Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : Journal of Computer Networks, Architecture and High Performance Computing

Cybersecurity Integration in Enterprise Architecture for IoT Infrastructure in Steel Manufacturing Hindarto, Djarot
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4415

Abstract

As a result of the widespread adoption of Internet of Things technology in the steel manufacturing industry, there is an urgent requirement for the implementation of robust cybersecurity measures. The proliferation of IoT devices has caused a data explosion, which in turn has increased the risk of cyberattacks. The purpose of this research is to develop an enterprise architecture model that is capable of effectively managing cybersecurity risks on Internet of Things infrastructure in the steel manufacturing industry. This is a response to the urgent challenge that has been presented. The methodology utilized in this study is a rigorous qualitative approach, which involves the collection and analysis of data through interviews and literature reviews related to the topic. Following an in-depth analysis of the findings of the research, several important goals have been established. These goals include the identification of potential dangers, the reduction of potential risks, and the effective implementation of security controls. Within the context of the steel manufacturing industry, this research makes a significant contribution to the improvement of cybersecurity in Internet of Things infrastructure. In addition to identifying potential dangers and mitigating risks, the architecture model that has been proposed is about more than that. It offers a comprehensive and well-coordinated safety strategy, which guarantees a strong defense against cyber threats.