Study of the Artificial Intelligence Role in Achieving Cybersecurity for Critical Information Infrastructure
Abstract
This research aims to examine the role of Artificial Intelligence (AI) in strengthening cybersecurity for critical information infrastructure (CII) in Indonesia. The research methodology used is a systematic literature review (SLR) involving identification, review, and evaluation, data collected through literature studies relevant to the research topic. Data were analyzed using critical synthesis method, gap analysis and SOAR (Strengths, Opportunities, Aspirations, Results) analysis, compared with the NIST Cybersecurity Framework to determine suitable strategic alternatives. The research results indicate that AI can strengthen cybersecurity in the CII sector by enhancing threat detection and response capabilities and optimizing risk management. The study also identified potential opportunities, such as cross-sector collaboration and the development of innovative technologies, as well as challenges, including the need to maintain transparency and ethical AI. In addition, the proposed strategy to realize AI as a tool in cyber security includes strengthening investment in technology, increasing human resource skills, and supporting development policies while taking into account potential risks that may arise, such as privacy violations, data leaks, and potential bias in decision making by AI systems. It is hoped that the results of this research will provide insight for stakeholders in efforts to strengthen cyber security in the IIV sector in Indonesia.
References
Badan Siber dan Sandi Negara. (2023). Peraturan BSSN No.8 Tahun 2023 Kerangka Kerja Pelindungan Infrastruktur Informasi Vital. In Bssn (1st ed.). Badan Siber dan Sandi Negara.
Badan Siber Dan Sandi Negara. (2023). Lanskap Keamanan Siber Indonesia Tahun 2023 (Badan Siber dan Sandi Negara (ed.); 1st ed., Issue 70). Badan Siber dan Sandi Negara.
Das, R., & Sandhane, R. (2021). Artificial Intelligence in Cyber Security. Journal of Physics: Conference Series, 1964(4). https://doi.org/10.1088/1742-6596/1964/4/042072
Farid, I., Reksoprodjo, A. H., & Suhirwan. (2023). Pemanfaatan Artificial Intelligence Dalam Pertahanan Siber. NUSANTARA: Jurnal Ilmu Pengetahuan Sosial , 10(2), 779–788. https://jurnal.um-tapsel.ac.id/index.php/nusantara/index
Jada, I., & Mayayise, T. O. (2024). The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review. Data and Information Management, 8(2), 100063. https://doi.org/10.1016/j.dim.2023.100063
Jenis Nilkanth Welukar, & Gagan Prashant Bajoria. (2021). Artificial Intelligence in Cyber Security - A Review. International Journal of Scientific Research in Science and Technology, 488–491. https://doi.org/10.32628/ijsrst218675
Joke Depraetere, Christopher Vandeviver, Ines Keygnaert, & Tom Vander Beken. (2020). The Critical Interpretive Syntesis: an assessment of reporting practices. 669-689. https://doi.org/10.1080/13645579.2020.1799637
Jonas, D., Aprila Yusuf, N., & Rahmania Az Zahra, A. (2023). Enhancing Security Frameworks with Artificial Intelligence in Cybersecurity. International Transactions on Education Technology (ITEE), 2(1), 83–91. https://doi.org/10.33050/itee.v2i1.428
Kemendikbudristek. (2024). Panduan Penggunaan Generative Artificial Intelligence ( Genai ). Panduan Penggunaan Generative Artificial Intelligence (Genai) Pada Pembelajaran Di Perguruan Tinggi.
Menkominfo. (2023). Pelaku Usaha Aktivitas. In Surat Edaran Menteri Komunikasi Dan Informatika Republik Indonesia Nomor 9 Tahun 2023 Tentang Etika Kecerdasan Artifisial (pp. 1–10).
Mutmainah, I., Yulia, I. A., Marnilin, F., & Mahfudi, A. Z. (2022). GAP Analysis Untuk Mengetahui Kinerja Implementasi Program Merdeka Belajar Kampus Merdeka. Jurnal Ilmiah Manajemen Kesatuan, 10(1), 19–34. https://doi.org/10.37641/jimkes.v10i1.934
NIST. (2024). The NIST Cybersecurity Framework (CSF) 2.0. The NIST Cybersecurity Framework (CSF) 2.0, NIST CSWP(1), 6–26. https://doi.org/10.6028/NIST.CSWP.29
Onno W Purbo. (2024). Menjaga AI Tetap Terkendali : Compliance dalam Era Teknologi Cerdas. Menjaga AI Tetap Terkendali : Compliance Dalam Era Teknologi Cerdas, 1.
Otoritas Jasa Keuangan. (2024). Pengembangan dan Penguatan Inovasi Teknologi Sektor Keuangan, Aset Keuangan Digital dan Aset Kripto. Otoritas Jasa Keuangan.
Peraturan Presiden (PERPRES) Nomor 82 Tahun 2022 Tentang Pelindungan Infrastruktur Informasi Vital, BSSN 1 (2022).
Politeknik Siber dan Sandi Negara. (2019). Tinjauan Strategis Kemanan Siber Indonesia (Teknologi Cloud dan Tata Kelola Data). Tinjauan Strategis Kemanan Siber Indonesia (Teknologi Cloud Dan Tata Kelola Data), 11(1), 1–14. https://scioteca.caf.com/bitstream/handle/123456789/1091/RED2017-Eng-8ene.pdf?sequence=12&isAllowed=y%0Ahttps://dx.doi.org/10.1016/j.regsciurbeco.2008.06.005%0Ahttps://www.researchgate.net/publication/305320484_SISTEM_PEMBETUNGAN_TERPUSAT_STRATEGI_MELESTARI
Pongoh, A. G., Fahreza, R. A., Kindi, B. Al, Pribadi, F. S., & Ajie, R. (2024). Systematic Literature Review ( SLR ): Dampak Pemanfaatan Artificial Intelligence untuk Meningkatkan Cyber Security Systematic Literature Review ( SLR ): The Impact of Utilizing Artificial Intelligence to Enhance Cyber Security. 7(1), 34–41.
Rothwell, W. J., Stavros, J. M., & Sullivan, R. L. (2015). Practicing Organization Development: Leading Transformational Change: Fourth Edition. Practicing Organization Development: Leading Transformational Change: Fourth Edition, 1–480. https://doi.org/10.1002/9781119176626
Salem, A. H., Azzam, S. M., Emam, O. E., & Abohany, A. A. (2024). Advancing cybersecurity: a comprehensive review of AI-driven detection techniques. In Journal of Big Data (Vol. 11, Issue 1). Springer International Publishing. https://doi.org/10.1186/s40537-024-00957-y
Shamsan Saleh, A. M. (2024). Blockchain for secure and decentralized artificial intelligence in cybersecurity: A comprehensive review. Blockchain: Research and Applications, 5(3), 100193. https://doi.org/10.1016/j.bcra.2024.100193
Stavros, J., & Cole, M. (2013). SOARing Towards Positive Transformation and Change. Development Policy Review, 1(November 2013), 10–34. https://www.researchgate.net/publication/259975881_SOARing_towards_positive_transformation_and_change
Unesco. (2021). UNESCO. In Recommendation on the Ethics of Artificial Intelligence: Vol. SHS/BIO/PI (Issue November).
Zeng, Y. (2022). AI Empowers Security Threats and Strategies for Cyber Attacks. Procedia Computer Science, 208, 170–175. https://doi.org/10.1016/j.procs.2022.10.025
Copyright (c) 2024 Agus Kurniati

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Authors who publish in this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- The journal allows the authors to hold the copyright without restrictions and to retain publishing rights without restrictions.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.