Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 8193 dokumen yang sesuai dengan query
cover
Yosua Praditya Suratman
"The increasing number of cyber attacks that occur today indicates that Indonesia is an easy target for crime actors in the cyber world. Cyber attacks are selected because they are far more effective than conventional attacks - the military, and the actors are also invisible. Not to mention, the capacity of cyber handling, both infrastructure, funds, and human resources in Indonesia is inversely proportional compared to the number of cyber attacks in the last decade. Intelligence strategies, primarily counter-intelligence, isthe answer to deter and detect the attacks,while the government fixing the regulations and policies of national cyber threats."
Bogor: Universitas Pertahanan Indonesia, 2017
345 JPUPI 7:2 (2017)
Artikel Jurnal  Universitas Indonesia Library
cover
Damar Apri Sudarmadi
"Penelitian ini membahas Strategi Badan Siber dan Sandi Negara BSSN Dalam Menghadapi Ancaman Siber di Indonesia. Suatu negara dituntut untuk dapat menguasai TIK secara baik dan benar serta tepat guna, karena dunia siber dapat menjadi potensi ancaman serta penyelenggaraan keamanan siber yang belum terintegrasi dapat berdampak terhadap kedaulatan negara dan ketahanan nasional. BSSN bertugas melaksanakan keamanan siber secara efektif dan efisien dengan mengonsolidasikan semua unsur yang terkait dengan keamanan siber. Penelitian ini termasuk dalam jenis penelitian desktriptif dengan menggunakan pendekatan kualitatif serta metode pengumpulan data melalui observasi, studi kepustakaan, wawancara dan dokumentasi.
Penelitian ini bertujuan untuk: 1 Menganalisis kondisi penyelenggaraan keamanan siber di Indonesia; 2 Menganalisis kesenjangan kondisi penyelenggaraan keamanan siber di Indonesia, 3 Menganalisis strategi BSSN guna meningkatkan komitmen bidang keamanan siber dalam menghadapi ancaman siber di Indonesia. Teori yang digunakan adalah teori organisasi, teori strategi, ancaman siber, keamanan siber, Global Cybersecurity Index 2017, serta analisis kesenjangan.
Hasil dari penelitian ini adalah 1 Analisis penyelenggaraan keamanan siber di Indonesia; 2 Analisis kesenjangan kondisi penyelenggaraan keamanan siber di Indonesia; 3 Analisis strategi BSSN guna meningkatkan komitmen bidang keamanan siber dalam menghadapi ancaman siber di Indonesia.

This research discusses the Strategy of National Cyber and Crypto Agency in Facing Cyber Threats in Indonesia. A country is required to be able to master ICT properly and correctly and appropriately, because the cyber world can be a potential threat and the implementation of cyber security that has not been integrated can affect the sovereignty of the state and national resilience. National Cyber and Crypto Agency is in charge of implementing cyber security effectively and efficiently by consolidating all elements related to cybersecurity. This research is included in this type of descriptive research using qualitative approach and data collection method through observation, literature study, interview and documentation.
This study aims to 1 Analyze the conditions of cyber security in Indonesia 2 Analyzing the gap in the state of cyber security in Indonesia, 3 Analyzing National Cyber and Crypto Agency strategy to increase cyber security commitment in facing cyber threat in Indonesia. Theories used are organizational theory, strategy theory, cyber threat, cyber security, Global Cybersecurity Index 2017, and gap analysis.
The results of this study are 1 Analysis of the implementation of cyber security in Indonesia 2 an analysis of the gap in cyber security conditions in Indonesia 3 National Cyber And Crypto Agency strategy analysis to increase cyber security commitment in facing cyber threat in Indonesia.
"
Jakarta: Sekolah Kajian Stratejik dan Global Universitas Indonesia, 2018
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Mochammad Chabibi Syafi’uddin
"Penelitian ini mengkaji fenomena radikalisme di indonesia dan upaya Banser menangkalnya dalam perspektif intelijen. Sejatinya, fenomena radikalisme bukanlah hal yang baru terjadi. Radikalisme atau yang di sebut juga intoleransi ini terjadi di hampir seluruh wilayah. Kemunculan radikalisme ini tidak hanya sekedar mencari eksistensi dengan memgadakan perkumpulan atau sekedar mengangkat spanduk saja, melainkan juga secara siatematis masuk ke arah politik praktif. Sebagai badan otonom Nahdlatul Ulama, Banser bertugas menangkal Radikalisme dan sikap intoleransi. Peneliti menggunakan teori Open Source Intelligent (OSINT) dan teori kontra Intelijen untuk menganalisis upaya Banser melakukan kegiatan intelijen dalam rangka menangkal Radikalisme tersebut. Hasil penelitian menunjukan bahwa strategi Banser menangkal radikalisme antara lain penyelidikan, penggalangan, pengamanan, penanaman nilai dan bela negara. Adapun Banser dalam memanfaatkan upaya OSINT adalah dilakukan dengan tahapan metode mulai dari grabbing, monitoring, infiltrasi, profiling, pengolahan, analisa dan desiminasi data serta pengamanan data.

