Examining cyber security implementation through TLS/SSL on academic institutional repository in Indonesia

  • Irhamni Ali Department of Information Science, University of North Texas
Keywords: cyber security, academic institutional repository security, digital library security

Abstract

Introduction. This paper examines the cybersecurity of AIR in Indonesia by analyzing the security aspect focusing on the security protocols involving network called TLS (Transport Layer Security) and SSL (Secure Socket Layer), which has functions to secure the communication.

Data Collection Methods.  This research was conducted through experimental on the best AIR in Indonesia at private and public universities.

Data Analysis. The data were descriptively analysed using scoring method of SSL Scoring.

Results and Discussion. Several issues found was most Indonesian Academic Institutional Repositories have vulnerable security issues in their TLS/SSL and could cause problems disastrous for their information asset's security.

Conclusion. Based on the findings, Indonesian AIR is urgent to implement security intervention for AIR to update the technology and policy to protect the information asset.

 

References

Abrenio, G. (2018). How to develop an enterprise encryption policy. Cyberarmed. https://www.cyberarmed.com/how-to-develop-an-enterprise-encryption-policy/

Agrawal, B., & Jain, A. (2018). Missing Values Prediction for Cyber Vulnerability Analysis in Academic Institutions. International Journal of Computer Applications, 180, 16–25.

Alashwali, E. S., & Szlachowski, P. (2018). Risks and Security of Internet and Systems. In F. Cuppens (Ed.), 13th International Conference CRiSIS 2018. Springer.

Altaf, I., Ul Rashid, F., Dar, J. A., & Rafiq, M. (2016). Vulnerability assessment and patching management. International Conference on Soft Computing Techniques and Implementations, ICSCTI 2015, 16–21. https://doi.org/10.1109/ICSCTI.2015.7489631

Alwazzeh, M., Karaman, S., & Shamma, M. N. (2020). Man in The Middle Attacks Against SSL/TLS: Mitigation and Defeat. Journal of Cyber Security and Mobility, 9, 449–468. https://doi.org/10.13052/jcsm2245-1439.933

Aslan, O., & Samet, R. (2020). A Comprehensive Review on Malware Detection Approaches. IEEE Access, 8, 6249–6271. https://doi.org/10.1109/ACCESS.2019.2963724

Bijani, S., & Robertson, D. (2014). A review of attacks and security approaches in open multi-agent systems. Artificial Intelligence Review, 42(4), 607–636. https://doi.org/10.1007/s10462-012-9343-1

Donaldson, S., Navin Shah, J., Pedley, D., Crozier, D., & Furnell, S. (2020). UK Cyber Security Sectoral Analysis 2020.

Formanek, M., & Zaborsky, M. (2017a). Web interface security vulnerabilities of selected European open-access academic repositories. LIBER Quarterly, 27(1), 45–57. https://doi.org/10.18352/lq.10178

Formanek, M., & Zaborsky, M. (2017b). Web interface security vulnerabilities of selected European open-access academic repositories. LIBER Quarterly, 27(1), 45–57. https://doi.org/10.18352/lq.10178

Guenther, K. M. (2009). The politics of names: Rethinking the methodological and ethical significance of naming people, organizations, and places. Qualitative Research, 9(4), 411–421. https://doi.org/10.1177/1468794109337872

Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., & Mahmood, S. (2020a). Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study. Arabian Journal for Science and Engineering, 45(4), 3171–3189. https://doi.org/10.1007/s13369-019-04319-2

Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., & Mahmood, S. (2020b). Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study. Arabian Journal for Science and Engineering, 45(4), 3171–3189. https://doi.org/10.1007/s13369-019-04319-2

Kavallieratos, G., & Katsikas, S. (2020). Managing cyber security risks of the cyber-enabled ship. Journal of Marine Science and Engineering, 8(10), 1–19. https://doi.org/10.3390/jmse8100768

Kemristekdikti. (2020). RAMA Repository. https://rama.ristekbrin.go.id/

Kovářová, P. (2011). Vulnerabilities of institutional repositories. Seminar on Providing Access to Grey Literature 2011, July.

Liauw, T. T., & Genoni, P. (2017a). A Different Shade of Green: A Survey of Indonesian Higher Education Institutional Repositories. Journal of Librarianship and Scholarly Communication, 4(0), 0–26. https://doi.org/10.7710/2162-3309.2136

Liauw, T. T., & Genoni, P. (2017b). A Different Shade of Green: A Survey of Indonesian Higher Education Institutional Repositories. Journal of Librarianship and Scholarly Communication, 4(0), 0–26. https://doi.org/10.7710/2162-3309.2136

Mita Paul & Anindya Basu. (2015). a Study on Open Access in Indonesia. International Journal of Library Science and Research (IJLSR), 5(4), 11–20.

Noorden, R. Van. (2019). Indonesia tops open-access publishing charts. https://www.nature.com/articles/d41586-019-01536-5

Oğüt, H., Raghunathan, S., & Menon, N. (2011). Cyber security risk management: public policy implications of correlated risk, imperfect ability to prove loss, and observability of self-protection. Risk Analysis : An Official Publication of the Society for Risk Analysis, 31(3), 497–512. https://doi.org/10.1111/j.1539-6924.2010.01478.x

Perpusnas. (2020). Indonesia One Search. http://onesearch.id

Priyanto, I. F., & Miksa, S. D. (2015). Readiness of Indonesian academic libraries for open access and open access repositories implementation: A study on Indonesian open access repositories registered in OpenDOAR. ProQuest Dissertations and Theses, 207.

Radivilova, T., Kirichenko, L., Ageyev, D., Tawalbeh, M., & Bulakh, V. (2018). Decrypting SSL / TLS Traffic for Hidden Threats Detection. 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2–5.

Reeves, A., Delfabbro, P., & Calic, D. (2021). Encouraging Employee Engagement With Cybersecurity: How to Tackle Cyber Fatigue. SAGE Open, 11(1). https://doi.org/10.1177/21582440211000049

Taylor, A. (2019). Decrypting SSL traffic: best practices for security, compliance and productivity. Network Security, 2019, 17–19. https://doi.org/10.1016/S1353-4858(19)30098-4

Wiles, R., Crow, G., Heath, S., & Charles, V. (2008). The Management of Confidentiality and Anonymity in Social Research. International Journal of Social Research Methodology, 11(5), 417–428. https://doi.org/10.1080/13645570701622231

Zervas, M., Kounoudes, A., Artemi, P., & Giannoulakis, S. (2019). Next generation Institutional Repositories: The case of the CUT Institutional Repository KTISIS. Procedia Computer Science, 146, 84–93. https://doi.org/10.1016/j.procs.2019.01.083

Published
2021-11-19
How to Cite
Ali, I. (2021). Examining cyber security implementation through TLS/SSL on academic institutional repository in Indonesia. Berkala Ilmu Perpustakaan Dan Informasi, 17(2), 238-249. https://doi.org/10.22146/bip.v17i2.2082
Section
Articles