Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 3 dokumen yang sesuai dengan query
cover
Roetan Setiawan
"[ABSTRAK
Tesis ini membahas manajemen peralatan sandi dalam mengamankan informasi
rahasia negara guna menunjang ketahanan nasional. Terjadinya kasuskasus
kebocoran informasi rahasia negara merupakan indikasi bahwa manajemen
peralatan sandi sebagai salah satu komponen dalam aspek keamanan masih belum
maksimal serta belum tercapainya ketahanan informasi. Ketahanan informasi
adalah salah satu penunjang terwujudnya ketahanan nasional. Penelitian ini adalah
penelitian kualitatif dengan desain deskriptif, dengan metode wawancara,
observasi, dan dokumentasi. Informan penelitian ini terdiri atas 3 (tiga) orang dari
instansi yang berkaitan langsung dengan persandian. Teori yang digunakan dalam
penelitian ini adalah teori manajemen persandian, teori informasi, teori ketahanan
nasional, dan teori kedaulatan. Hasil penelitian menyarankan bahwa untuk
mewujudkan ketahanan nasional diperlukan beberapa unsur, salah satunya yaitu
ketahanan informasi. Ketahanan informasi meliputi tiga aspek, yaitu kedaulatan
teknologi informasi, keamanan, dan kelancaran. Saat ini, hampir seluruh
infrastruktur, hardware, dan software teknologi informasi merupakan produk
asing sehingga tidak ada jaminan dalam mengamankan informasi rahasia negara,
bahkan dapat dimanfaatkan oleh pihak asing untuk melakukan penyadapan.
Dalam hal perencanaan, perancangan, penerapan, dan pengawasan terhadap
hardware maupun software, manajemen peralatan sandi belum mampu memenuhi
aspekaspek
ketahanan informasi. Pada tahap perencanaan belum bisa dilakukan
penelitian yang mendalam dan berkesinambungan untuk merancang peralatan
sandi yang aman sesuai dengan tuntutan perkembangan teknologi, sekaligus
nyaman dalam pengoperasiannya sehingga diharapkan mampu mengubah pola
pikir seluruh komponen bangsa untuk lebih memilih menggunakan peralatan
sandi yang dapat menjamin keamanan informasi rahasia negara daripada
menggunakan peralatan teknologi informasi yang bersifat umum dengan segala
resikonya. Hal ini dikarenakan Indonesia belum memiliki regulasi yang secara
khusus mengatur tentang persandian. Dengan adanya UndangUndang
Persandian,
maka manajemen peralatan sandi akan dapat dimaksimalkan dalam mengamankan
informasi rahasia negara guna menunjang ketahanan nasional.

ABSTRACT
This thesis describes crypto tools management in securing state secret information
to support national resilience. The occurrence of cases of leakage of confidential
information is an indication that the crypto tools management as one component
in the safety aspect has not yet achieved a maximum and also resilience of
information has not been reached. Resilience of information is one of supporting
the realization of national resilience. This study is a qualitative study with a
descriptive design, with interview, observation, and documentation method.
Informants of this study consists of three persons from agencies that are directly
related to coding. The theory used in this research is the management of coding
theory, information theory, the theory of national resilience and sovereignty
theory. Results of the study suggest that in order to realize the national resilience
needed several elements, one of which is the resilience of information. Resilience
of information includes three aspects, namely the sovereignty of information
technology, security, and smoothness. Nowadays, almost the entire infrastructure,
hardware, and software information technology is a foreign product so that there
are no guarantees in securing state secret information, and even can be used by
foreigners to conduct wiretaps. In terms of planning, design, implementation, and
monitoring of hardware and software, crypto tools management has not been able
to meet aspects of information resilience. In the planning stage can not be done indepth
research and continuous to design crypto tools that is safe accordance with
the demands of technological developments, as well as comfortable in operation
that are expected to change the mindset of all people to prefer to use crypto tools
that can guarantee the security of the confidential state information than using
information technology equipment that is common to all hazards. This is because
Indonesia does not have a regulation that specifically regulates the coding. With
the Act coding, then the crypto management tools will be maximized in securing
state secret information to support national resilience;This thesis describes crypto tools management in securing state secret information
to support national resilience. The occurrence of cases of leakage of confidential
information is an indication that the crypto tools management as one component
in the safety aspect has not yet achieved a maximum and also resilience of
information has not been reached. Resilience of information is one of supporting
the realization of national resilience. This study is a qualitative study with a
descriptive design, with interview, observation, and documentation method.