This research examines the phenomenon of radicalism in Indonesia and Banser's efforts to counteract it from an intellegence perspective. In fact, the phenomenon of radicalism is not a new thing. Radicalism or what is also known as intolerence occurs in almost all regions. The emergence of this radicalism does not only seek existence by holding associations or just raising banner's, but also systematically enters into practical politics. As the Nahdlatul Ulama Autonomous Body, Banser is tasked with counteracting radicalism and intolerance. Researchers use Open Source Intellegent (OSINT) theory and counterintelligence theory to analyze Banser's effort to carry out Intellegence activities in order to counterect this radicalism. The results of the study show that Banser's strategy of counterecting radicalism includes investagation, security, raising, instilling, values, and defending the country. Banser's effort to utilize OSINT are carried out in stages, starting, from grabbing, monitoring, infiltration, profilling, processing, analysis, and data dissemination, as well as data security."
Depok: Sekolah Kajian Stratejik dan Global Universitas Indonesia, 2023
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Abdul Hakim Nur Maulana
"ABSTRAK
Pada tahun 2018, diketahui terjadi sebanyak 232,447,974 serangan siber ke jaringan Indonesia. Sektor yang menjadi perhatian adalah instansi pemerintah, karena menjadi target utama serangan siber. Domain .go.id (website pemerintah) menempati peringkat pertama dengan 30,75% lebih sering terkena defacement. Untuk mengatasi masalah ancaman siber, Pemerintah Indonesia membentuk BSSN, yang mempunyai unit kerja Pusopskamsinas, yang kemudian telah membentuk Secuity Operation Center (SOC). Namun SOC yang sudah dibentuk belum sesuai kebutuhan, yang ada saat ini belum cukup karena lingkup, maturitas dan kapabilitas SOC masih terbatas, sedangkan ancaman siber setiap detik selalu berkembang, dibutuhkan kemampuan kontra intelijen siber sebagai langkah dan strategi intelijen untuk memprediksi dan menanggulangi kemungkinan ancaman siber, serta membangun pola koordinasi dengan SOC lainnya untuk mewujudkan Collaborative Cyberdefense. Maka dibentuklah National Secuity Operation Center (NSOC), yaitu pengembangan dari SOC yang memerlukan upaya rencana pembangunan keamanan siber yang terukur untuk menjamin keberhasilaln tugas dan fungsinya. Oleh karena itu, pada penelitian ini akan dilakukan pengembangan kemampuan kontra intelijen siber di Pusopskamsinas menggunakan langkah kerangka kerja keamanan siber berdasarkan NIST CSF, yang dipadukan dengan Penilaian maturitas dan kapabilitas pada SOC di Pusopskamsinas menggunakan SOC-CMM, serta rekomendasi rencana aksi menggunakan konsep kontra intelijen siber.

ABSTRACT
In 2018, there were 232,447,974 cyber attacks on the Indonesian network. The sector of concern is government agencies, because they are the main target of cyber attacks. Domain. Go.id (government website) ranks first with 30.75% more often affected by defacement. To overcome the problem of cyber threats, the Government of Indonesia formed BSSN, which has a work unit of Pusopskamsinas, which then has formed the Secuity Operation Center (SOC). However, the SOC that has been formed is not yet in accordance with the needs, which is currently not enough because the scope, maturity and capability of the SOC is still limited, while cyber threats are always developing every second, cyber counterintelligence capabilities are needed as a step and intelligence strategy to predict and cope with possible cyber threats , and build coordination patterns with other SOCs to realize Collaborative Cyberdefense. Then a National Secuity Operation Center (NSOC) was formed, which is the development of an SOC that requires measurable cyber security development plans to ensure the success of its duties and functions. Therefore, this research will develop the capacity of cyber counterintelligence in Pusopskamsinas using the steps of the cyber security framework based on NIST CSF, which is integrated with the assessment of maturity and capability in SOC in Pusopskamsinas using SOCCMM, and recommendations for action plans using cyber counter intelligence concepts cyber."
