Internet of Things Cyber Security in Digital Era

This study aims to determine cybersecurity security in terms of data transfer in the digital era. This study used a descriptive qualitative approach, namely a literature study. The results of this study are to show that using the internet remains safe and avoids dangerous things. With the positive influence of digital technology on cybersecurity, it can be concluded that cybersecurity is to maintain security from technological crimes. This research is expected to serve as a warning to the public to be careful in using the internet.


Introduction
Cybersecurity is important because it can protect corporate and personal data. All companies with digital-based data are highly recommended to pay attention to and use cybersecurity when storing, accessing, and retrieving important information. Studying technology security demonstrates the need for new conceptual and analytical resources and cybersecurity research aimed at the technical and social intersection [1]. Technology security nowadays is not just a technical issue. Lithuanian Cybersecurity Law defines cybersecurity as a tool for legal action. The dissemination of technical and organizational information needs to be taken to detect, analyze, prevent, and respond to a problem in technology. It is described as an activity or event that may cause unauthorized access to the system communication and information, electronic communication networks. It is also described as control systems for electronic communication network processes or industrial processes that control operations to destroy, delete, destroy, or modify electronic information and restrict access to electronic information. It also modifies electronic information, restricts, or withdraws access to electronic information. Moreover, it is possible to use non-public information in electronic format by an unauthorized person. The main objective is to provide fast recovery from electronic communication networks, information systems, or industrial process control systems in the event of a cyber-problem or cyber-attack [2].
Identity theft allows data theft to occur, but it is a potentially more serious nuisance. Thus, victims due to data theft are being forced to change a new password. The more important data that can be stolen, the more difficult it is to prove its identity. It will also take time to recreate the documentation [3]. Security and protection in cyberspace must be improved regarding critical information infrastructure, which is very important for every country's safety and economic welfare. Security of internet users has become an essential aspect of developing new technologies and public policies. Cybercrime must be eradicated safely. Since using technical measures alone cannot prevent crime, effective investigation and prosecution of cybercrime by a law enforcement agency is essential. Many countries and governments are currently enforcing strict cyber securities laws to avoid the loss of IOP Publishing doi:10.1088/1757-899X/1158/1/012017 2 important information. People must be trained in cybersecurity to be free from crimes from cyberspace [4].
Cybersecurity is protection connected to the internet, including hardware, software, and data from cyber-attacks. The Arizona Cyber Talent Organization states that cybersecurity is the protection of IT systems [5]. Maintaining cybersecurity is to be able to test and provide developing implementations and implement strategies and report every incident so that it can be prepared to act and track the status of network security. Security techniques in technology must solve problems that endanger technology to overcome cybersecurity [6]. The definition of security is a process to protect physical objects against damage, loss, or unauthorized access to maintain the confidentiality and integrity of information about things and to make object information available regardless of time [7].
Security technology implementation is an option and attempts to protect information assets from network attacks or threats or information systems. Currently, technologies present many securities as a security protection for attacks or threats to information networks. Nowadays, many security technologies present as a security protection for attacks or threats to information networks or systems, including cryptographic systems, IDS, SSL, firewalls, IPSec, antivirus systems, authentication, and others [8]. There is no longer any way to place cyber, and it cannot be treated separately from realworld security. If we look to the reality that society's progressive information is taking place, the number of devices connected to the internet also increases.
It is realistic to expect the emergence of new scenarios that violate individual, corporate, national, and global security. The most fundamental problem is that cyberculture is developed faster than cybersecurity, which further implies that cyberspace is integrally at a specific risk [9]. In Indonesia, cyber can still increase. In addition, the number of internet users in Indonesia is still not evenly distributed because there are still many who cannot use internet devices properly, so that cyber law in Indonesia cannot be implemented. Therefore, Indonesia establishes strategic steps to determine cybersecurity and policy based on the National Security for Homeland Security consistency, the US guideline in overcoming various cyber threats to existing infrastructure, and recovering damage caused by cyber-attacks.
Threats and security attacks on social media have been discussed in the previous research. Moreover, based on that research, we must continually protect and secure our data as social media users. In this research, we aim at providing education to be more careful in using technology in the digital era.

Method
This research used a descriptive qualitative method, namely the literature study approach. Later, we will see some of the previous research will be used as a reference regarding cybersecurity in the Digital Age, where crimes on the internet are increasingly facilitated, and security in the world of technology is increasingly being threatened. Therefore, cybersecurity must become the center of technological attention in the current era then look for valid and accurate data regarding cybersecurity.
With proper and precise data, hopefully, this research is developing according to the need and can be used as learning material about cybersecurity .

Results
Crime in IoT can occur through anything with various devices. Moreover, every crime can occur. Table 1 shows the crimes on IoT. From the crimes in the IoT based on Table 1, there are several ways to carry out the required security action on the system to minimize crimes in the IoT. Table 2 shows a list of security requirements that are needed for the system in general.

Resilience to attacks
To avoid a single point of failure, the system must adapt itself to the failure node 2.
Data authentication Data and objects that have been retrieved must be authenticated 3.
Access control From the data provided, the information provided should be able to implement access controls 4. Client privacy The system can maintain the privacy of the information provider or client data to provide security and convenience for customers 5.
User identification Before using users to use the system, they must perform a validation process 6.
Secure storage Data that has been stored on the system must be kept confidential and ensure the integrity of sensitive information 7.
Identity management Link user rights and user restrictions to the system to identify individuals/things in the design and control their access to the system 8.
Secure data communication Ensure the confidentiality and integrity of data communicated by authenticating peer-to-peer communications and preventing rejection of communication transactions, and protecting the identity of communicating entities 9.
Availability Denial of access or use of user authorization from unauthorized persons or systems 10.

Secure network access
Only authorized devices can provide a network connection or service access 11.
Secure content Protect the rights of digital content used in the system with Digital Rights Management (DRM) 12.
Secure execution environment To protect against malicious applications, it is necessary to implement a secure, managed-code, runtime environment designed 13.
Tamper resistance When the device falls into the hands of malicious parties, then maintain security requirements and check logically

Discussion
If there has been a crime in the IoT, a forensic investigation must be carried out. The forensic analysis uses science and technology to investigate and establish a criminal or civil court [11]. Forensic investigations aim to carry out experiments to find facts and create the truth of an incident. The greatest challenge for computer forensics is developing methods and providing validation of the techniques, which can be used to produce tangible and reliable evidence to protect against  [12]. IoT poses challenges to forensic researchers. These challenges are when the crime of spreading data has widened, the lines between networks are blurred, and the privacy of users with personal networks is increasingly fading. Then, it becomes non-private, and private networks become public networks. There are differences when doing traditional and IoT digital forensic investigations. Table 3 shows a traditional digital forensic investigation. Then, the IoT digital forensic investigation is shown in Table 4. With the challenges in carrying out digital forensic investigations on IoT, data security on IoT is much needed; it meets the system's general security requirements that users will use. It meets the general conditions of security on the design and can also guarantee user data confidentiality.

Conclusion
Technological development can make it easier for people to get information quickly. The threats and attacks on technology nowadays are being the most worrying things. In this digital era, it is necessary for us to always be careful in protecting all data because many crimes are committed in any way. Along with the development of technology, the threats will also get heavier. Therefore, there is a need for security to safeguard data.