Systematic Review of Defense Mechanisms, and Trust in Cyber Security

Systematic Review of Defense Mechanisms, and Trust in Cyber Security

Authors

  • Jiad Dzikri Ramadia Setiawan University of Sebelas April

Keywords:

Network Security, Intrusion Detection System, Cloud Computing, DDoS, Systematic Review Literature

Abstract

As the complexity of cyber threats increases in interconnected digital ecosystems like Cloud Computing and the Internet of Things (IoT), the need for comprehensive security strategies has become urgent. This study aims to analyze and synthesize various modern cybersecurity approaches through a Systematic Literature Review (SLR). By analyzing three relevant research articles, this review identifies that an effective security strategy depends on a layered, integrated model. This model combines three main pillars: (1) a structured defense framework encompassing Prevention, Detection, and Mitigation against massive threats like Distributed Denial of Service (DDoS); (2) the practical implementation of automated monitoring systems such as an Intrusion Detection System (IDS) for real-time network surveillance; and (3) the establishment of user trust based on procedural and technical guarantees, primarily through Service Level Agreements (SLAs) in cloud environments. The synthesis shows that these three pillars are interdependent and are essential components for building a resilient and holistic cybersecurity posture.

References

A. Fahrezi, N. Apriliani, N. Ajijah, and D. Juardi, "Keamanan Data dan Transaksi dalam Pemanfaatan Cloud sebagai Service," Jurnal Pendidikan dan Konseling, vol. 4, no. 4, pp. 5530-5536, 2022.J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.

M. A. F. Tanjung, M. F. Ma'arif, and J. L. Tamaela, "Literature Review Mekanisme Pertahanan Terhadap Serangan Distributed Denial Of Service (DDOS)," Jurnal Teknologi Informasi, vol. 10, no. 2, pp. 106-111, 2024.

R. Muwardi et al., "Network Security Monitoring System Via Notification Alert," Journal of Integrated and Advanced Engineering (JIAE), vol. 1, no. 2, pp. 113-122, 2021.

Helmiawan, M. A., & Wiharko, T. (2018). Application of Fingerprint Security System on Motorcycles using Arduino Microcontroller. J-Tin’s-Jurnal Teknik Informatika, 2(1).

Helmiawan, M. A., Juna, D. I., & Ramdhani, B. (2018). Pengamanan Sistem Dan Data E-Voting Berbasis Network. INTERNAL (Information System Journal), 1(1), 1–10.

Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management

Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.

Published

2025-08-20
Loading...