Cybersecurity: Transforming Vulnerable System to A More Secure and Hard-to-Penetrate System

Authors

  • Perdylasta Universitas Muhammadiyah Prof. Dr. HAMKA
  • Diandra Harry Saputra Universitas Muhammadiyah Prof. Dr. Hamka
  • Muhammad Irfa'i Universitas Muhammadiyah Prof. Dr. Hamka
  • Muhammad Sayyid Azzuhdi Universitas Muhammadiyah Prof. Dr. Hamka

Keywords:

multi-layered security, system vulnerability, cybersecurity, cyberthreats

Abstract

Protecting vulnerable systems has been a critical concern as cyberthreats continue to rapidly grow. This paper explores strategies for transforming these vulnerable systems into a more secure and hard-to-penetrate system. There are several techniques or strategies to strengthen the protection of a system including Zero-Trust Architecture (ZTA), advance authentication mechanism, and machine learning threat detection. If these techniques or strategies combined and integrated, the result would significantly enhances the system protection. Zero-trust Architecture (ZTA) reduce the attack surfaces, machine learning dynamically detect the threat, and advanced authentication mechanism reduce unauthorized access.

References

Alsamiri, J., & Alsubhi, K. (2019). Internet of Things Cyber Attacks Detection using Machine Learning. International Journal of Advanced Computer Science and Applications, 10(12). https://doi.org/10.14569/IJACSA.2019.0101280

Alsharif, M., Mishra, S., & AlShehri, M. (2021). Impact of Human Vulnerabilities on Cybersecurity. Computer Systems Science and Engineering, 40(3), 1153–1166. https://doi.org/10.32604/CSSE.2022.019938

Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions. Electronics, 12(6), 1333. https://doi.org/10.3390/electronics12061333

Barik, K., Misra, S., Konar, K., Fernandez-Sanz, L., & Koyuncu, M. (2022). Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study. Applied Artificial Intelligence, 36(1). https://doi.org/10.1080/08839514.2022.2055399

Dokur, N. B. (2023). Artificial Intelligence (AI) Applications in Cyber Security. January. https://www.researchgate.net/publication/367253331_Artificial_Intelligence_AI_Applications_in_Cyber_Security

Dwyer, A. C., Stevens, C., Muller, L. P., Cavelty, M. D., Coles-Kemp, L., & Thornton, P. (2022). What Can a Critical Cybersecurity Do? International Political Sociology, 16(3), 1–26. https://doi.org/10.1093/ips/olac013

Esther Jyothi, V., Prasad, B. D. C. N., & Mojjada, R. K. (2020). Analysis of Cryptography Encryption for Network Security. IOP Conference Series: Materials Science and Engineering, 981(2). https://doi.org/10.1088/1757-899X/981/2/022028

Gawand, S. P., & Kumar, M. S. (2023). A Comparative Study of Cyber Attack Detection & Prediction Using Machine Learning Algorithms. https://doi.org/10.21203/rs.3.rs-3238552/v1

Kapoor, A., Gupta, A., Gupta, R., Tanwar, S., Sharma, G., & Davidson, I. E. (2021). Ransomware Detection, Avoidance, and Mitigation Scheme: A Review and Future Directions. Sustainability, 14(1), 8. https://doi.org/10.3390/su14010008

MalathiEswaran, S.Hamsanandhini, & IlakiyaLakshmi, K. (2021). Survey of Cyber security approaches for Attack Detection and Prevention. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(2), 3436–3441. https://doi.org/10.17762/turcomat.v12i2.2406

Mantha, B. R. K., & de Soto, B. G. (2019). Cyber security challenges and vulnerability assessment in the construction industry. Proceedings of the Creative Construction Conference 2019, June, 29–37. https://doi.org/10.3311/CCC2019-005

Perwej, D. Y., Qamar Abbas, S., Pratap Dixit, J., Akhtar, D. N., & Kumar Jaiswal, A. (2021). A Systematic Literature Review on the Cyber Security. International Journal of Scientific Research and Management, 9(12), 669–710. https://doi.org/10.18535/ijsrm/v9i12.ec04

Rauf, U., Mohsen, F., & Wei, Z. (2023). A Taxonomic Classification of Insider Threats: Existing Techniques, Future Directions & Recommendations. Journal of Cyber Security and Mobility, 12(2), 221–252. https://doi.org/10.13052/jcsm2245-1439.1225

Salem, A. H., Azzam, S. M., Emam, O. E., & Abohany, A. A. (2024). Advancing cybersecurity: a comprehensive review of AI-driven detection techniques. Journal of Big Data, 11(1), 105. https://doi.org/10.1186/s40537-024-00957-y

Shaukat, K., Luo, S., Varadharajan, V., Hameed, I. A., & Xu, M. (2020). A Survey on Machine Learning Techniques for Cyber Security in the Last Decade. IEEE Access, 8, 222310–222354. https://doi.org/10.1109/ACCESS.2020.3041951

Veale, M., & Ian Bro. (2020). Cybersecurity Cybersecurity. 0–22.

Welukar, J. N., & Bajoria, G. P. (2021). Artificial Intelligence in Cyber Security - A Review. International Journal of Scientific Research in Science and Technology, 488–491. https://doi.org/10.32628/IJSRST218675

Downloads

Published

2025-01-17

How to Cite

Perdylasta, Diandra Harry Saputra, Muhammad Irfa’i, & Muhammad Sayyid Azzuhdi. (2025). Cybersecurity: Transforming Vulnerable System to A More Secure and Hard-to-Penetrate System. Forum for University Scholars in Interdisciplinary Opportunities and Networking, 1(1), 254–258. Retrieved from https://conference.ut.ac.id/index.php/fusion/article/view/4775

Conference Proceedings Volume

Section

Articles

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.