Borneo International Journal eISSN 2636-9826 <p class="font_7" style="font-size: 16px; text-align: justify;"><span style="font-size: 16px;">Borneo International&nbsp;Journal ISSN 2636-9826 (online) is a single blind peer-reviewed, Open Access&nbsp;journal that publishes&nbsp;original research and&nbsp;reviews covering a wide range of subjects in Islamic studies, Arabic language, science, technology, business, management, social science, architecture and medicine.&nbsp;</span><span style="font-size: 16px;">It also publishes&nbsp;special issues of selected conference papers.</span></p> <p class="font_7" style="font-size: 16px; text-align: justify;">&nbsp;</p> Majmuah Enterprise en-US Borneo International Journal eISSN 2636-9826 2636-9826 A Preliminary Analysis of Bluetooth and Wi-Fi Security in Residential IoT Ecosystems <p>In the context of residential IoT ecosystems, the paper explores the security landscape of popular communication protocols, including Bluetooth and Wi-Fi. The research attempts to uncover possible hazards, weaknesses, and concerns related to the adoption of IoT devices in home settings that use various communication protocols through a methodical process. Authentication methods, encryption techniques, and the general strength of security features in widely used smart devices are important areas of study. The results of the investigation highlight how urgently enhanced security measures are needed in the quickly developing field of residential Internet of Things (IoT) systems. Expanding on knowledge from earlier studies on IoT vulnerabilities, protecting consumer environments demands a comprehensive approach. Prospects could assist with creating a smart home environment that is safer and more reliable by implementing the recommendations made by the researchers into the implementation and use of IoT devices in the residential area. Protecting the interconnected structure of residential IoT ecosystems requires proactive measures and properly educated decision-making, as the field of Internet of Things (IoT) security continues to grow.</p> Azran Abdul Razak Mohamad Fadli Zolkipli ##submission.copyrightStatement## 2024-06-04 2024-06-04 7 2 1 11 Security Challenges in SCADA Systems <p class="Text" style="line-height: 115%;"><span lang="EN-US">This paper examines the cybersecurity weaknesses in Supervisory Control and Data Acquisition (SCADA) systems, which play a crucial role in the infrastructure of many industrial sectors. By employing a comprehensive penetration testing framework, the study uncovers significant vulnerabilities like protocol deficiencies, difficulties in integrating with IT networks, and security flaws related to human factors. The article assesses the efficacy of existing security measures and identifies the specific areas that require enhancement. This resource provides a thorough examination of the possible cyber threats that SCADA systems may encounter and evaluates their ability to withstand these threats. Suggestions for strengthening system security involve implementing focused vulnerability patching, enhancing security knowledge among staff, and developing strong defence methods. This work enhances the field of cybersecurity by offering a systematic method for recognising, evaluating, and reducing the dangers linked to SCADA systems. As a result, it aids in protecting vital infrastructure against sophisticated cyber assaults.</span></p> Helmy Hanyff Hairudin Ruzaili Mohamad Fadli Zolkipli ##submission.copyrightStatement## 2024-06-04 2024-06-04 7 2 12 26 Study on Machine Learning Implementation in Cybersecurity for Security Defend and Attack <p>This comprehensive study explores the utilization of Machine Learning (ML) in the field of cybersecurity, emphasizing its substantial contribution to both defensive and offensive strategies. In contrast to conventional rule-based methodologies, machine learning systems can dynamically adjust to changing threats by acquiring patterns and anomalies from vast datasets. This study investigates the defensive utilization of machine learning (ML) in threat detection, anomaly identification, and security breach prediction. Additionally, it examines the offensive applications of ML, wherein attackers exploit vulnerabilities by applying advanced ML techniques. The study additionally examines the pragmatic implementations of machine learning (ML) in cybersecurity, specifically emphasizing a range of tools such as DeepExploit, Scikit-learn, Metasploit, Nmap, and antivirus software. An assessment is conducted to evaluate the defensive capabilities of Intrusion Detection Systems, firewalls, Security Information and Event Management systems, and email security solutions that utilize Machine Learning. Machine learning in these domains signifies a pivotal advancement in cybersecurity tactics, empowering firms to address cyber risks better.</p> Azran Abdul Razak Helmy Hanyff Hairudin Ruzaili Mohamad Fadli Zolkipli ##submission.copyrightStatement## 2024-06-04 2024-06-04 7 2 27 40 The Leadership Role of Creative Guilds and Trade Union To Sustain the Malaysia's Creative Industry <p>The existence of the <em>Dasar Industri Kreatif Negara</em> (DIKN) in 2009, with the mission to govern the creative and cultural industry systematically, would change the landscape of the practice and way forward of the creative practitioners, with little production of content in the creative industry, but with so many establishments of creative guilds that are acknowledged by the National Film Development Corporation Malaysia (FINAS) and not to mention the establishments of Trade Unions by the Department of Human resource. This has perplexed the creative industry players by the distinctive functions and features of a guild and union, for they know both parties were established to protect them. This study’s objective is to understand the effects of leadership roles in trade unions and creative guilds that hold the potential to elevate the creative industry's well-being. This study will qualitatively interview two (2) leaders of <em>Kesatuan Sekerja Kakitangan Sistem Televisyen Malaysia Berhad</em> (STMB) and <em>Akademi </em>PROFIMA. The impact of this study is expected to provide in-depth literacy of the leadership roles of trade unions and creative guilds that would provide service and protection to the creative industry players.