Integration of cyber defense and conventional security in addressing non-military threats in the digital era

Authors

  • Rosi Fitria Sensing Technology Study Program, Faculty of Defense Engineering and Technology, Universitas Pertahanan Indonesia, Bogor, West Java, 16810, Indonesia
  • Asep Adang Supriyadi Sensing Technology Study Program, Faculty of Defense Engineering and Technology, Universitas Pertahanan Indonesia, Bogor, West Java, 16810, Indonesia https://orcid.org/0000-0003-1103-6669

DOI:

https://doi.org/10.61511/napbres.v2i02.2025.2106

Keywords:

conventional security, cyber defense, digital era, non-military threat

Abstract

Background: The development of digital technology has transformed the landscape of threats to national security, with non-military threats, including cyberattacks, digital terrorism, and disinformation, becoming increasingly urgent. These threats have the potential to undermine social, economic, and political stability. This study aims to analyze the integration of cyber and conventional defense in strengthening national resilience against non-military threats. Method: This research employs a qualitative approach, analyzing literature and policies of national security institutions regarding non-military threats. Primary data were obtained through a literature review of journals and articles accessed via SCOPUS. The study began with brainstorming to identify topics, subthemes, and relationships between concepts. Findings: The results indicate that integrating cyber and conventional defense enhances the response to hybrid threats. Joint management of cyber and physical threats, along with sharing resources and information between agencies, enhances the effectiveness of responses to complex threats. Conclusion: This study concludes that integrating cyber and conventional defense systems is crucial for addressing threats in the digital age. Its success depends on clear policies, regulations, and strict oversight to ensure effective coordination between relevant agencies. Originality/Novelty of the Article: The article's originality lies in proposing an integrated defense model that combines conventional and cyber strategies to address hybrid threats, a topic that has not been extensively discussed in the literature.

References

Ahmed, M., Cox, D., Simpson, B., & Aloufi, A. (2022). ECU-IoFT: A Dataset for Analysing Cyber-Attacks on Internet of Flying Things. Applied Sciences (Switzerland), 12(4). https://doi.org/10.3390/app12041990

AL-Dosari, K., Fetais, N., & Kucukvar, M. (2024). Artificial Intelligence and Cyber Defense System for Banking Industry: A Qualitative Study of AI Applications and Challenges. Cybernetics and Systems, 55(2). https://doi.org/10.1080/01969722.2022.2112539

Bellanova, R., Carrapico, H., & Duez, D. (2022). Digital/sovereignty and European security integration: an introduction. European Security, 31(3). https://doi.org/10.1080/09662839.2022.2101887

Bellanova, R., & de Goede, M. (2022). Co-Producing Security: Platform Content Moderation and European Security Integration. Journal of Common Market Studies, 60(5). https://doi.org/10.1111/jcms.13306

Bellanova, R., & Glouftsios, G. (2022). Formatting European security integration through database interoperability. European Security, 31(3). https://doi.org/10.1080/09662839.2022.2101886

Bıçakcı, A. S., & Evren, A. G. (2022). Thinking multiculturality in the age of hybrid threats: Converging cyber and physical security in Akkuyu nuclear power plant. Nuclear Engineering and Technology, 54(7). https://doi.org/10.1016/j.net.2022.01.033

Binnar, P., Bhirud, S., & Kazi, F. (2024). Security analysis of cyber physical system using digital forensic incident response. In Cyber Security and Applications (Vol. 2). https://doi.org/10.1016/j.csa.2023.100034

Ding, M., Liu, W., Xiao, L., Zhong, F., Lu, N., Zhang, J., Zhang, Z., Xu, X., & Wang, K. (2022). Construction and optimization strategy of ecological security pattern in a rapidly urbanizing region: A case study in central-south China. Ecological Indicators, 136. https://doi.org/10.1016/j.ecolind.2022.108604

Faragallah, O. S., Afifi, A., El-Shafai, W., El-Sayed, H. S., Alzain, M. A., Al-Amri, J. F., & El-Samie, F. E. A. (2020). Efficiently Encrypting Color Images with Few Details Based on RC6 and Different Operation Modes for Cybersecurity Applications. IEEE Access, 8. https://doi.org/10.1109/ACCESS.2020.2994583

Ghelani, D. (2022). Cyber Security in Smart Grids, Threats, and Possible Solutions. CC-BY American Journal of Applied Scientific Research, 169.