Informants of this study consists of three persons from agencies that are directly
related to coding. The theory used in this research is the management of coding
theory, information theory, the theory of national resilience and sovereignty
theory. Results of the study suggest that in order to realize the national resilience
needed several elements, one of which is the resilience of information. Resilience
of information includes three aspects, namely the sovereignty of information
technology, security, and smoothness. Nowadays, almost the entire infrastructure,
hardware, and software information technology is a foreign product so that there
are no guarantees in securing state secret information, and even can be used by
foreigners to conduct wiretaps. In terms of planning, design, implementation, and
monitoring of hardware and software, crypto tools management has not been able
to meet aspects of information resilience. In the planning stage can not be done indepth
research and continuous to design crypto tools that is safe accordance with
the demands of technological developments, as well as comfortable in operation
that are expected to change the mindset of all people to prefer to use crypto tools
that can guarantee the security of the confidential state information than using
information technology equipment that is common to all hazards. This is because
Indonesia does not have a regulation that specifically regulates the coding. With
the Act coding, then the crypto management tools will be maximized in securing
state secret information to support national resilience, This thesis describes crypto tools management in securing state secret information
to support national resilience. The occurrence of cases of leakage of confidential
information is an indication that the crypto tools management as one component
in the safety aspect has not yet achieved a maximum and also resilience of
information has not been reached. Resilience of information is one of supporting
the realization of national resilience. This study is a qualitative study with a
descriptive design, with interview, observation, and documentation method.
Informants of this study consists of three persons from agencies that are directly
related to coding. The theory used in this research is the management of coding
theory, information theory, the theory of national resilience and sovereignty
theory. Results of the study suggest that in order to realize the national resilience
needed several elements, one of which is the resilience of information. Resilience
of information includes three aspects, namely the sovereignty of information
technology, security, and smoothness. Nowadays, almost the entire infrastructure,
hardware, and software information technology is a foreign product so that there
are no guarantees in securing state secret information, and even can be used by
foreigners to conduct wiretaps. In terms of planning, design, implementation, and
monitoring of hardware and software, crypto tools management has not been able
to meet aspects of information resilience. In the planning stage can not be done indepth
research and continuous to design crypto tools that is safe accordance with
the demands of technological developments, as well as comfortable in operation
that are expected to change the mindset of all people to prefer to use crypto tools
that can guarantee the security of the confidential state information than using
information technology equipment that is common to all hazards. This is because
Indonesia does not have a regulation that specifically regulates the coding. With
the Act coding, then the crypto management tools will be maximized in securing
state secret information to support national resilience]"
2015
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Yudithya Aristy Primaditta
"Pertukaran informasi terkait dengan perpajakan antar negara merupakan salah satu upaya yang dilakukan oleh berbagai negara untuk mencegah dan mengatasi berbagai bentuk penghindaran dan penggelapan pajak, salah satunya adalah berdasarkan ketentuan Automatic Exchange of Information in Tax Matters (AEOI) yang akan segera berlaku mulai tahun 2017 mendatang. Penerapan ketentuan AEOI tersebut di Indonesia berkaitan dengan aturan yang mengatur mengenai kerahasiaan bank yang berlaku bagi bank di Indonesia dimana informasi keuangan nasabah dilindungi sebagai rahasia bank.
Penelitian ini bertujuan untuk membahas permasalahan yang terkait dengan hal tersebut yaitu Pertama, menganalisis akibat hukum yang ditimbulkan dari penerapan ketentuan AEOI di Indonesia terkait dengan ketentuan mengenai rahasia bank berdasarkan UU Perbankan yang berlaku di Indonesia dan Kedua, menganalisis mengenai akibat penerapan ketentuan AEOI bagi Bank Umum di Indonesia.
Metode penelitian yang digunakan penulis adalah pendekatan Yuridis Normatif, penelitian yang dilakukan dengan mendasar kepada kepustakaan atau data sekunder dengan menganalisis akibat hukum dari penerapan ketentuan AEOI berdasarkan peraturan perundang-undangan yang berlaku di Indonesia terkait dengan kerahasiaan bank. Metode penelitian dengan tahap pengumpulan data yang digunakan adalah studi kepustakaan dan wawancara. Metode analisis data yang digunakan adalah normatif kualitatif.
Kesimpulan dari penelitian ini adalah, Pertama, ketentuan yang mengatur mengenai rahasia bank di Indonesia tidak dapat dikesampingkan dengan diberlakukannya ketentuan pertukaran informasi perpajakan antar negara berdasarkan ketentuan AEOI. Pembukaan rahasia bank untuk kepentingan penerapan AEOI harus berdasarkan persetujuan dari nasabah. Kedua, akibat dari penerapan ketentuan AEOI di Indonesia bagi bank umum adalah bank umum memiliki kewajiban untuk melakukan pelaporan kepada otoritas pajak di Indonesia atas nasabahnya yang tunduk pada ketentuan AEOI dengan melakukan uji tuntas untuk menentukan nasabahnya yang termasuk dalam kategori nasabah yang wajib untuk dilaporkan.
......Exchange of information related to taxation between nations is an effort taken by countries to prevent and to overcome tax avoidance and tax evasion schemes, one of them based by provisions set out in Automatic Exchange of Information in Tax Matters (AEOI) which will come into force as of 2017. The implementation of AEOI in Indonesia will be closely related to banking secrecy regulations which binding for banks in Indonesia whereas consumer privacy is safeguarded as bank secrecy.