&nbsp;</p> <p><br> </p> Siti Fariza Mohamad Isa Megat Al-Imran Yasin ##submission.copyrightStatement## 2024-06-04 2024-06-04 7 2 41 56 The Heritage and Innovation of Contemporary Jun Porcelain Glaze: Integration of Craftsmanship, Materials, and Aesthetics. <p>Jun porcelain, originating in the Tang Dynasty and thriving during the Song Dynasty, is renowned for its unique kiln-firing techniques and glaze colors. This article commences by discussing the inheritance of contemporary Jun porcelain colored glaze craftsmanship. It outlines the characteristics and applications of the raw materials utilized in Jun porcelain colored glaze. Furthermore, it summarizes the aesthetic development, transformation, and innovative practices of contemporary Jun porcelain colored glaze. The discussion delves into the integration of new materials and technologies by modern artisans, while emphasizing the preservation of the essence of this traditional art form. Additionally, the article offers suggestions for the comprehensive development of Jun porcelain colored glaze.</p> Huasheng Lai Siti Suhaily,S Qifu Bao Weibin Deng ##submission.copyrightStatement## 2024-06-06 2024-06-06 7 2 57 68 Incident Response Planning and Procedures <p>This findings examines the implementation of incident response planning and procedures in internet security, focusing on their effectiveness in tone down cyber threats. The research investigates the role of practice directions in guiding incident response processes, from threat detection to recovery. Data were collected from primary sources including industry standards, incident reports and secondary sources such as scholarly articles and books. The findings indicate that practice directions serve as essential guidelines for incident response teams, aiding in the efficient handling of security incidents. However, further analysis reveals areas where improvements are needed to address emerging challenges, particularly in legal and administrative domains. This study highlights the importance of continuously refining incident response strategies to sustain organizational resistance against evolving cyber threats</p> Nur Aqilah Zaffan Farok Mohamad Fadli Zolkipli ##submission.copyrightStatement## 2024-06-25 2024-06-25 7 2 69 76 The Role of Risk Management in Cybersecurity Protocols <p>In today's rapidly evolving digital landscape, cybersecurity risk assessment and management are fundamental to safeguarding organizations against an array of increasingly sophisticated cyber threats. These processes play critical roles in fortifying cybersecurity measures, ensuring operational continuity, and maintaining trust in digital environments, which are essential for the smooth functioning of modern businesses and institutions. Cybersecurity risk assessment involves a systematic process of identifying, analysing, and evaluating potential threats and vulnerabilities that could compromise an organization's digital assets and data integrity. This comprehensive process includes activities such as threat modelling, vulnerability assessments, risk scoring, and the prioritization of mitigation efforts. By conducting thorough assessments, organizations gain valuable insights into their risk landscape, enabling them to prioritize security measures based on the severity and likelihood of potential threats, efficiently allocate resources, and implement targeted security controls that address the most critical risks first. Consequently, cybersecurity risk assessment and management are indispensable pillars of a holistic cybersecurity strategy. Integrating these processes into organizational practices bolsters cyber defences, protects sensitive data, and effectively mitigates evolving cyber threats. This proactive approach enhances an organization’s security posture and builds trust with customers, partners, and stakeholders by demonstrating a commitment to robust cybersecurity practices. Future research may explore emerging risk assessment methodologies leveraging advanced technologies such as artificial intelligence (AI) and machine learning (ML) to predict and counter cyber threats more effectively, as well as innovative risk management techniques incorporating real-time threat intelligence and automated response mechanisms. Additionally, understanding the dynamic relationship between regulatory compliance and cybersecurity resilience can help organizations navigate the complex regulatory landscape while maintaining a strong security posture. Continuous advancements in these areas are essential for staying ahead of cyber threats and maintaining a resilient cybersecurity posture in an increasingly digital and interconnected world.</p> <p><strong>Keywords:</strong> cybersecurity risk assessment, cyber strategy, cybersecurity resilience, cyber posture, threat modelling</p> Muhammad Lokman bin Sabidi Mohammad Fadli bin Zolkipli ##submission.copyrightStatement## 2024-07-09 2024-07-09 7 2 77 81