Study of the Artificial Intelligence Role in Achieving Cybersecurity for Critical Information Infrastructure

  • Agus Kurniati National Cyber and Crypto Agency
Keywords: artificial intelligence, critical information infrastructure, cyber security, gap analysis, SOAR

Abstract

This research aims to examine the role of Artificial Intelligence (AI) in strengthening cybersecurity for critical information infrastructure (CII) in Indonesia. The research methodology used is a systematic literature review (SLR) involving identification, review, and evaluation, data collected through literature studies relevant to the research topic. Data were analyzed using critical synthesis method, gap analysis and SOAR (Strengths, Opportunities, Aspirations, Results) analysis, compared with the NIST Cybersecurity Framework to determine suitable strategic alternatives. The research results indicate that AI can strengthen cybersecurity in the CII sector by enhancing threat detection and response capabilities and optimizing risk management. The study also identified potential opportunities, such as cross-sector collaboration and the development of innovative technologies, as well as challenges, including the need to maintain transparency and ethical AI. In addition, the proposed strategy to realize AI as a tool in cyber security includes strengthening investment in technology, increasing human resource skills, and supporting development policies while taking into account potential risks that may arise, such as privacy violations, data leaks, and potential bias in decision making by AI systems. It is hoped that the results of this research will provide insight for stakeholders in efforts to strengthen cyber security in the IIV sector in Indonesia.

 

References

Badan Siber dan Sandi Negara. (2023). Peraturan BSSN No.8 Tahun 2023 Kerangka Kerja Pelindungan Infrastruktur Informasi Vital. In Bssn (1st ed.). Badan Siber dan Sandi Negara.

Badan Siber Dan Sandi Negara. (2023). Lanskap Keamanan Siber Indonesia Tahun 2023 (Badan Siber dan Sandi Negara (ed.); 1st ed., Issue 70). Badan Siber dan Sandi Negara.

Das, R., & Sandhane, R. (2021). Artificial Intelligence in Cyber Security. Journal of Physics: Conference Series, 1964(4). https://doi.org/10.1088/1742-6596/1964/4/042072

Farid, I., Reksoprodjo, A. H., & Suhirwan. (2023). Pemanfaatan Artificial Intelligence Dalam Pertahanan Siber. NUSANTARA: Jurnal Ilmu Pengetahuan Sosial , 10(2), 779–788. https://jurnal.um-tapsel.ac.id/index.php/nusantara/index

Jada, I., & Mayayise, T. O. (2024). The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review. Data and Information Management, 8(2), 100063. https://doi.org/10.1016/j.dim.2023.100063

Jenis Nilkanth Welukar, & Gagan Prashant Bajoria. (2021). Artificial Intelligence in Cyber Security - A Review. International Journal of Scientific Research in Science and Technology, 488–491. https://doi.org/10.32628/ijsrst218675

Joke Depraetere, Christopher Vandeviver, Ines Keygnaert, & Tom Vander Beken. (2020). The Critical Interpretive Syntesis: an assessment of reporting practices. 669-689. https://doi.org/10.1080/13645579.2020.1799637

Jonas, D., Aprila Yusuf, N., & Rahmania Az Zahra, A. (2023). Enhancing Security Frameworks with Artificial Intelligence in Cybersecurity. International Transactions on Education Technology (ITEE), 2(1), 83–91. https://doi.org/10.33050/itee.v2i1.428

Kemendikbudristek. (2024). Panduan Penggunaan Generative Artificial Intelligence ( Genai ). Panduan Penggunaan Generative Artificial Intelligence (Genai) Pada Pembelajaran Di Perguruan Tinggi.

Menkominfo. (2023). Pelaku Usaha Aktivitas. In Surat Edaran Menteri Komunikasi Dan Informatika Republik Indonesia Nomor 9 Tahun 2023 Tentang Etika Kecerdasan Artifisial (pp. 1–10).

Mutmainah, I., Yulia, I. A., Marnilin, F., & Mahfudi, A. Z. (2022). GAP Analysis Untuk Mengetahui Kinerja Implementasi Program Merdeka Belajar Kampus Merdeka. Jurnal Ilmiah Manajemen Kesatuan, 10(1), 19–34. https://doi.org/10.37641/jimkes.v10i1.934

NIST. (2024). The NIST Cybersecurity Framework (CSF) 2.0. The NIST Cybersecurity Framework (CSF) 2.0, NIST CSWP(1), 6–26. https://doi.org/10.6028/NIST.CSWP.29

Onno W Purbo. (2024). Menjaga AI Tetap Terkendali : Compliance dalam Era Teknologi Cerdas. Menjaga AI Tetap Terkendali : Compliance Dalam Era Teknologi Cerdas, 1.

Otoritas Jasa Keuangan. (2024). Pengembangan dan Penguatan Inovasi Teknologi Sektor Keuangan, Aset Keuangan Digital dan Aset Kripto. Otoritas Jasa Keuangan.

Peraturan Presiden (PERPRES) Nomor 82 Tahun 2022 Tentang Pelindungan Infrastruktur Informasi Vital, BSSN 1 (2022).

Politeknik Siber dan Sandi Negara. (2019). Tinjauan Strategis Kemanan Siber Indonesia (Teknologi Cloud dan Tata Kelola Data). Tinjauan Strategis Kemanan Siber Indonesia (Teknologi Cloud Dan Tata Kelola Data), 11(1), 1–14. https://scioteca.caf.com/bitstream/handle/123456789/1091/RED2017-Eng-8ene.pdf?sequence=12&isAllowed=y%0Ahttps://dx.doi.org/10.1016/j.regsciurbeco.2008.06.005%0Ahttps://www.researchgate.net/publication/305320484_SISTEM_PEMBETUNGAN_TERPUSAT_STRATEGI_MELESTARI

Pongoh, A. G., Fahreza, R. A., Kindi, B. Al, Pribadi, F. S., & Ajie, R. (2024). Systematic Literature Review ( SLR ): Dampak Pemanfaatan Artificial Intelligence untuk Meningkatkan Cyber Security Systematic Literature Review ( SLR ): The Impact of Utilizing Artificial Intelligence to Enhance Cyber Security. 7(1), 34–41.

Rothwell, W. J., Stavros, J. M., & Sullivan, R. L. (2015). Practicing Organization Development: Leading Transformational Change: Fourth Edition. Practicing Organization Development: Leading Transformational Change: Fourth Edition, 1–480. https://doi.org/10.1002/9781119176626

Salem, A. H., Azzam, S. M., Emam, O. E., & Abohany, A. A. (2024). Advancing cybersecurity: a comprehensive review of AI-driven detection techniques. In Journal of Big Data (Vol. 11, Issue 1). Springer International Publishing. https://doi.org/10.1186/s40537-024-00957-y

Shamsan Saleh, A. M. (2024). Blockchain for secure and decentralized artificial intelligence in cybersecurity: A comprehensive review. Blockchain: Research and Applications, 5(3), 100193. https://doi.org/10.1016/j.bcra.2024.100193

Stavros, J., & Cole, M. (2013). SOARing Towards Positive Transformation and Change. Development Policy Review, 1(November 2013), 10–34. https://www.researchgate.net/publication/259975881_SOARing_towards_positive_transformation_and_change

Unesco. (2021). UNESCO. In Recommendation on the Ethics of Artificial Intelligence: Vol. SHS/BIO/PI (Issue November).

Zeng, Y. (2022). AI Empowers Security Threats and Strategies for Cyber Attacks. Procedia Computer Science, 208, 170–175. https://doi.org/10.1016/j.procs.2022.10.025

Published
2024-12-31
Section
Articles