This study aims to discuss issues related to the implementation, First, to analyze the legal consequences arising from the implementation of AEOI in Indonesia in relation with banking secrecy regulations based on Banking Law in Indonesia, and Second, to analyze the consequences of the implementation of AEOI for commercial bank in Indonesia.
The study method is judicial normative approach, based on research conducted by the library or secondary data by analyzing the legal consequences of the implementation of AEOI subject to law and regulations prevailing in Indonesia related to bank secrecy. The research method with data collection phase used is literature study and interviews. Data analysis method used in this study is normative qualitative.
This study concluded that, First, the implementation of AEOI in Indonesia shall not set aside regulations concerning bank secrecy as regulated in Banking Law. Lifting of bank secrecy due to exchange of information based on AEOI shall required customer consent. Second, as a result of the implementation of AEOI in Indonesia for commercial have an obligation to do the reporting to the tax authorities in Indonesia for customer subject to the provisions of AEOI by conducting due diligence to determine its customers which are included in the category of accounts that are required to be reported."
Depok: Fakultas Hukum Universitas Indonesia, 2016
T45360
UI - Tesis Membership  Universitas Indonesia Library
cover
Agung Widodo
"Memasuki era transformasi digital, pertukaraan informasi menjadi aspek paling vital bagi hampir seluruh organisasi, terlebih lagi informasi rahasia dan strategis. Beragam preseden buruk tentang kebocoran informasi rahasia dan strategis di Indonesia menjadi tamparan keras yang harus dijawab dengan solusi efektif. Instansi XYZ telah mengembangkan aplikasi enkripsi file ABC pada tahun 2020 untuk menjawab tantangan pengamanan informasi rahasia khususnya yang ditransmisikan pada kanal elektronik. Hingga tahun 2022, aplikasi ABC telah diimplementasikan secara terbatas dan rencananya, skala implementasi akan diperluas secara nasional. Selang 2 tahun masa operasional, Instansi XYZ telah melakukan kajian terhadap keamanan algoritma yang digunakan dalam Aplikasi ABC, namun belum melakukan kajian mendalam terhadap keamanan rangkaian protokol yang digunakan dalam Aplikasi tersebut. Pada peneitian ini dilakukan analisis keamanan protokol registrasi, verifikasi pengguna, pembangkitan kunci, dan permintaan kunci untuk proses enkripsi-dekripsi Aplikasi ABC dengan pendekatan verifikasi formal menggunakan Scyther Tool. Analisis berfokus pada aspek jaminan kerahasiaan informasi dan autentikasi dengan empat kriteria yaitu secrecy, aliveness, synchronization, dan agreement. Hasil percobaan menunjukkan bahwa protokol-protokol tersebut telah menenuhi kriteria secrecy untuk informasi rahasia yang ditransmisikan namun memiliki kelemahan umum pada pada autentikasi khususnya untuk kriteria synchronization dan agreement. Berdasarkan kelemahan tersebut, peneliti mengajukan desain konseptual protokol yang mampu mengatasi kelemahan-kelemahan yang teridentifikasi. Hasilnya, desain protokol yang diajukan peneliti terbukti provably secure berdasarkan hasil pengujian dan memenuhi empat kriteria keamanan pada aspek kerahasiaan informasi dan autentikasi entitas dan isi pesan.
......In the era of digital transformation, information exchange, especially confidential and strategic information has become the most vital aspect for almost all organizations. Various bad precedents regarding classified and strategic information leaks in Indonesia have become a slap in the face that must be acknowledge and answered with effective solutions. In 2020, XYZ Agency developed a file encryption application (ABC Application) to address the challenge of securing confidential information, especially those transmitted on electronic channels. Until 2022, the ABC Application has been implemented in a limited scope and its implementation is planned to be expanded nationally. After 2 years of operation, the XYZ Agency has conducted a study on the security of the algorithm used in ABC Application, but unfortunately has not conducted an in-depth study regarding the security of the protocol suite used in the Application. In this research, a security analysis of ABC application protocol suites, namely the registration protocol, user verification, key generation, and key request for the encryption-decryption process protocol was conducted through formal verification approach using the Scyther Tool. The analysis focuses on aspects of guaranteeing confidentiality of information and authentication with four criteria, namely secrecy, aliveness, synchronization, and agreement. The experimental results showed that these protocols meet the security criteria for the transmitted confidential information but have general weaknesses in the authentication aspect, especially for synchronization and agreement criteria. Based on these identified weaknesses, We proposed a robust conceptual protocol design to overcome these weaknesses. As a result, the proposed design was proved to be provably secure based on the test results and met the four security criteria in the aspects of information confidentiality and authentication in terms of entity authentication and message content integrity. "
Jakarta: Fakultas Teknik Universitas Indonesia, 2022
T-pdf
UI - Tesis Membership  Universitas Indonesia Library