Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Journal of Computer Science and Technology Application

Cybersecurity in the Age of IoT and Developing Frameworks for Securing Smart Devices and Networks Rahayu, Eli Ratih; Aprillia, Ariesya; Ikhsan, Ramzi Zainum; Adiwijaya, Alfri; Kumara, Aryan
CORISINTA Vol 2 No 1 (2025): February
Publisher : Pandawan Sejahtera Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/corisinta.v2i1.64

Abstract

The rapid proliferation of the Internet of Things (IoT) has significantly transformed various industries, enhancing automation and efficiency. However, it has also brought forth substantial cybersecurity challenges that threaten data integrity, user privacy, and system reliability. This study proposes a multi-layered cybersecurity framework to address these vulnerabilities by integrating robust security measures such as device authentication, data encryption, continuous network monitoring, and enhanced privacy protection. Employing a mixed methods research approach, the framework was rigorously validated through real world implementation in smart home environments, demonstrating tangible improvements in security resilience. Notably, the findings indicate a 40% reduction in threat response time, a 96% intrusion detection rate, and the complete elimination of data breaches post-implementation, emphasizing the framework’s effectiveness in mitigating cyber risks. Proactively addressing security concerns, this study provides valuable insights for key stakeholders, including device manufacturers, network operators, and policymakers, guiding them toward implementing stringent cybersecurity protocols to enhance trust and compliance across IoT ecosystems. Furthermore, the results highlight the necessity for continuous adaptation and innovation in cybersecurity strategies, ensuring that IoT deployments remain resilient against evolving cyber threats. As IoT adoption continues to accelerate across sectors such as healthcare, smart cities, and industrial automation, this research underscores the critical importance of a proactive, comprehensive security approach to safeguard connected infrastructures. Ultimately, the proposed framework serves as a blueprint for strengthening IoT security governance and fostering a safer digital ecosystem, reinforcing the importance of collaborative efforts in securing the future of interconnected technologies.
Cybersecurity Strategies for Preventing Ransomware Attacks in Cloud-Based Applications Ageng Setiani Rafika; Sora Baltasar; Adiwijaya, Alfri; Riza Chakim, Mochamad Heru; Stefano Rizky, Zhask
CORISINTA Vol 2 No 2 (2025): August
Publisher : Pandawan Sejahtera Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/corisinta.v2i2.77

Abstract

Ransomware attacks have become a significant threat to cloud-based applications, posing severe risks to organizations' data integrity, financial stability, and operational continuity. This paper explores the challenges of securing cloud environments against ransomware, focusing on vulnerabilities such as inadequate encryption, weak access controls, and multi-tenancy risks. Through an in-depth analysis, the paper identifies the most common types of ransomware targeting cloud applications, including file encryption and data exfiltration ransomware, and discusses the security weaknesses that facilitate these attacks. The paper further evaluates existing cybersecurity strategies, such as data encryption, multi-factor authentication (MFA), and continuous monitoring, highlighting their effectiveness in preventing ransomware attacks. Based on these findings, a comprehensive framework is proposed, combining technical solutions like strong encryption and AI-based threat detection with organizational practices such as regular employee training and backup solutions. The study also emphasizes the importance of collaboration between cloud service providers and organizations to enhance overall cloud security. By adopting a multi-layered approach and integrating emerging technologies, organizations can significantly improve their resilience against ransomware threats. This research contributes to the ongoing dialogue on cloud security by providing actionable recommendations for preventing ransomware attacks and safeguarding cloud-based applications from evolving cyber threats.