Examining cyber security implementation through TLS/SSL on academic institutional repository in Indonesia
Abstract
Introduction. This paper examines the cybersecurity of AIR in Indonesia by analyzing the security aspect focusing on the security protocols involving network called TLS (Transport Layer Security) and SSL (Secure Socket Layer), which has functions to secure the communication.
Data Collection Methods. This research was conducted through experimental on the best AIR in Indonesia at private and public universities.
Data Analysis. The data were descriptively analysed using scoring method of SSL Scoring.
Results and Discussion. Several issues found was most Indonesian Academic Institutional Repositories have vulnerable security issues in their TLS/SSL and could cause problems disastrous for their information asset's security.
Conclusion. Based on the findings, Indonesian AIR is urgent to implement security intervention for AIR to update the technology and policy to protect the information asset.
References
Abrenio, G. (2018). How to develop an enterprise encryption policy. Cyberarmed. https://www.cyberarmed.com/how-to-develop-an-enterprise-encryption-policy/
Agrawal, B., & Jain, A. (2018). Missing Values Prediction for Cyber Vulnerability Analysis in Academic Institutions. International Journal of Computer Applications, 180, 16–25.
Alashwali, E. S., & Szlachowski, P. (2018). Risks and Security of Internet and Systems. In F. Cuppens (Ed.), 13th International Conference CRiSIS 2018. Springer.
Altaf, I., Ul Rashid, F., Dar, J. A., & Rafiq, M. (2016). Vulnerability assessment and patching management. International Conference on Soft Computing Techniques and Implementations, ICSCTI 2015, 16–21. https://doi.org/10.1109/ICSCTI.2015.7489631
Alwazzeh, M., Karaman, S., & Shamma, M. N. (2020). Man in The Middle Attacks Against SSL/TLS: Mitigation and Defeat. Journal of Cyber Security and Mobility, 9, 449–468. https://doi.org/10.13052/jcsm2245-1439.933
Aslan, O., & Samet, R. (2020). A Comprehensive Review on Malware Detection Approaches. IEEE Access, 8, 6249–6271. https://doi.org/10.1109/ACCESS.2019.2963724
Bijani, S., & Robertson, D. (2014). A review of attacks and security approaches in open multi-agent systems. Artificial Intelligence Review, 42(4), 607–636. https://doi.org/10.1007/s10462-012-9343-1
Donaldson, S., Navin Shah, J., Pedley, D., Crozier, D., & Furnell, S. (2020). UK Cyber Security Sectoral Analysis 2020.
Formanek, M., & Zaborsky, M. (2017a). Web interface security vulnerabilities of selected European open-access academic repositories. LIBER Quarterly, 27(1), 45–57. https://doi.org/10.18352/lq.10178
Formanek, M., & Zaborsky, M. (2017b). Web interface security vulnerabilities of selected European open-access academic repositories. LIBER Quarterly, 27(1), 45–57. https://doi.org/10.18352/lq.10178
Guenther, K. M. (2009). The politics of names: Rethinking the methodological and ethical significance of naming people, organizations, and places. Qualitative Research, 9(4), 411–421. https://doi.org/10.1177/1468794109337872
Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., & Mahmood, S. (2020a). Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study. Arabian Journal for Science and Engineering, 45(4), 3171–3189. https://doi.org/10.1007/s13369-019-04319-2
Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., & Mahmood, S. (2020b). Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study. Arabian Journal for Science and Engineering, 45(4), 3171–3189. https://doi.org/10.1007/s13369-019-04319-2
Kavallieratos, G., & Katsikas, S. (2020). Managing cyber security risks of the cyber-enabled ship. Journal of Marine Science and Engineering, 8(10), 1–19. https://doi.org/10.3390/jmse8100768
Kemristekdikti. (2020). RAMA Repository. https://rama.ristekbrin.go.id/
Kovářová, P. (2011). Vulnerabilities of institutional repositories. Seminar on Providing Access to Grey Literature 2011, July.
Liauw, T. T., & Genoni, P. (2017a). A Different Shade of Green: A Survey of Indonesian Higher Education Institutional Repositories. Journal of Librarianship and Scholarly Communication, 4(0), 0–26. https://doi.org/10.7710/2162-3309.2136
Liauw, T. T., & Genoni, P. (2017b). A Different Shade of Green: A Survey of Indonesian Higher Education Institutional Repositories. Journal of Librarianship and Scholarly Communication, 4(0), 0–26. https://doi.org/10.7710/2162-3309.2136
Mita Paul & Anindya Basu. (2015). a Study on Open Access in Indonesia. International Journal of Library Science and Research (IJLSR), 5(4), 11–20.
Noorden, R. Van. (2019). Indonesia tops open-access publishing charts. https://www.nature.com/articles/d41586-019-01536-5
Oğüt, H., Raghunathan, S., & Menon, N. (2011). Cyber security risk management: public policy implications of correlated risk, imperfect ability to prove loss, and observability of self-protection. Risk Analysis : An Official Publication of the Society for Risk Analysis, 31(3), 497–512. https://doi.org/10.1111/j.1539-6924.2010.01478.x
Perpusnas. (2020). Indonesia One Search. http://onesearch.id
Priyanto, I. F., & Miksa, S. D. (2015). Readiness of Indonesian academic libraries for open access and open access repositories implementation: A study on Indonesian open access repositories registered in OpenDOAR. ProQuest Dissertations and Theses, 207.
Radivilova, T., Kirichenko, L., Ageyev, D., Tawalbeh, M., & Bulakh, V. (2018). Decrypting SSL / TLS Traffic for Hidden Threats Detection. 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2–5.
Reeves, A., Delfabbro, P., & Calic, D. (2021). Encouraging Employee Engagement With Cybersecurity: How to Tackle Cyber Fatigue. SAGE Open, 11(1). https://doi.org/10.1177/21582440211000049
Taylor, A. (2019). Decrypting SSL traffic: best practices for security, compliance and productivity. Network Security, 2019, 17–19. https://doi.org/10.1016/S1353-4858(19)30098-4
Wiles, R., Crow, G., Heath, S., & Charles, V. (2008). The Management of Confidentiality and Anonymity in Social Research. International Journal of Social Research Methodology, 11(5), 417–428. https://doi.org/10.1080/13645570701622231
Zervas, M., Kounoudes, A., Artemi, P., & Giannoulakis, S. (2019). Next generation Institutional Repositories: The case of the CUT Institutional Repository KTISIS. Procedia Computer Science, 146, 84–93. https://doi.org/10.1016/j.procs.2019.01.083
Copyright (c) 2021 Berkala Ilmu Perpustakaan dan Informasi
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Berkala Ilmu Perpustakaan dan Informasi is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
- Articles published in Berkala Ilmu Perpustakaan dan Informasi are licensed under a Creative Commons Attribution-ShareAlike 4.0 International license. You are free to copy, transform, or redistribute articles for any lawful purpose in any medium, provided you give appropriate credit to the original author(s) and Berkala Ilmu Perpustakaan dan Informasi, link to the license, indicate if changes were made, and redistribute any derivative work under the same license.
- Copyright on articles is retained by the respective author(s), without restrictions. A non-exclusive license is granted to Berkala Ilmu Perpustakaan dan Informasi to publish the article and identify itself as its original publisher, along with the commercial right to include the article in a hardcopy issue for sale to libraries and individuals.
- By publishing in Berkala Ilmu Perpustakaan dan Informasi, authors grant any third party the right to use their article to the extent provided by the Creative Commons Attribution-ShareAlike 4.0 International license.