Ghosal, A., & Conti, M. (2020). Security issues and challenges in V2X: A Survey. Computer Networks, 169. https://doi.org/10.1016/j.comnet.2019.107093

Guembe, B., Azeta, A., Misra, S., Osamor, V. C., Fernandez-Sanz, L., & Pospelova, V. (2022). The Emerging Threat of Ai-driven Cyber Attacks: A Review. In Applied Artificial Intelligence (Vol. 36, Issue 1). https://doi.org/10.1080/08839514.2022.2037254

Goffer, M., Uddin, M., Kaur, J., Hasan, S., Barikdar, C., Hassan, J., Das, N., Chakraborty, P., & Hasan, R. (2025). AI-Enhanced Cyber Threat Detection and Response: Advancing National Security in Critical Infrastructure. Journal of Posthumanism. https://doi.org/10.63332/joph.v5i3.965

Hafeez, S., Khan, A. R., Al-Quraan, M. M., Mohjazi, L., Zoha, A., Imran, M. A., & Sun, Y. (2023). Blockchain-Assisted UAV Communication Systems: A Comprehensive Survey. IEEE Open Journal of Vehicular Technology, 4. https://doi.org/10.1109/OJVT.2023.3295208

Hameed, S. S., Hassan, W. H., Latiff, L. A., & Ghabban, F. (2021). A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches. PeerJ Computer Science, 7. https://doi.org/10.7717/peerj-cs.414

Hou, J., Hu, C., Lei, S., & Hou, Y. (2024). Cyber resilience of power electronics-enabled power systems: A review. Renewable and Sustainable Energy Reviews, 189. https://doi.org/10.1016/j.rser.2023.114036

Irshad, R. R., Hussain, S., Hussain, I., Nasir, J. A., Zeb, A., Alalayah, K. M., Alattab, A. A., Yousif, A., & Alwayle, I. M. (2023). IoT-Enabled Secure and Scalable Cloud Architecture for Multi-User Systems: A Hybrid Post-Quantum Cryptographic and Blockchain-Based Approach Toward a Trustworthy Cloud Computing. IEEE Access, 11. https://doi.org/10.1109/ACCESS.2023.3318755

Jada, I., & Mayayise, T. O. (2024). The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review. Data and Information Management, 8(2). https://doi.org/10.1016/j.dim.2023.100063

Kaur, R., Gabrijelčič, D., & Klobučar, T. (2023). Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion, 97. https://doi.org/10.1016/j.inffus.2023.101804

Khan, A. R., Yasin, A., Usman, S. M., Hussain, S., Khalid, S., & Ullah, S. S. (2022). Exploring Lightweight Deep Learning Solution for Malware Detection in IoT Constraint Environment. Electronics (Switzerland), 11(24). https://doi.org/10.3390/electronics11244147

Khan, S. I., Ray, B. R., & Karmakar, N. C. (2024). RFID localization in construction with IoT and security integration. In Automation in Construction (Vol. 159). https://doi.org/10.1016/j.autcon.2023.105249

Kurnia, S. S., Rahman, Z., Cakranegar, D. I., Abdulla, S. I., Setiawan, D. A., Agustini, P. M., & Yenrizal. (2024). Effect of Counter-Narratives and Credibility of Sources on Emotional Response: A Study of Instagram and WhatsApp Followers. Journal of Intercultural Communication, 24(1). https://doi.org/10.36923/jicc.v24i1.170

Liebetrau, T. (2024). Problematising EU Cybersecurity: Exploring How the Single Market Functions as a Security Practice. Journal of Common Market Studies, 62(3). https://doi.org/10.1111/jcms.13523

Li, Y., Dai, J., & Cui, L. (2020). The impact of digital technologies on economic and environmental performance in the context of industry 4.0: A moderated mediation model. International Journal of Production Economics, 229. https://doi.org/10.1016/j.ijpe.2020.107777

Martin, C. (2022). Climate Change and Global Security: Framing an Existential Threat. AJIL Unbound, 116. https://doi.org/10.1017/aju.2022.39