Depok: Sekolah Kajian Stratejik dan Global Universitas Indonesia, 2020
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Almira Suci Maharani
"Tugas Karya Akhir ini berfokus pada strategi pencegahan kejahatan terorisme di dua bentuk rumah ibadah, yaitu masjid dan gereja. Rumah ibadah yang digunakan sebagai tempat beribadah ternyata tidak terlepas dari risiko ancaman terorisme. Sepanjang tahun 2015 sampai dengan 2017 terdapat kurang lebih tiga puluh serangan teroris yang dilakukan di masjid seluruh dunia, baik yang berbentuk pengeboman, penusukan, dan penembakan. BNPT sebagai aktor penanggulangan terorisme di Indonesia bertanggung jawab untuk memberikan perlindungan dari ancaman terorisme dengan membentuk suatu strategi pencegahan yang melibatkan berbagai pemangku kepentingan. Strategi pencegahan tersebut senada dengan apa yang dijelaskan dalam Routine Activity Theory, Rational Choice Theory, dan Situational Crime Prevention. Tujuan dari penulisan ini untuk melihat bagaimana upaya BNPT dalam memberikan perlindungan terhadap ancaman terorisme di rumah ibadah.

This research focuses on the terrorism crime prevention strategy in two places of worship, mosques and churches. Evidently, places of worship is exposed to risks of terrorism threats. From 2015 to 2017, there are approximately thirty terrorist attacks in mosques around the world in the form of bombing, stabbing and shooting. The National Agency for Combating Terrorism who is the actor of terrorism countermeasures in Indonesia is responsible for giving protection from terrorism threats by forming a prevention strategy that involves several stakeholders. The prevention strategy is inline with what is explained in Routine Activity Theory, Rational Choice Theory, and Situational Crime Prevention. This research aims to see how is BNPT`s efforts in giving protection from terrorism threats in places of worship."
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2018
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Fuad Saroha
"Keamanan dan ketahanan siber suatu negara saat ini telah menjadi elemen penting karena memiliki keterkaitan dengan keamanan nasional. Serangan siber yang pernah terjadi di berbagai belahan dunia khususnya pada infrastruktur informasi kritis nasional menunjukkan bahwa dampak yang dihasilkan bisa mengganggu stabilitas keamanan nasional. Berdasarkan data Global Cybersecurity Index (GCI) tahun 2018, saat ini Indonesia menempati urutan 41 dari 194 negara di dunia. Indeks tersebut menilai tingkat kesiapan dan komitmen suatu negara terhadap keamanan dan ketahanan sibernya. Oleh karena itu masih terdapat hal-hal yang harus
diperbaiki untuk memperkuat keamanan dan ketahanan siber Indonesia. Penelitian
ini bertujuan untuk (1) menjelaskan dan menganalisis ancaman siber pada infrastruktur informasi kritis nasional yang dapat mengganggu kedaulatan negara atas ruang siber, (2) menjelaskan dan menganalisis sejauh mana kesiapan Indonesia dalam menghadapi serangan siber pada infrastruktur informasi kritis serta (3) menganalisis strategi untuk mengatasi ancaman siber pada infrastruktur informasi
kritis dalam mewujudkan kedaulatan negara atas ruang siber. Metodologi yang digunakan pada penelitian ini adalah deskriptif analitis dimana sumber data didapatkan melalui studi literatur dan wawancara terhadap perwakilan dari pihak pemerintah, operator infrastruktur informasi kritis nasional serta lembaga penelitian keamanan siber. Penelitian ini berfokus pada konsep keamanan dan ketahanan siber berdasarkan indikator yang digunakan pada GCI dan akan membandingkan kondisi Indonesia saat ini dengan negara dengan peringkat tiga teratas pada regional Asia Tenggara. Hasil yang didapat adalah kondisi keamanan dan ketahanan siber Indonesia sudah cukup baik. Namun demikian masih terdapat beberapa area yang
perlu diperbaiki untuk mengatasi ancaman siber pada infrastruktur informasi kritis nasional sehingga dapat mewujudkan kedaulatan negara atas ruang siber.

