Claim Missing Document
Check
Articles

Found 2 Documents
Search

Cyber Resilience to Digital Threats for Education Institutions 4.0 Budi Wibowo; Andrie Yuswanto; Taufik Hidayat; Nadim Ibrahim
International Journal of Management Science and Application Vol. 4 No. 1 (2025): IJMSA
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/ijmsa.v4i1.370

Abstract

The emergence of Education 4.0, characterized by personalized learning, smart technologies, and digital interconnectivity, has revolutionized academic environments. However, this digital transformation has simultaneously increased the exposure of educational institutions to sophisticated cyber threats. This research addresses the pressing need for a robust cyber resilience framework tailored to the education sector. Employing a qualitative descriptive methodology, supported by secondary data analysis and case study reviews, the study identifies core vulnerabilities in digital infrastructure, policy shortcomings, and a general lack of cybersecurity awareness among stakeholders. In response, the paper proposes a contextualized cyber resilience framework grounded in layered security principles, zero-trust architecture, and institution-wide digital hygiene initiatives. Key findings indicate that effective cyber resilience in Education 4.0 must be multidimensional, incorporating stringent policy enforcement, continuous digital skills training, and adaptive technological strategies. The primary contribution of this study lies in offering a practical, scalable framework that aligns cybersecurity practices with the evolving demands of digital education. Future research is encouraged to explore real-time implementation metrics, cross-institutional collaborations, and the integration of AI-driven threat detection systems to further strengthen educational cyber resilience.
Enhancing Network Security and Performance using DNS Sinkhole and QoS: A Practical ISO/IEC 27001:2022 Implementation Budi Wibowo; Taufik Hidayat; Andrie Yuswanto; Aji Nurrohman
International Journal of Management Science and Application Vol. 4 No. 2 (2025): IJMSA
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/ijmsa.v4i2.421

Abstract

This study aims to design and validate a low-cost network security model based on open-source solutions by integrating Pi-hole and Quality of Service (QoS) as a technical implementation of ISO/IEC 27001:2022 controls for resource-constrained organizations. The implementation results demonstrate a significant improvement in security posture by blocking 14.1% of malicious and irrelevant DNS queries, while simultaneously enhancing network performance by reducing critical application latency by 45%. The key advantage of this model lies in its cost efficiency and its dual benefits of improved security and optimized performance within a single framework. However, the study also identifies limitations, particularly the potential for false positives that require manual whitelist management and reliance on trained personnel to ensure operational sustainability. The main contribution of this research is the provision of a simple, cost-effective, and standards-compliant technical framework, while also introducing a mathematical formulation to assess the trade-offs between security, performance, and cost. Future directions include integrating Intrusion Detection/Prevention Systems (IDS/IPS) for layered Defense and replicating the model into a turnkey security appliance that can be widely adopted by other organizations facing similar challenges.