Moyo, M., & Loock, M. (2021). Conceptualising a cloud business intelligence security evaluation framework for small and medium enterprises in small towns of the Limpopo Province, South Africa. Information (Switzerland), 12(3). https://doi.org/10.3390/info12030128

Nguyen, T. T., & Reddi, V. J. (2023). Deep Reinforcement Learning for Cyber Security. IEEE Transactions on Neural Networks and Learning Systems, 34(8). https://doi.org/10.1109/TNNLS.2021.3121870

Nimmy, K., Dilraj, M., Sankaran, S., & Achuthan, K. (2023). Leveraging power consumption for anomaly detection on IoT devices in smart homes. Journal of Ambient Intelligence and Humanized Computing, 14(10). https://doi.org/10.1007/s12652-022-04110-6

Paalo, S. A., Degraft Arthur, D., Dramani, A., & Adu-Gyamfi, S. (2024). Exploring hybrid security strategies in Ghana: State and private sector partnerships. African Security Review, 33(1). https://doi.org/10.1080/10246029.2023.2286225

Poornima, B. (2022). Cyber Threats and Nuclear Security in India. Journal of Asian Security and International Affairs, 9(2). https://doi.org/10.1177/23477970221099748

Prezelj, I., Injac, O., & Kolak, A. (2020). Democratisation of defence policies and systems in Slovenia and Montenegro: Developmental and comparative aspects. Politics in Central Europe, 16(3). https://doi.org/10.2478/pce-2020-0032

Qammar, A., Ding, J., & Ning, H. (2022). Federated learning attack surface: taxonomy, cyber defences, challenges, and future directions. Artificial Intelligence Review, 55(5). https://doi.org/10.1007/s10462-021-10098-w

Reza, Md. H. (2021). “Conservation of Environment by Military-A New Dimension of Ensuring Security in Bangladesh.” Scholars Journal of Arts, Humanities and Social Sciences, 9(6). https://doi.org/10.36347/sjahss.2021.v09i06.012

Sadhu, P. K., Yanambaka, V. P., Abdelgawad, A., & Yelamarthi, K. (2022). Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions. In Sensors (Vol. 22, Issue 15). https://doi.org/10.3390/s22155517

Sarker, I. H., Furhad, M. H., & Nowrozy, R. (2021). AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions. In SN Computer Science (Vol. 2, Issue 3). https://doi.org/10.1007/s42979-021-00557-0

Shandilya, S. K., Upadhyay, S., Kumar, A., & Nagar, A. K. (2022). AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis. Future Generation Computer Systems, 127. https://doi.org/10.1016/j.future.2021.09.018

Shaukat, K., Luo, S., Varadharajan, V., Hameed, I. A., & Xu, M. (2020). A Survey on Machine Learning Techniques for Cyber Security in the Last Decade. IEEE Access, 8. https://doi.org/10.1109/ACCESS.2020.3041951

The United States and Bahrain Sign Comprehensive Security Integration and Prosperity Agreement. (2024). American Journal of International Law, 118(1). https://doi.org/10.1017/ajil.2023.73

Triyana, H. J. (2022). Conscientious Objection Before the Indonesian Constitutional Court. Constitutional Review, 8(2). https://doi.org/10.31078/consrev825

Wieslander, A. (2022). “The Hultqvist doctrine”–Swedish security and defence policy after the Russian annexation of Crimea. Defence Studies, 22(1). https://doi.org/10.1080/14702436.2021.1955619

Wolfley, K. J. (2021). Military Statecraft and the Use of Multinational Exercises in World Politics. Foreign Policy Analysis, 17(2). https://doi.org/10.1093/fpa/oraa022

Zhang, H., Mi, Y., Fu, Y., Liu, X., Zhang, Y., Wang, J., & Tan, J. (2023). Security defense decision method based on potential differential game for complex networks. Computers and Security, 129. https://doi.org/10.1016/j.cose.2023.103187

Downloads

Published

2025-08-31

How to Cite

Fitria, R., & Supriyadi, A. A. (2025). Integration of cyber defense and conventional security in addressing non-military threats in the digital era. Journal of National Paradigm-Based Resilience Strategy, 2(02), 85–99. https://doi.org/10.61511/napbres.v2i02.2025.2106

Issue

Section

Articles

Citation Check