PERANG SIBER di ERA KONEKTIVITAS TINGGI: KONVERGENSI JARINGAN KOMUNIKASI DATA dan KONFLIK DIGITAL

Authors

  • Muhammad Rizky Habibie Institut Agama Islam Al-Zaytun Indonesia
  • Putri Nabila Institut Agama Islam Al-Zaytun Indonesia
  • Aufa Zakiya Faizza Institut Agama Islam Al-Zaytun Indonesia
  • Rakhmatan Lil Alamin Arrasyid Institut Agama Islam Al-Zaytun Indonesia
  • Anjar Sulistyani Institut Agama Islam Al-Zaytun Indonesia

DOI:

https://doi.org/10.23969/jp.v11i01.40081

Keywords:

technology convergence, data communication, cyber warfare, cyber security, critical infrastructure, konvergensi teknologi, komunikasi data, perang siber, keamanan siber, infrastruktur kritis

Abstract

This study analyzes the relationship between data communication network convergence and the escalation of global cyber warfare in the high-connectivity era. The integration of Internet of Things (IoT), cloud computing, edge computing, and 5G networks has created efficient yet vulnerable communication ecosystems. Using a qualitative comparative case study on SolarWinds (2020), Colonial Pipeline (2021), and Ukraine’s energy cyberattacks (2022–2024), the study finds that technological convergence expands cross-domain vulnerabilities (IT–OT–Cloud–Edge), triggers cascading impacts on critical systems, and accelerates the shift toward integrated digital warfare. The research introduces the Strategic Convergence Theory, emphasizing the need for zero-trust architectures, cross-sector cyber deterrence policies, and adaptive resilience-based governance to strengthen global cybersecurity.

Downloads

Download data is not yet available.

References

Ahmad, I., Rodriguez, F., & Kumar, T. (2024). Communications security in Industry X: A survey. IEEE Communications Magazine.

Dhirani, L. L., Armstrong, E., & Newe, T. (2021). Industrial IoT, cyber threats, and standards landscape: Evaluation and roadmap. Sensors, 21(11), 3901.

Kufakunesu, R., Myburgh, H., & De Freitas, A. (2025). The internet of battle things: A survey on communication challenges and recent solutions. Discover Internet of Things.

Kolawole, I. (2025). Advancing US National Security with Cloud Computing: Strengthening Intelligence, Cyber Resilience, and Homeland Defense Strategies. International Journal of Engineering Technology Research & Management.

Lakhal, H., Zegrari, M., & Bahnasse, A. (2025). Next-Generation Smart Grid Cybersecurity: A Systematic Review of OT Cyber Threats, AI-Driven Defense, Cyber Deception Techniques, and Emerging Security Paradigms. IEEE Access.

Manea, O. A., & Zbuchea, A. (2025). The convergence of artificial intelligence and cybersecurity: Innovations, challenges, and future directions. Economic and Political Consequences of AI.

Prince, N. U., Al Mamun, M. A., & Olajide, A. O. (2024). IEEE Standards and Deep Learning Techniques for Securing Internet of Things (IoT) Devices Against Cyber Attacks. Journal of Cybersecurity Research.

Zhukabayeva, T., Zholshiyeva, L., Karabayev, N., & Khan, S. (2025). Cybersecurity solutions for industrial internet of things–edge computing integration: Challenges, threats, and future directions. Sensors, 25(1), 213.

Braun, V., & Clarke, V. (2022). Thematic analysis: A practical guide. SAGE Publications.

Creswell, J. W., & Poth, C. N. (2020). Qualitative inquiry and research design: Choosing among five approaches (4th ed.). SAGE Publications.

Lincoln, Y. S., & Guba, E. G. (2021). Naturalistic Inquiry Revisited: Recent Developments in Qualitative Research. Forum Qualitative Sozialforschung, 22(1).

Nowell, L. S., Norris, J. M., White, D. E., & Moules, N. J. (2022). Thematic analysis: Striving to meet the trustworthiness criteria. International Journal of Qualitative Methods, 21, 1–13.

Tsvetkov, P., Chernenko, S., & Pavlov, E. (2023). Cyberwarfare in hybrid conflicts: The case of Ukraine 2022–2023. Defence Studies, 23(4), 412–429.

Yin, R. K. (2023). Case Study Research and Applications: Design and Methods (7th ed.). SAGE Publications.

Ahmad, I., Rodriguez, F., & Kumar, T. (2024). Communications Security in Industry X: A Survey. IEEE Communications Magazine.

Al-Dhaheri, H., Hussain, F., & Abawajy, J. (2023). Cloud–Edge–IoT Convergence: Security and Privacy Challenges. IEEE Access, 11, 181231–181246.

Charney, D., & Lutaaya, S. (2021). Supply Chain Cyber Attacks and Their Global Impact. Journal of Cyber Policy, 6(3), 355–370.

Chowdhury, M., & Alshamrani, A. (2024). Cross-Domain Cyber Resilience in Critical Infrastructure Systems. Computers & Security, 140, 103605.

Ghafir, I., Prenosil, V., & Hammoudeh, M. (2022). Ransomware Evolution: From Locker to Crypto. Computers & Security, 112, 102523.

Koch, J., Weber, R., & Lupu, E. (2024). Hybrid Warfare and Digital Infrastructure Vulnerabilities. Security Journal, 37(2), 143–160.

Lakhal, M., Zegrari, F., & Bahnasse, A. (2025). Cyber–Physical Convergence in Industrial Control Systems. Journal of Information Security and Applications, 83, 103873.

Liu, X., Wang, Y., & Tang, J. (2022). Complex Adaptive Security in 5G–IoT Ecosystems. IEEE Internet of Things Journal, 9(18), 17032–17046.

Manea, C., & Zbuchea, A. (2025). Cybersecurity in Complex Socio-Technical Systems. Information, 16(4), 211.

Prince, M., Al Mamun, K., & Olajide, D. (2024). AI and Deep Learning for IoT Security: Current Trends and Future Directions. Sensors, 24(9), 3067.

Tsvetkov, P., Bannikov, D., & Kuznetsova, E. (2023). Cyber Operations in the Russia–Ukraine Conflict: The Role of Digital Infrastructure. Defence Studies, 23(1), 89–112.

Zhukabayeva, D., Nurgaliyev, D., & Ongarbaeva, G. (2025). Global Digital Transformation and Cybersecurity Challenges. Telecommunications Policy, 49(2), 102583.

Downloads

Published

2026-01-06

Most read articles by the same author(s)