Vol. 11 No. 10 (2025): October
Open Access
Peer Reviewed

Defense Information Systems Architecture for Cyber Threats: A Systematic Review of the Research Literature

Authors

Martanto Dwi Saksomo Hadi , Rudy Agus Gemilang Gultom , Ansori , Bambang Kustiawan

DOI:

10.29303/jppipa.v11i10.12905

Published:

2025-10-25

Downloads

Abstract

Cyber ​​threats have become a serious challenge to national defense. Although Indonesia has a high cybersecurity index, a series of significant incidents against government institutions indicate urgent vulnerabilities that need to be addressed through a more resilient defense architecture. This study conducted a systematic literature review (SLR) to identify the results and practices of implementing the TOGAF, DoDAF, and COBIT (TDC) frameworks in the cyber defense domain. The results indicate that the literature is dominated by qualitative studies (53%) and COBIT framework implementations (73%), especially in government agencies (67%). The analysis yielded four main themes: improved governance and compliance, optimized risk management, strengthened security posture, and architectural and operational efficiency. The literature's focus on the first two themes signals a strategic shift from technical solutions to a governance- and risk-based approach. The study concludes that an effective approach to modern cyber defense is through integrating the specific strengths of each framework: COBIT for governance, DoDAF for operations, and TOGAF for architecture.

Keywords:

Cyber risk, Cyber security, Cyber threats, Security architecture, Security resilience

References

A’yuni, A. Q., Muhammad, A. H., & Nasiri, A. (2023). Literature Review Audit Tata Kelola Teknologi Informasi Menggunakan Kerangka Kerja COBIT 2019. Jurnal Informa : Jurnal Penelitian Dan Pengabdian Masyarakat, 9(1), 47–52. https://doi.org/10.46808/INFORMA.V9I1.247

Aghamohammadpour, A., Mahdipour, E., & Attarzadeh, I. (2023). Architecting threat hunting system based on the DODAF framework. Journal of Supercomputing, 79(4), 4215–4242. https://doi.org/10.1007/s11227-022-04808-6

Aji, M. P., & Artikel, R. (2023). Sistem Keamanan Siber dan Kedaulatan Data di Indonesia dalam Perspektif Ekonomi Politik (Studi Kasus Perlindungan Data Pribadi) [Cyber Security System and Data Sovereignty in Indonesia in Political Economic Perspective]. Jurnal Politica Dinamika Masalah Politik Dalam Negeri Dan Hubungan Internasional, 13(2), 222–238. https://doi.org/10.22212/JP.V13I2.3299

Al Baihaqy, A. H., Yuwana, M. A. S. A., Surya, A. P. A., & Fauzi, M. A. N. (2024). Analisa Dampak Kebocoran Data Pusat Data Nasional (PDN) 2024 dalam Perspektif HAM. Wicarana, 4(1), 31–37. https://doi.org/10.57123/WICARANA.V3I1.167

Ali, T., Al-Khalidi, M., & Al-Zaidi, R. (2024). Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review. Journal of Computer Information Systems, 00(00), 1–28. https://doi.org/10.1080/08874417.2024.2329985

Arimurti, N. A., Nurtrisha, W. A., & Falahah, F. (2024). Penilaian Kapabilitas Tata Kelola Teknologi Informasi Menggunakan Kerangka Kerja Cobit 2019 dengan Fokus Domain APO pada RSPAU Dr. Suhardi Hardjolukito. Jurnal Teknologi Dan Manajemen Informatika, 10(1), 13–23. https://doi.org/10.26905/JTMI.V10I1.10939

Ariyadi, T., & Rizky Pohan, M. (2023). Implementation of Penetration Testing Tools to Test Wi-Fi Security Levels at the Directorate of Innovation and Business Incubators. Jurnal Penelitian Pendidikan IPA, 9(12), 10768–10775. https://doi.org/10.29303/JPPIPA.V9I12.5551

Balafif, S. (2023). Penyesuaian Model Ketahanan Siber UMKM di Indonesia Dengan NIST Cybersecurity Framework. Jurnal Informatika: Jurnal Pengembangan IT, 8(3), 291–301. https://doi.org/10.30591/JPIT.V8I3.5662

