Strategi Layanan Keamanan Siber pada Ekosistem Multi-Platform: Tinjauan Literatur
DOI:
https://doi.org/10.62671/jikum.v2i2.196Keywords:
cybersecurity, multi-platform, systematic literature review, zero trust, defense in depthAbstract
The rapid escalation of digital technology adoption has compelled modern organizations to operate within complex multi-platform ecosystems, integrating diverse operating systems, mobile devices, web applications, and cloud services. While this convergence enhances operational agility, it significantly expands the potential attack surface, exposing critical assets to sophisticated cyber threats. This study employs a Systematic Literature Review (SLR) methodology to evaluate and compare contemporary cybersecurity strategies. Analyzing 15 primary studies selected from reputable databases between 2018 and 2024, this research contrasts the efficacy of Perimeter-based models, Defense-in-Depth, and Zero Trust Architecture (ZTA). The findings demonstrate that traditional static security perimeters are obsolete in decentralized environments. Conversely, a hybrid approach combining Zero Trust with AI-driven threat detection offers superior resilience, reducing incident response latency and preventing lateral movement. The study concludes by proposing an integrated security framework that positions cybersecurity as a strategic business enabler rather than a technical support function.
References
Alasmary, W., et al. (2021). Cybersecurity challenges in multi-platform environments. Journal of Information Security, 12(3), 145–158.
Behl, A., & Behl, K. (2017). Cyberwar: The next threat to national security. Oxford University Press.
ENISA. (2021). Threat landscape report 2021. European Union Agency for Cybersecurity.
ISO/IEC. (2018). ISO/IEC 27001: Information security management systems. International Organization for Standardization.
Microsoft. (2022). Zero trust security guidance. Microsoft Security Documentation.
Munir, R. (2019). Kriptografi. Informatika Bandung.
NIST. (2020). Framework for improving critical infrastructure cybersecurity. National Institute of Standards and Technology.
Provos, N., & Honeyman, P. (2003). Hide and seek: An introduction to steganography. IEEE Security & Privacy, 1(3), 32–44.
Stallings, W. (2018). Effective cybersecurity: A guide to using best practices and standards. Pearson.
Stallings, W. (2017). Cryptography and network security: Principles and practice (7th ed.). Pearson Education.



