls. The variables will be measured using an inferiority scale instrument compiled by researchers based on the inferiority dimensions proposed by Adler, namely, Feeling of being below, Feeling of feminity, and Feeling of insecurity (feeling insecure). This scale consists of 48 items, with 24 favorable items and 24 unfavorable items. The results showed that there were 36 respondents (8%) who had an inferiority score in the very high category, 98 respondents (22%) were in the high category, 161 respondents (37%) were in the medium category, 123 respondents (28%) were in the low category, and 24 respondents (5%) are in the very low category. These results indicate that inferiority is a situation faced by students but can still be overcome with various approaches
Digital Forensics in Open Journal Systems: Case Study on Security Breach and Data Recovery Andi M. Yusuf; Dian Megah Sari; Musawwir
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 3 (2025): September 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i3.9778

Abstract

Open Journal Systems (OJS) has become the dominant platform for scholarly journal publication in Indonesia, with more than 8,500 active journals in 2024. However, the growing cyber threats targeting academic infrastructures demand the development of digital forensic methodologies specifically tailored to the OJS ecosystem. This research develops a comprehensive framework for digital forensic investigation on the OJS platform through the analysis of 45 security incidents that occurred in Indonesian scholarly journals during the 2022–2024 period. The proposed Digital Forensic for Academic Publishing (DFAP) methodology covers preservation, acquisition, examination, analysis, and presentation, specifically designed for the OJS architecture. The implementation of this framework in 12 real-world cases demonstrated a success rate of 89.3% in data recovery, 76.2% in perpetrator identification, and 94.4% in operational system restoration, with an average resolution time of 72 hours. The study also identified 15 common vulnerability patterns in Indonesian OJS installations and produced 28 security recommendations that can reduce incident risks by up to 67%. The main contributions of this research include the development of OJS-specific forensic tools, the standardization of investigation procedures for academic institutions, and the establishment of the Indonesian Academic Digital Forensic Database (IADFD) as a knowledge-sharing repository.