Bardin, J. S. (2024). Cyber Warfare. In Computer and Information Security Handbook (4th ed., Vol. 2, pp. 1345–1380). Morgan Kaufmann. https://doi.org/10.1016/B978-0-443-13223-0.00087-4

Barkat Ullah, A., Ma, W., Ahmed, M., Rashid, B., Saeed, M. A., Arshad, O., & Raghav, U. (2024). A comprehensive review of cyber security and current practices in global mining critical infrastructure. Journal of Cyber Security Technology, 00(00), 1–27. https://doi.org/10.1080/23742917.2025.2475563

Bernika, H., & I Kadek, D. N. (2021). Perancangan Tata Kelola Teknologi Informasi Menggunakan Kerangka Kerja COBIT 2019 (Studi Kasus: LPP RRI Madiun). Journal of Emerging Information Systems and Business Intelligence, 2(3), 63–70. https://doi.org/10.26740/JEISBI.V2I3.41630

Bhatia, K., Pandey, S. K., & Singh, V. K. (2023). Enterprise Architecture Frameworks for Security Establishment. 2023 International Conference on Artificial Intelligence and Smart Communication, AISC 2023, 11–17. https://doi.org/10.1109/AISC56616.2023.10085439

Braun, V., & Clarke, V. (2023). Toward good practice in thematic analysis: Avoiding common problems and be(com)ing a knowing researcher. International Journal of Transgender Health, 24(1), 1–6. https://doi.org/10.1080/26895269.2022.2129597

Busch, N. R., & Zalewski, A. (2024). A Systematic Literature Review of Enterprise Architecture Evaluation Methods. ACM Computing Surveys, 57(5). https://doi.org/10.1145/3706582

Carolina, A., & Bandeira, R. (2023). Towards A Sectoral Enterprise Architecture Framework Seaf (Issue July). University of Coimbra.

Costa, J. C., Roxo, T., Proença, H., & Morais Inácio, P. R. (2024). How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses. IEEE Access, 12, 61113–61136. https://doi.org/10.1109/ACCESS.2024.3395118

de Oliveira, K. V., Fernandes, E. C., & Borsato, M. (2021). A TOGAF-based Framework for the Development of Sustainable Product-Service Systems. Procedia Manufacturing, 55(C), 274–281. https://doi.org/10.1016/J.PROMFG.2021.10.039

Dehesh, P. (2024). Scientific writing in a systematic review and Meta-Analyses. In Systematic Review and Meta-Analysis: Stepwise Approach for Medical and Biomedical Researchers (pp. 195–208). Academic Press. https://doi.org/10.1016/B978-0-443-13428-9.00017-3

Douzet, F., & Gery, A. (2021). Cyberspace is used, first and foremost, to wage wars: proliferation, security and stability in cyberspace. Journal of Cyber Policy, 6(1), 96–113. https://doi.org/10.1080/23738871.2021.1937253

Dwi Shandika, M. (2024). Peran Arsitektur Data dalam Meningkatkan Efektivitas Tata Kelola Data di Era Transformasi Digital. Jurnal Ilmiah Research Student, 2(2), 191–195. https://doi.org/10.61722/JIRS.V2I2.5441

Elysia, C., Dethan, T., Clairine, J., Lolong, N., Wandi, S. A., & Kusmana, T. P. (2024). Perencanaan Metode TOGAF dalam Digitalisasi Pasar Swayalan melalui Integrasi Enterprise Architecture. Jurnal Komputer, Informasi Dan Teknologi, 5(1), 15–15. https://doi.org/10.53697/JKOMITEK.V5I1.2573

Fadya, M., & Utama, D. N. (2024). Towards Secure Information Systems: Developing and Implementing an Information Security Evaluation Model Using NIST CSF and COBIT 2019. TEM Journal, 14(1), 182–191. https://doi.org/10.18421/TEM141-17

