Claim Missing Document
Check
Articles

Found 12 Documents
Search

A Data Driven Information System for Cybersecurity Vulnerability Management Aini, Qurotul; Rizky, Agung; Rusdian, Suca; Aulia, Azwani; Erica, Archa
APTISI Transactions on Management (ATM) Vol 10 No 1 (2026): ATM (APTISI Transactions on Management: January)
Publisher : Pandawan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/f3yjz324

Abstract

The rapid growth of digital infrastructures has amplified cybersecurity vulnerabilities, challenging organizations to manage risks effectively. Traditional vulnerability assessment methods, such as static scoring systems, often overlook dynamic threat information, leading to suboptimal prioritization. This study addresses the gap in existing vulnerability management approaches by introducing a data-driven framework that combines internal system data, public vulnerability databases, and external threat intelligence using predictive analytics. The proposed decision support information system employs machine learning as an analytical component to estimate the likelihood of vulnerability exploitation and support vulnerability prioritization decisions. The novelty of this approach lies in its ability to prioritize vulnerabilities not only based on technical severity but also considering the context of real-world threat activity. When benchmarked against conventional methods, this approach demonstrates superior performance in identifying exploitable vulnerabilities, improving accuracy and recall, thus optimizing resource allocation. By adopting a proactive, risk-based strategy, the framework prioritizes the most critical vulnerabilities in complex IT environments. The results highlight the potential of predictive models in enhancing cybersecurity management and supporting sustainable infrastructure, driving a shift toward more efficient, data-driven decision-making.  
Migration of Blockchain Systems to Quantum Resistant Security ECDSA vs NIST MLDSA Pramesti, Santika Lya Diah; Tanjung, Yul Ifda; Aulia, Azwani; Ramadhan, Muhammad Rafly; Versie, Ikyboy Van
Blockchain Frontier Technology Vol. 5 No. 2 (2026): Blockchain Frontier Technology
Publisher : IAIC Bangun Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/bfront.v5i2.944

Abstract

The advent of cryptographically relevant quantum computers poses an existential threat to the security foundations of contemporary blockchain networks, which predominantly rely on the ECDSA for transaction authorization and identity management. Shor’s quantum algorithm can solve the underlying mathematical problems of ECDSA in polynomial time, rendering current ledgers vulnerable to catastrophic asset theft. This study aims to examine the implications of quantum computing on blockchain security by positioning ECDSA and ML-DSA as two generational digital signature standards within the evolving cryptographic landscape. The analysis is conducted through a standards-based comparative approach, focusing on the formal specifications and security objectives outlined in the U.S. NIST post-quantum cryptographic standard FIPS 204. The findings indicate that ECDSA and ML-DSA represent two critical generations of digital signature standards: ECDSA as the legacy cryptographic foundation for current blockchain ecosystems, and ML-DSA (formerly CRYSTALS-Dilithium) as the newly standardized, quantum-resistant successor mandated for future secure systems. This transition underscores the strategic importance of evaluating digital signature algorithms not only as cryptographic primitives but also as formal standards with far-reaching implications for public policy, regulatory compliance, and long-term protocol governance.