Edge of Enterprise Architecture in Addressing Cyber Security Threats and Business Risks

Main Article Content

Loso Judijanto
Djarot Hindarto
Sentot Imam Wahjono
Djunarto

Abstract

Enterprise Architecture plays a critical role in reducing business risks holistically and ensuring a company's resilience to cyber security threats. This abstract emphasizes the significance of Enterprise Architecture in contemporary organizational structures and its influence on these matters, particularly at a time when cybersecurity threats are becoming more prevalent in the global business arena. By integrating Human Resources, Governance Frameworks, Technology, and Processes, Enterprise Architecture offers a holistic perspective of the Information Technology environment within an organization. By means of a methodical governance framework, Enterprise Architecture conducts comprehensive examinations of interdependencies among components, detects susceptibilities, and establishes robust groundwork for enhanced threat prevention. Enterprise Architecture is not only a proactive risk management tool, but it also contributes significantly to the overall business strategy. The integration of cybersecurity and enterprise architecture entails not only fortifying the technological infrastructure but also integrating it into the overarching business strategy. This enables the correlation of cybersecurity endeavors with the objectives of the organization, thereby connecting technological aspirations with business strategy. This study emphasizes the potential of incorporating adaptive and agile responses to threats into corporate culture to foster innovation. By functioning as a strategic catalyst, it assists organizations in adjusting to cyber threats, safeguarding business interests, and optimizing operations within an ever-evolving digital environment. By integrating governance and enterprise architecture frameworks, organizations can proactively mitigate business risks and cybersecurity threats, thereby fostering resilience and sustainability in the dynamic digital environment.

Article Details

How to Cite
Judijanto, L., Hindarto, D., Wahjono, S. I., & Djunarto. (2023). Edge of Enterprise Architecture in Addressing Cyber Security Threats and Business Risks. International Journal Software Engineering and Computer Science (IJSECS), 3(3), 386–396. https://doi.org/10.35870/ijsecs.v3i3.1816
Section
Articles
Author Biographies

Loso Judijanto, IPOSS Jakarta

Public Policy Research, IPOSS Jakarta, Indonesia

Djarot Hindarto, Universitas Nasional

Informatics Study Program, Faculty of Communication and Informatics Technology, Universitas Nasional, City of South Jakarta, Special Capital Region of Jakarta, Indonesia

Sentot Imam Wahjono, Universitas Muhammadiyah Surabaya

Management Study Program, Faculty of Economics and Business, Universitas Muhammadiyah Surabaya, Surabaya City, East Java Province, Indonesia

Djunarto, Universitas Jayabaya

Postgraduate Master of Management, Faculty of Economics, Universitas Jayabaya, East Jakarta City, Special Capital Region of Jakarta, Indonesia

References

Hindarto, D., Indrajit, R.E. and Dazki, E., 2021. Sustainability of Implementing Enterprise Architecture in the Solar Power Generation Manufacturing Industry. Sinkron: jurnal dan penelitian teknik informatika, 6(1), pp.13-24. DOI: https://doi.org/10.33395/sinkron.v6i1.11115.

Amanda, D., Hindarto, D., Indrajit, E. and Dazki, E., 2023. Proposed use of TOGAF-Based Enterprise Architecture in Drinking Water Companies. Sinkron: jurnal dan penelitian teknik informatika, 8(3), pp.1265-1277. DOI: https://doi.org/10.33395/sinkron.v8i3.12477.

Iswahyudi, I., Hindarto, D. and Indrajit, R.E., 2023. Digital Transformation in University: Enterprise Architecture and Blockchain Technology. Sinkron: jurnal dan penelitian teknik informatika, 8(4), pp.2501-2512. DOI: https://doi.org/10.33395/sinkron.v8i4.12977.

Hindarto, D., 2023. Blockchain-Based Academic Identity and Transcript Management in University Enterprise Architecture. Sinkron: jurnal dan penelitian teknik informatika, 8(4), pp.2547-2559. DOI: https://doi.org/10.33395/sinkron.v8i4.12978.

Hindarto, D. and Santoso, H., 2021. Android APK Identification using Non Neural Network and Neural Network Classifier. Journal of Computer Science and Informatics Engineering (J-Cosine), 5(2), pp.149-157. DOI: https://doi.org/10.29303/jcosine.v5i2.420.

Hindarto, D. and Santoso, H., 2022. Performance Comparison of Supervised Learning Using Non-Neural Network and Neural Network. Jurnal Nasional Pendidikan Teknik Informatika: JANAPATI, 11(1), pp.49-62. DOI: https://doi.org/10.23887/janapati.v11i1.40768.

Sari, R.T.K. and Hindarto, D., 2023. Implementation of Cyber-Security Enterprise Architecture Food Industry in Society 5.0 Era. Sinkron: jurnal dan penelitian teknik informatika, 8(2), pp.1074-1084. DOI: https://doi.org/10.33395/sinkron.v8i2.12377.

Hasan, M.K., Habib, A.A., Shukur, Z., Ibrahim, F., Islam, S. and Razzaque, M.A., 2023. Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations. Journal of Network and Computer Applications, 209, p.103540. DOI: https://doi.org/10.1016/j.jnca.2022.103540.

Chadwick, D.W., Fan, W., Costantino, G., De Lemos, R., Di Cerbo, F., Herwono, I., Manea, M., Mori, P., Sajjad, A. and Wang, X.S., 2020. A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future generation computer systems, 102, pp.710-722. DOI: https://doi.org/10.1016/j.future.2019.06.026.

Mantha, B., de Soto, B.G. and Karri, R., 2021. Cyber security threat modeling in the AEC industry: An example for the commissioning of the built environment. Sustainable Cities and Society, 66, p.102682. DOI: https://doi.org/10.1016/j.scs.2020.102682.

Varga, S., Brynielsson, J. and Franke, U., 2021. Cyber-threat perception and risk management in the Swedish financial sector. Computers & security, 105, p.102239. DOI: https://doi.org/10.1016/j.cose.2021.102239.


Ainslie, S., Thompson, D., Maynard, S. and Ahmad, A., 2023. Cyber-Threat Intelligence for Security Decision-Making: A Review and Research Agenda for Practice. Computers & Security, p.103352. DOI: https://doi.org/10.1016/j.cose.2023.103352.

Marksteiner, S., Vallant, H. and Nahrgang, K., 2019. Cyber security requirements engineering for low-voltage distribution smart grid architectures using threat modeling. Journal of Information Security and Applications, 49, p.102389. DOI: https://doi.org/10.1016/j.jisa.2019.102389.

Zahid, S., Mazhar, M.S., Abbas, S.G., Hanif, Z., Hina, S. and Shah, G.A., 2023. Threat modeling in smart firefighting systems: Aligning MITRE ATT&CK matrix and NIST security controls. Internet of Things, 22, p.100766. DOI: https://doi.org/10.1016/j.iot.2023.100766.

Rudrakar, S. and Rughani, P., 2023. IoT based agriculture (Ag-IoT): A detailed study on architecture, security and forensics. Information Processing in Agriculture. DOI: https://doi.org/10.1016/j.inpa.2023.09.002.

Loft, P., He, Y., Yevseyeva, I. and Wagner, I., 2022. CAESAR8: An agile enterprise architecture approach to managing information security risks. Computers & Security, 122, p.102877. DOI: https://doi.org/10.1016/j.cose.2022.102877.

Most read articles by the same author(s)

1 2 > >>