Farhaoui, Y., Allaoui, A. El, Amounas, F., Mohammed, F., Ziani, S., Taherdoost, H., Triantafyllou, S. A., & Bhushan, B. (2024). A Multi-layered Protection System for Enhancing Data Security in Cloud Computing Environments. Lecture Notes in Networks and Systems, 1353 LNNS, 559–568. https://doi.org/10.1007/978-3-031-88304-0_77

Fatin, A., Muhaimin Putri, F., Fadlilah, I. N., Hanim, A. L., Faradilla, R. G., Dwiyantie, D. O., Zahroh, A., & Safitri, M. (2024). Audit Sistem Informasi Menggunakan COBIT 5 Domain DSS001 dan DSS005 (Studi Kasus Perpustakaan Upn Veteran Jawa Timur). Jurnal Informatika Dan Teknik Elektro Terapan, 13(1), 2830–7062. https://doi.org/10.23960/JITET.V13I1.5886

Firnaldo, F., Sholihah, U., & Yunita, S. (2023). Perancangan Enterprise Architecture Pada PT. Trisatya Cipta Hutama Menggunakan TOGAF. JIPI (Jurnal Ilmiah Penelitian Dan Pembelajaran Informatika), 8(3), 959–970. https://doi.org/10.29100/JIPI.V8I3.3998

Garrett, R. K., Anderson, S., Baron, N. T., & Moreland, J. D. (2011). Managing the interstitials, a System of Systems framework suited for the Ballistic Missile Defense System. Systems Engineering, 14(1), 87–109. https://doi.org/10.1002/SYS.20173

Gaudêncio, B., Ferraz, J., Martins, P., Váz, P., Silva, J., Abbasi, M., & Cardoso, F. (2024). A Comparison of DoDAF, TOGAF, and FEAF: Architectural Frameworks for Effective Systems Design. International Conference on Disruptive Technologies, Tech Ethics and Artificial Intelligence, 363–371. https://doi.org/10.1007/978-3-031-66635-3_31

Ghalib, Y. W., Gilang, E. F., Zumi M, Abdhe F, Nanda A, Serly D A, & Zurkiyah A. (2024). Analisis Perkembangan Keamanan Siber Dampak Dari Kebocoran Data Pusat Data Nasional Sementara 2 Surabaya. JISCO : Journal of Information System and Computing, 2(1), 27–41. https://doi.org/10.30631/JISCO.V2I1.100

Ghozie Afiansyah, H., Annisa, N., & Febriyani, K. (2023). Penyusunan Kebijakan Pengamanan dan Pengelolaan Infrastruktur Operasi Keamanan Siber Menggunakan NIST CSF 2.0 dan ISO/IEC 27001:2022. Info Kripto, 17(3). https://doi.org/10.56706/IK.V17I3.81

Hadiati, S., & Pramuda, A. (2024). Concept Attaiment Model Based on Traditional Technology Organizers for Strengthening Global Science Literacy and Creative Character. Jurnal Penelitian Pendidikan IPA, 10(6), 2927–2934. https://doi.org/10.29303/JPPIPA.V10I6.7270

Hambali, H. (2021). Penerapan Domain Monitor and Evaluate Framework COBIT 4.1 Dalam Pelaksanaan Audit Sistem Informasi. Journal of Science and Social Research, 4(2), 205–211. https://doi.org/10.54314/JSSR.V4I2.608

Hidayat, R. S., Indrajit, R. E., & Dazki, E.. (2024). TOGAF’s Approach in Developing an Enterprise Architecture for the Information Technology Security Industry. Journal La Multiapp, 5(5), 630–645. https://doi.org/10.37899/journallamultiapp.v5i5.1524

Hilmi, M. A. Al, Puspaningrum, A., Darsih, Siahaan, D. O., Samosir, H. S., & Rahma, A. S. (2023). Research Trends, Detection Methods, Practices, and Challenges in Code Smell: SLR. IEEE Access, 11, 129536–129551. https://doi.org/10.1109/ACCESS.2023.3334258

