Cybersecurity Integration in Enterprise Architecture for IoT Infrastructure in Steel Manufacturing
DOI:
10.47709/cnahpc.v6i3.4415Keywords:
Cybersecurity, Internet of Things, Mitigation Risk, Steel Manufacture, ThreatsDimension Badge Record
Abstract
As a result of the widespread adoption of Internet of Things technology in the steel manufacturing industry, there is an urgent requirement for the implementation of robust cybersecurity measures. The proliferation of IoT devices has caused a data explosion, which in turn has increased the risk of cyberattacks. The purpose of this research is to develop an enterprise architecture model that is capable of effectively managing cybersecurity risks on Internet of Things infrastructure in the steel manufacturing industry. This is a response to the urgent challenge that has been presented. The methodology utilized in this study is a rigorous qualitative approach, which involves the collection and analysis of data through interviews and literature reviews related to the topic. Following an in-depth analysis of the findings of the research, several important goals have been established. These goals include the identification of potential dangers, the reduction of potential risks, and the effective implementation of security controls. Within the context of the steel manufacturing industry, this research makes a significant contribution to the improvement of cybersecurity in Internet of Things infrastructure. In addition to identifying potential dangers and mitigating risks, the architecture model that has been proposed is about more than that. It offers a comprehensive and well-coordinated safety strategy, which guarantees a strong defense against cyber threats.
Downloads
Abstract viewed = 76 times
References
Abawajy, J., Darem, A., & Alhashmi, A. A. (2021). Feature subset selection for malware detection in smart iot platforms. Sensors (Switzerland), 21(4), 1–19. https://doi.org/10.3390/s21041374
Alwi, M. N., Hindarto, D., & Marina, A. (2023). Efficiency and Effectiveness?: Enterprise Architecture Strategies for Healthcare Service. 3(December), 386–397.
Babu, T., Roopa, H., Kumar, A., David, D. S., Jayadatta, S., & Rajesh, A. S. (2022). Internet of things-based automation design and organizational innovation of manufacturing enterprises. Materials Today?: Proceedings, 56, 1769–1775. https://doi.org/10.1016/j.matpr.2021.10.459
Bachute, M. R., & Subhedar, J. M. (2021). Autonomous Driving Architectures: Insights of Machine Learning and Deep Learning Algorithms. Machine Learning with Applications, 6(March), 100164. https://doi.org/10.1016/j.mlwa.2021.100164
Brandín, R., & Abrishami, S. (2024). IoT-BIM and blockchain integration for enhanced data traceability in offsite manufacturing. Automation in Construction, 159(January). https://doi.org/10.1016/j.autcon.2024.105266
Hindarto, D., Indrajit, R. E., & Dazki, E. (2021). Sustainability of Implementing Enterprise Architecture in the Solar Power Generation Manufacturing Industry. Sinkron, 6(1), 13–24. https://doi.org/10.33395/sinkron.v6i1.11115
Judijanto, L., & Hindarto, D. (2023). Edge of Enterprise Architecture in Addressing Cyber Security Threats and Business Risks. 3(December), 386–396.
Karthick, M. K., Kiruthiga, G., Ms Saraswathi, P., Dhiyanesh, B., & Radha, R. (2022). A Subset Scaling Recursive Feature Collection Based DDoS Detection Using Behavioural Based Ideal Neural Network For Security In A Cloud Environment. Procedia Computer Science, 215, 509–518. https://doi.org/10.1016/j.procs.2022.12.053
Korhonen, J. J., & Poutanen, J. (2013). Tripartite Approach to Enterprise Architecture. JOURNAL OF ENTERPRISE ARCHITECTURE, 9(1), 28–38.
Lapalme, J. (2011). 3 Schools of Enterprise Architecture. IT Professional. https://doi.org/10.1109/MITP.2011.109
Lee, I. (2021). Internet of Things The Internet of Things for enterprises?: An ecosystem, architecture, and IoT service business model. Internet of Things, 7(2019). https://doi.org/10.1016/j.iot.2019.100078
Matthes, D. (2011). Enterprise Architecture Frameworks Kompendium. Springer.
Mittal, A., Gupta, M. P., Chaturvedi, M., Chansarkar, S. R., & Gupta, S. (2021). Cybersecurity Enhancement through Blockchain Training (CEBT) – A serious game approach. International Journal of Information Management Data Insights, 1(1). https://doi.org/10.1016/j.jjimei.2020.100001
Mostofa, K. Z., & Islam, M. A. (2023). ScienceDirect Creation of an Internet of Things ( IoT ) system for the live and remote monitoring of solar photovoltaic facilities. Energy Reports, 9, 422–427. https://doi.org/10.1016/j.egyr.2023.09.060
Rani, S., & Srivastava, G. (2024). Secure hierarchical fog computing-based architecture for industry 5.0 using an attribute-based encryption scheme. Expert Systems With Applications, 235(August 2023). https://doi.org/10.1016/j.eswa.2023.121180
Unal, D., Al-ali, A., Catak, F. O., & Hammoudeh, M. (2025). A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based. Future Generation Computer Systems, 125(2021), 433–445. https://doi.org/10.1016/j.future.2021.06.050
Downloads
ARTICLE Published HISTORY
How to Cite
Issue
Section
License
Copyright (c) 2024 Djarot Hindarto
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.