SWOT Analysis in Determining Cyber Security Strategy in the Implementation of the Internet of Defense Things (IoDT) 5.0 System in the Defense Industry (PT. Dirgantara Indonesia, PT. Len Industri, and PT. Pindad)

Raidah Naufaliana Dewi, H.A Danang Rimbawa, Bisyron Wahyudi

Abstract


This study examines the implementation of the Internet of Defense Things (IoDT) 5.0 within the Indonesian defense industry, focusing on cybersecurity aspects. Through a SWOT analysis, the research identifies internal and external factors influencing the success or challenges of IoDT 5.0 implementation. Data collected via observations and questionnaires at PT. Pindad, PT. Dirgantara Indonesia, and PT. Len Industri in Bandung reveal key insights into the effectiveness of access management processes, incident response in cybersecurity, organizational culture and employee awareness of cybersecurity, the readiness of cybersecurity infrastructure, and the competencies of cybersecurity human resources. The findings highlight the critical need to strengthen access management procedures, enhance employee awareness, improve cybersecurity infrastructure, and develop the skills of cybersecurity professionals to address escalating threats. This research provides valuable insights into the challenges and strategic approaches for advancing IoT 5.0 in Indonesia's defense sector.

Keywords


IoDT 5.0, Cyber Security, Defense Industry, SWOT Analysis, Security Infrastructure

Full Text:

PDF

References


President of the Republic of Indonesia, “Presidential Regulation of the Republic of Indonesia Number 82 of 2022 concerning Protection of Vital Information Infrastructure,” 2022.

Ministry of Defense, “Regulation of the Minister of Defense of the Republic of Indonesia Number 82 of 2014 concerning Cyber Defense Guidelines,” Ministry of Defense of the Republic of Indonesia, 2014.

Kurniati, “SWOT Analysis in Determining Cyber and Password Security Training Strategies,” Journal of Commerce Scholars, vol. 3, no. 2, pp. 73–86, Nov. 2019.

E. Budi, D. Wira, and A. Infantono, “Strategy for Strengthening Cyber Security to Realize National Security in the Era of Society 5.0,” Proceedings of the Indonesian National Science Technology and Innovation Seminar (SENASTINDO), vol. 3, pp. 223–234, Dec. 21, 2021. [Online]. Available: https://doi.org/10.54706/senastindo.v3.2021.141

N. Munasyaroh, M.H. Kautsar, P.A. Fadhilah, I.Y. Utama, and S. Supandi, “SWOT Analysis of PT. Pindad (Persero) Business Line Innovation: Cyber Security Services,” Defendonesia, vol. 4, no. 1, pp. 1–10, Sep. 19, 2019. [Online]. Available: https://doi.org/10.54755/defendonesia.v4i1.76

S. Janiah, “Strategic Management Effect-Ife Matrix, SWOT Analysis, Competitive Profile Matrix (CPM) and BCG Matrix at Pt Yamaha,” Journal of Information Systems Management Economics, vol. 1, no. 2, pp. 188–196, Dec. 31, 2019. [Online]. Available: https://doi.org/10.31933/jemsi.v1i2.69

D.F. Mahira, D.S. Rohmahwatin, and N.D. Suciningtyas, “Strengthening Multistakeholder Integrated through Shared Responsibility in the Face of Cyber Attacks Threat,” Lex Scientia Law Review, vol. 4, no. 1, pp. 63–74, May 8, 2020. [Online]. Available: https://doi.org/10.15294/lesrev.v4i1.38191

M. Mashuri and D. Nurjannah, “SWOT Analysis as a Strategy to Increase Competitiveness,” JPS (Journal of Islamic Banking), vol. 1, no. 1, pp. 97–112, Apr. 13, 2020. [Online]. Available: https://doi.org/10.46367/jps.v1i1.205

ARFIANTI, “SWOT Analysis in Increasing Competitiveness at Pt. Trimega Syariah Makassar Branch Office,” 2017.

Sugiyono, Qualitative, Quantitative, R&D Research Methods, 1st ed., Jakarta: Alphabeta, 2003.

Sugiyono, Business Research Methods (Quantitative, Qualitative, R&D Approaches), Bandung: Alpha Beta, 2013.

L. Sutandar, “Strategic Management Analysis at PT. Semeru Teknik in Surabaya,” AGORA, 2017.

S. Arikunto, Research Procedures: A Practical Approach, 6th ed., rev. 13. Rineka Cipta, 2006.

S.K. Venkatachary, J. Prasad, and R. Samikannu, “Cybersecurity and Cyber Terrorism - in Energy Sector: A Review,” Journal of Cyber Security Technology, 2018.

D. Ani, U.P. He, H.M. & Tiwari, A., “Review of Cybersecurity Issues in Industrial Critical Manufacturing: Manufacturing in Perspective,” Journal of Cyber Security Technology, 2017.

C. Rahmawati, “Indonesian Cyber Security Challenges and Threats in the Era of Industrial Revolution 4.0,” Nov. 17, 2020. [Online]. Available: https://aau.e-journal.id/senastindo/article/view/116

I.A. Fauzan, “Cyber Security in Indonesia: Building Digital Defense in the Era of Society 5.0,” Kompasiana, Dec. 18, 2023. [Online]. Available: https://www.kompasiana.com/ibnu1030/658060c312d50f6ea21f9d22/keamanan-cyber-di-indonesia-membangun-perlahan-digital-diera-community-5-0

H. Dwipratama, “The Potential of Dual-Use Technological Disruption in Creating an Advanced, Strong, Independent and Competitive Defense Industry,” Kemhan.go.id, Sep. 8, 2023. [Online]. Available: https://www.kemhan.go.id/pothan/2023/09/08/potensi-dual-usedisrup-technology-dalam-mewujudkan-industri-perlahan-yang-majukuat-independent-and-powerful-competitive.html

O. Purbo, “Cyber Security: Infrastructure and Technology,” LinkedIn, May 30, 2023. [Online]. Available: https://id.linkedin.com/pulse/cyber-security-infrastructure-dantechnology-onno-purbo

DEFEND ID, “DEFEND ID: Transformation Increases Defense Industry Contribution to the Nation,” Holding of Defense ID, 2022. [Online]. Available: https://www.len.co.id/defend-id-transformation-angkatkan-kontributindustri-perlahan-kepada-negara/

PT. Len Industri, “PT. Len Industri,” 2024. [Online]. Available: https://www.len.co.id/

PTDI, “PT. Indonesian Aerospace (PTDI),” 2024. [Online]. Available: https://www.indonesian-aerospace.com/id

PT. Pindad, “PT Profile,” Pindad, 2024. [Online]. Available: https://pindad.com

I. Kurniawan, “IFAS-EFAS for Strategy Planning,” School of Information Systems, Feb. 5, 2021. [Online]. Available: https://sis.binus.ac.id/2021/02/05/ifas-efasuntuk-strategy-planning/




DOI: http://dx.doi.org/10.52155/ijpsat.v49.1.6931

Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Raidah Naufaliana Dewi, H.A Danang Rimbawa, Bisyron Wahyudi

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.