Hutagalung, N. M., Sudianto, Y., Kusumawati, A., & Fajria, A. (2024). Designing an Information System Architecture for the East Java Community Eye Hospital Pharmacy using TOGAF ADM 9.2 Approach. Sistemasi, 14(1), 406–420. https://doi.org/10.32520/STMSI.V14I1.4932

International Telecommunication Union. (2024). Global Cybersecurity Index 2024 (5th Editio). International Telecommunication Union. Retrieved from https://www.itu.int/en/ITU-D/Cybersecurity/Documents/GCIv5/2401416_1b_Global-Cybersecurity-Index-E.pdf

Isdiyanto, B. R. (2024). Analisis Sistem Pertahanan Udara Indonesia dalam Menghadapi Ancaman Keamanan Indo Pasifik Tahun 2022 – 2024. Diplomacy and Global Security Journal : Jurnal Mahasiswa Magister Hubungan Internasional, 2(2), 1065–1071. https://doi.org/10.36859/DGSJ.V2I2.4576

Jardim, R., dos Santos, M., Neto, E., Muradas, F. M., Santiago, B., & Moreira, M. (2022). Design of a framework of military defense system for governance of geoinformation. Procedia Computer Science, 199, 174–181. https://doi.org/10.1016/J.PROCS.2022.01.022

Juliana, J., Alamsyah, A., & Halim, S. (2024). Analysis of Electronic Medical Records Data Security: Case Study in Citra Husada Sigli Hospital. Jurnal Penelitian Pendidikan IPA, 11(6), 773–782. https://doi.org/10.29303/JPPIPA.V11I6.11081

Julianto, A. S., Hikmah, I. R., & Yasa, R. N. (2024). Cyber-Risk Management Menggunakan NIST Cyber Security Framework (CSF) dan Cobit 2019 pada Instansi XYZ. Info Kripto, 18(2), 41–47. https://doi.org/10.56706/IK.V18I2.99

Juma, A. H., Arman, A. A., & Hidayat, F. (2023). Cybersecurity Assessment Framework: A Systematic Review. 10th International Conference on ICT for Smart Society, ICISS 2023 - Proceeding. https://doi.org/10.1109/ICISS59129.2023.10291832

Kartika, A. D., & Yolanda, D. (2024). Pengembangan Arsitektur Bisnis Berbasis TOGAF untuk Penjaminan Mutu Proses Pembelajaran di Perguruan Tinggi (Studi Kasus Fakultas Teknologi Informasi, Universitas Andalas). Didaktika: Jurnal Kependidikan, 14(2), 2131–2148. https://doi.org/10.58230/27454312.1970

Katsantonis, M. N., Manikas, A., Mavridis, I., & Gritzalis, D. (2023). Cyber range design framework for cyber security education and training. International Journal of Information Security, 22(4), 1005–1027. https://doi.org/10.1007/S10207-023-00680-4/TABLES/1

Khusumawati, T. (2024). Pendekatan Geopolitik Terhadap Kekuatan Strategis Keamanan Nasional Indonesia dalam Menyikapi Rivalitas AS–China di Asia Tenggara: Penelitian. Jurnal Pengabdian Masyarakat Dan Riset Pendidikan, 4(1), 3357–3362. https://doi.org/10.31004/JERKIN.V4I1.2130

Konnon, M. A., Lodonou, N., Gaffan, R. H., & Ezin, E. (2023). An Extended Layered Information Security Architecture (ELISA) for e-Government in Developing Countries. International Journal of Engineering Trends and Technology, 71(1), 109–123. https://doi.org/10.14445/22315381/IJETT-V71I1P210

Kshetri, N. (2005). Information and communications technologies, strategic asymmetry and national security. Journal of International Management, 11(4), 563–580. https://doi.org/10.1016/J.INTMAN.2005.09.010

Kusnadi, S. A. (2021). Perlindungan Hukum Data Pribadi Sebagai Hak Privasi. AL WASATH Jurnal Ilmu Hukum, 2(1), 9–16. https://doi.org/10.47776/ALWASATH.V2I1.127