Nowadays cybersecurity and cyber resilience of a country has become an important
element because it's impact on national security. Cyber attacks that have occurred
in various parts of the world, especially on national critical information infrastructure, show that the resulting impact could disrupt national security stability. Based on data from the Global Cybersecurity Index (GCI) in 2018,
Indonesia currently ranks 41 out of 194 countries in the world. The index assesses
the level of readiness and commitment of a country to its cybersecurity and resilience. Therefore there are still things that need to be improved to strengthen the security and resilience of Indonesia's cyberspace. This study aims to (1) explain and analyze cyber threats to the national critical information infrastructure that can disrupt the country's sovereignty over cyber space, (2) explain and analyze the extent of Indonesia's readiness in facing cyber attacks on critical information
infrastructure and (3) analyze strategies to overcome cyber threats to critical information infrastructure in realizing state sovereignty over cyber space. The methodology used in this research is analytical descriptive where data sources are obtained through literature studies and interviews with representatives from the
government, operators of the national critical information infrastructure and cyber security research institutions. This research focuses on the concept of cyber security and resilience based on indicators used in GCI and will compare the current condition of Indonesia with countries ranked in the top three in Southeast
Asia Region. The results are the conditions of Indonesia's cyber security and resilience is quite good. However, there are still some areas that need to be improved to overcome cyber threat on the national critical information
infrastructure to realize state sovereignty over cyber space.
"
Depok: Sekolah Kajian Stratejik dan Global Universitas Indonesia, 2019
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
New York: McGraw-Hill, 2012
658.478 REV
Buku Teks SO  Universitas Indonesia Library
cover
Lubis, Rizky Reza
"This paper discusses the process of radicalization in cyberspace. It will look at how and why Indonesia are vulnerable in society and targeted by terrorist organizations in an attempt to recruit them, especially in cyberspace. The terrorists have become expert, not only using the latest tools of internet communications, but to do it in a way that can shield their identities and even their locations when spreading the radical ideology. The concept that used in this paper is cyber-radicalization, which is the new concept that merged from cyber threat and radicalization. The result from this paper shown that Indonesia netizens (internet users) had great potency to fight radicalization in the cyberspace and thecapacity for supporting government counter-cyber radicalization agenda. However, fighting cyber radicalization in that way faced several challenges. Therefore Indonesia’s government should benefited the netizens to reach the optimum point on counter-cyber radicalization agenda."
Bogor: Universitas Pertahanan Indonesia, 2017
345 JPUPI 7:2 (2017)
Artikel Jurnal  Universitas Indonesia Library
cover
Agus Kartomo
"Militer khususnya intelijen militer seharusnya diberikan peran lebih dalam usaha kontra terorisme. Tujuan pertama penelitian ini adalah menganalisa bagaimana perbantuan militer dilaksanakan di negara-negara demokrasi. Tujuan kedua adalah menganalisa efektifitas pelibatan intelijen militer dalam operasi penegakan hukum terhadap kelompok teroris Mujahidin Indonesia Timur di Poso. Penelitian ini menggunakan metode kualitatif dan studi pustaka. Hasil penelitian menunjukkan bahwa perbantuan militer di negara demokrasi dilaksanakan dengan cara melatih atau memperbantukan unit militer khusus kepada otoritas penegakkan hukum. Sedangkan pelibatan intelijen militer dalam operasi penegakkan hukum di Poso, terbukti efektif dalam menyediakan informasi intelijen yang dibutuhkan, sehingga tujuan dan sasaran operasi dapat dicapai. Perbantuan militer dan pelibatan Intelijen militer ini dapat dijadikan sebagai rujukan dalam usaha kontra terorisme di Indonesia.

Military particularly military intelligence should be given more role in counter terrorism. First objective this research is to analyze how military assistance is conducted in democratic countries. The second goal is to analyze the effectiveness of military intelligence engagement in law enforcement operations against East Indonesian Mujahidin terrorist groups in Poso. This research based on qualitative methods and literature study. The results of the study indicate that military assistance in a democratic country is carried out by conducting a military training in order to form a special military unit for law enforcement authorities. Furthermore, the engagement of military intelligence in law enforcement operations in Poso shown effective in providing the necessary intelligence information, so the objectives and targets of law enforcement operations could be achieved. The military assistance and the engagement of military intelligence could be used as a reference in efforts to counter terrorism in Indonesia.
"
Jakarta: Program Pascasarjana Universitas Indonesia, 2019
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Alsmadi, Izzat
"This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework.
Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE)
Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training
Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more
"
Switzerland: Springer Nature, 2019
e20509570
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>