Lee, J. Y., Syn, S. Y., & Kim, S. (2024). Global research trends in research data management: A bibliometrics approach. Journal of Librarianship and Information Science, 57(3), 719–732. https://doi.org/10.1177/09610006241239083;page:string:article/chapter

Lestari, M., Puspita, M. E., Wijaya, A. F., & Vicky. (2024). Model Tata Kelola TI Terintegrasi untuk Keamanan Informasi di Sektor Fintech. Jurnal Teknologi Dan Manajemen Industri Terapan, 4(3), 766–776. https://doi.org/10.55826/JTMIT.V4I3.943

Li, W., Wang, Y., Jia, L., Peng, S., & He, R. (2024). Battlefield target intelligence system architecture modeling and system optimization. Journal of Systems Engineering and Electronics, 35(5), 1190–1210. https://doi.org/10.23919/JSEE.2024.000114

Liebetrau, T. (2022). Cyber conflict short of war: a European strategic vacuum. European Security, 31(4), 497–516. https://doi.org/10.1080/09662839.2022.2031991

Lubis, M., Safitra, M. F., Fakhrurroja, H., & Muttaqin, A. N. (2024). Guarding Our Vital Systems: A Metric for Critical Infrastructure Cyber Resilience. Sensors, 25(15), 4545. https://doi.org/10.3390/s25154545

Marvin Immanuel, J., Rahmadewi, R., & Saragih, Y. (2024). IoT-based Facelook and Fingerprint Safe Security System. Jurnal Penelitian Pendidikan IPA, 10(2), 500–505. https://doi.org/10.29303/JPPIPA.V10I2.6832

McIntosh, T. R., Susnjak, T., Liu, T., Watters, P., Xu, D., Liu, D., Nowrozy, R., & Halgamuge, M. N. (2024). From COBIT to ISO 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models. Computers and Security, 144(June), 103964. https://doi.org/10.1016/j.cose.2024.103964

Mulyana, R. B., Riyadi, A. R., & Dhaipullah, D. (2024). Enterprise Architecture Dalam Transformasi Digital Perbankan: Studi Literatur Sistematis Menggunakan Kerangka Kerja TOGAF ADM. Jurnal Ilmu Komputer (JILKOMP), 1(1), 1–12. Retrieved from https://jurnal.or.id/index.php/jilkomp/article/view/1

Mustopo, A., Ramsi, O., & Gultom, R. A. G. (2024). Air Defense Transformation: Strategy in the Context of Multi-Domain Operations. Formosa Journal of Applied Sciences, 4(7), 2081–2092. https://doi.org/10.55927/FJAS.V4I7.237

Nasiri, A. (2023). Evaluasi Tingkat Kapabilitas Keamanan Sistem Informasi Menggunakan Kerangka Kerja Cobit 2019. Jurnal Tata Kelola Dan Kerangka Kerja Teknologi Informasi, 9(1), 34–41. https://doi.org/10.34010/JTK3TI.V9I1.9672

Nezameslami, R., Nezameslami, A., Mehdikhani, B., Mosavi-Jarrahi, A., Shahbazi, A., Rahmani, A., Masoudi, A., Yeganegi, M., Akhondzardaini, R., Bahrami, M., Aghili, K., & Neamatzadeh, H. (2024). Adapting PRISMA Guidelines to Enhance Reporting Quality in Genetic Association Studies: A Framework Proposal. Asian Pacific Journal of Cancer Prevention, 26(5), 1641–1651. https://doi.org/10.31557/APJCP.2025.26.5.1641

Noor, A. Z. M., Gernowo, R., & Nurhayati, O. D. (2023). Data Augmentation for Hoax Detection through the Method of Convolutional Neural Network in Indonesian News. Jurnal Penelitian Pendidikan IPA, 9(7), 5078–5084. https://doi.org/10.29303/JPPIPA.V9I7.4214

Nugraha, F., & Hendrik, B. (2024). Perbandingan Framework COBIT2019 dan TOGAF dalam Manajemen Keamanan Informasi. Journal of Education Research, 6(2), 462–467. https://doi.org/10.37985/JER.V6I2.2156

Pandey, D. K., & Kumar, R. (2023). Russia-Ukraine War and the global tourism sector: A 13-day tale. Current Issues in Tourism, 26(5), 692–700. https://doi.org/10.1080/13683500.2022.2081789

Parums, D. V. (2021). Editorial: Review Articles, Systematic Reviews, Meta-Analysis, and the Updated Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 Guidelines. Medical Science Monitor : International Medical Journal of Experimental and Clinical Research, 27, e934475--1. https://doi.org/10.12659/MSM.934475

Pemerintah Republik Indonesia. (2002). Undang-undang (UU) Nomor 3 Tahun 2002 tentang Pertahanan Negara. Pemerintah Republik Indonesia. Retrieved from https://peraturan.bpk.go.id/Details/44421/uu-no-3-tahun-2002

Perwej, Y., Syed, P., Abbas, Q., Dixit, J. P., Nikhat Akhtar, D., & Jaiswal, A. K. (2021). A Systematic Literature Review on the Cyber Security. International Journal of Scientific Research and Management, 9(12), 669–710. https://doi.org/10.18535/IJSRM/V9I12.EC04

Proudfoot, J. G., Cram, W. A., & Madnick, S. (2024). Weathering the storm: examining how organisations navigate the sea of cybersecurity regulations. European Journal of Information Systems, 34(3), 436–459. https://doi.org/10.1080/0960085X.2024.2345867

Putra, D., Mutiara, D., Nugraheni, K., & Suseno, J. E. (2024). Information Technology Risk-based Enterprise Architecture Design for Training Systems: Integration of COBIT 2019 and TOGAF ADM. JST (Jurnal Sains Dan Teknologi), 14(1), 35–46. https://doi.org/10.23887/JSTUNDIKSHA.V14I1.93498

Putra, K. R., & Anggreani, F. (2022). Perancangan Arsitektur Enterprise Pada Instansi Pemerintahan: Systematic Literature Review. Computing and Education Technology Journal, 2(0), 10–25. https://doi.org/10.20527/CETJ.V2I0.5293

Ramadhanty, N. (2024). Implementasi Kerangka Keamanan NIST Dan ISO/IEC 27001 Dalam Menghadapi Ancaman Risiko Siber. Journal of Indonesian Management, 4(4). https://doi.org/10.53697/JIM.V4I4.1973

Russo, N., Reis, L., Silveira, C., & Mamede, H. S. (2024). Towards a Comprehensive Framework for the Multidisciplinary Evaluation of Organizational Maturity on Business Continuity Program Management: A Systematic Literature Review. Information Security Journal, 33(1), 54–72. https://doi.org/10.1080/19393555.2023.2195577

Safarudin, M. S. (2021). Analisis dan Desain Sistem Informasi Sumber Daya Manusia pada PT.DEF Metode TOGAF ADM (The Open Group Architecture Process Architecture Development Method). Zona Teknik: Jurnal Ilmiah, 15(2), 16–26. https://doi.org/10.37776/ZT.V15I2.813

Safitra, M. F., Lubis, M., & Fakhrurroja, H. (2023). Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity. Sustainability 2023, Vol. 15, Page 13369, 15(18), 13369. https://doi.org/10.3390/SU151813369

Septipalan, M. L., Widiartha, I. B. K., Zubaidi, A., & Taufik, M. (2024). Integrated Notification System for Smart Parking Security Using Bot Telegram. Jurnal Penelitian Pendidikan IPA, 10(5), 2679–2686. https://doi.org/10.29303/jppipa.v10i5.7447

Seyboth, C., & Beckmann, H. (2024). Erstellung von Enterprise Architectures mit COBIT, TOGAF und ArchiMate. Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft Fur Informatik (GI), 352, 1639–1648. https://doi.org/10.18420/inf2024_142

Siregar, A. A., Simanungkalit, E., & Nasrudin. (2024). Telegram-Based Earthquake Early Warning. Jurnal Penelitian Pendidikan IPA, 11(5), 85–94. https://doi.org/10.29303/jppipa.v11i5.11080

Siroli, G. P. (2018). Considerations on the Cyber Domain as the New Worldwide Battlefield. The International Spectator, 53(2), 111–123. https://doi.org/10.1080/03932729.2018.1453583

Steingartner, W., Galinec, D., Kozina, A., Su, C., Cha, S.-C., & Tu, F. (2021). Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model. Symmetry 2021, Vol. 13, Page 597, 13(4), 597. https://doi.org/10.3390/SYM13040597

Stephanie, Darianty, R., Ayumi, & Fayola, A. (2024). Tinjauan Literatur terhadap Persiapan dan Tantangan Implementasi Enterprise Architecture di Pemerintahan. JDMIS: Journal of Data Mining and Information Systems, 2(2), 97–104. https://doi.org/10.54259/JDMIS.V2I2.2958

Tristantie, N., & Dwi Nitami, D. (2024). Critical Thinking Implied to Fashion Research Competencies. Jurnal Penelitian Pendidikan IPA, 11(2), 685–690. https://doi.org/10.29303/JPPIPA.V11I2.10185

Vernandy, F., & Herdi, T. (2023). Enterprise Architecture untuk Travel Haji dan Umroh Berdasarkan The Open Group Architectur Framework. Jutisi : Jurnal Ilmiah Teknik Informatika Dan Sistem Informasi, 12(3), 922–933. https://doi.org/10.35889/JUTISI.V12I3.1337

Vors, O., & Bourcier, L. A. (2022). Synthesis and literature review of different mixed methods designs in pedagogical research in physical education. Physical Education and Sport Pedagogy, 27(2), 117–129. https://doi.org/10.1080/17408989.2021.1999920

Wang, S., Li, J., Zhao, J., & Yang, J. (2024). Research on Architecture Design and Description Methods Based on DoDAF. Lecture Notes in Electrical Engineering, 1187 LNEE, 366–372. https://doi.org/10.1007/978-981-97-2120-7_45

Wibisono, I. (2023). The Algorithm of Digital Branding of Presidential Candidacy on Instagram: Duty of Computer Technology. Jurnal Penelitian Pendidikan IPA, 9(SpecialIssue), 379–384. https://doi.org/10.29303/jppipa.v9ispecialissue.6270

Willett, M. (2023). The Cyber Dimension of the Russia-Ukraine War. In Survival: October - November 2022 (1st Editio, pp. 7–26). Routledge. https://doi.org/10.4324/9781003422211-1

Yasmin, T. S., & Yulianto, T. (2024). Enhancing Email Security Against Phishing Attacks Through User Behavior Analysis and Data Loss Prevention (DLP). Jurnal Penelitian Pendidikan IPA, 11(4), 590–600. https://doi.org/10.29303/JPPIPA.V11I4.10781

Yolanda, S., Hendra, H., Hita, H., & Ginting, T. W. (2023). Analisis Tata Kelola Teknologi Informasi Menggunakan Kerangka Kerja COBIT 2019 Domain BAI03 (Studi Kasus: PT. Berlian Tangguh Sejahtera). Jurnal Sifo Mikroskil, 24(2), 173–186. https://doi.org/10.55601/JSM.V24I2.1035

Younas, A., Inayat, S., & Sundus, A. (2021). Joint displays for qualitative-quantitative synthesis in mixed methods reviews. Research Methods in Medicine & Health Sciences, 2(3), 91–101. https://doi.org/10.1177/2632084320984374

Author Biographies

Martanto Dwi Saksomo Hadi, Defense University of the Republic of Indonesia

Rudy Agus Gemilang Gultom, University of the Republic of Indonesia

Ansori, Defense University of the Republic of Indonesia

Bambang Kustiawan, Defense University of the Republic of Indonesia

Downloads

Download data is not yet available.

How to Cite

Hadi, M. D. S., Gultom, R. A. G., Ansori, & Kustiawan, B. (2025). Defense Information Systems Architecture for Cyber Threats: A Systematic Review of the Research Literature. Jurnal Penelitian Pendidikan IPA, 11(10), 10–22. https://doi.org/10.29303/jppipa.v11i10.12905