•  
  •  
 

Jurnal Kajian Stratejik Ketahanan Nasional

Abstract

Cybersecurity governance in Indonesia is still partial and sectoral, resulting in the handling of cybersecurity problems not yet integrated. This makes cyber threats even more real, especially when linked to threats to cybersecurity for government and private institutions. Therefore, cybersecurity management must be carried out in an integrated manner to prevent cyber threats in all aspects of national and state life. In 2017, the National Cyber and Crypto Agency (BSSN) was formed based on the Presidential Regulation on BSSN which states that BSSN is tasked with implementing cyber security effectively and efficiently by utilizing, developing and consolidating all parties related to cybersecurity. The establishment of the BSSN considers that the cybersecurity sector is one of the areas in government that must be strengthened and encouraged in order to realize national security, increase economic growth, ensure the implementation of government policies and programs in the cybersecurity sector. BSSN was formed based on urgent needs in the midst of various challenges and problems related to the implementation of cybersecurity and encryption. BSSN is a government institution that is under and responsible to the President. The formation of BSSN is expected to be able to face problems and challenges in the present and future cyber era. This research is a descriptive type of research using a qualitative approach that seeks to explain the strategy of the National Cyber and Crypto Agency (BSSN) to increase commitment in the field of cybersecurity in dealing with cyber threats in Indonesia.

References

Buku dan Jurnal

Blaxter, L. Hughes, C. Tight, M. (2006). How to Research. New York: Open University Press.

Bruce J. Biddle. (1979). Role Theory: Expectations, Identities, and Behaviour. New York: Academic Press.

Chandra Wijaya dan Muhammad Rifa’i. (2016). Dasar-Dasar Manajemen. Medan: Perdana Publishing.

Christos Scondars. (2004). Organizational Models for Computer Security Incident

179

Response Teams (CSIRTs). Pittsburgh:

Universitas Carnegie Mellon. Clauster, J. (2008). An Introduction to Intelligence Research and Analysis. United States of America: Scarecrow

Press Inc. Creswell, J. W. (2003). Research Design-

Qualitative, Quantitative, and Mised Methods Approaches. New Delhi: Sage Publication.

Fitriati, Rachma. (2014). Membangun Model Kebijakan Nasional Keamanan Siber dalam Sistem Pertahanan Negara. Bogor: Universitas Pertahanan.

H.B Sutopo, (2002). Metode Penelitian Kualitatif: Dasar Teori dan Penerapannya Dalam Penelitian. Surakarta: Universitas Sebelas Maret Press.

Kearney, A.T., (2018). Cybersecurity in ASEAN: An Urgent Call to Action. Amerika.

Komariah, A. Satori, D. (2011). Metodologi Penelitian Kualitatif. Bandung: Alfabeta.

Lembaga Ketahanan Nasional. (2000). Pendidikan Kewarganegaraan. Jakarta: PT. Gramedia Pustaka Utama.

Norwood, Kerry T., Catwell, Sandra P. (2009). Cybersecurity, Cyberanalysis, and Warning. New York: Nova Science Publisher, Inc.

Prunckun, H, (2015). Scientific Methods of Inquiry for Intelligence Analysis. Rowman & Littlefield.

Refsdal et al. (2015). Cyber-Risk Management. Springer.

Runturambi, A. Josias Simon dan Dadang Sutiadi, 2013. Manajemen Sekuriti: Karakteristik Lokasi dan Desain. Jakarta: Universitas Indonesia.

Schreier, F. (2015). On Cyber Warfare, Working Paper Number 7.

Sugiyono. (2005). Memahami Penelitian Kualitatif. Bandung: Alfabet.

ISSN: 2620-7419

Jurnal Kajian Stratejik Ketahanan Nasional, Vol..2, No.2, 2019

Publikasi

Internasional Telecommunication Union (ITU). (2008). Series X: Data Networks, Open System Communications and Security – Overview of Cybersecurity. ITU-T.

Internasional Telecommunication Union (ITU). (2011). ITU National Cybersecurity Strategy Guide.

International Organization for Standardization and the International Electrotechnical Commission (ISO/IEC). (2012). ISO/IEC 27032:2012 Information technology – Security techniques – Guidelines for cybersecurity.

Cyber

Security Agency of Singapore (CSA). (2016). Singapore’s Cybersecurity Strategy. Singapura: Cyber Security Agency of Singapore (CSA).

Ministry of Science, Technology and Innovation of Malaysia (MOSTI). The National Cyber Security Policy. Malaysia: MOSTI.

The Australian Cyber Security Centre (ACSC). (2016). Australia’s Cyber Security Strategy – Enabling Innovation, growth & prosperity. Australia: ACSC.

Ministry of Communication and Information Technology – Department of Electronics and Information Technology. (2013). National Cyber Security Policy. India: MCITY.

National Cyber Security Strategy 2016-2021 United Kingdom. (2016).

National Cyber Security Centre (NCSC). (2017). National Cyber Security Centre Overview. Inggris: NCSC.

Ministry of State Security. (2015). The National Cybersecurity Policy Framework (NFPF). Afrika Selatan: Ministry of State Security.

North Atlantic Treaty Organization (NATO). (2016). National Cyber Security Organization: United States. Tallin: NATO.

The Department of Defense of United States (DoD). (2015). The Department of Defense Cyber Strategy. Amerika: DoD.

180

The Department of State of United States (DoS). (2016). The Department of State Internasional Cyberspace Policy Strategy. Amerika: DoS.

The George Washington University. (2016). Cybersecurity for State and Local Law Enforcement: A Policy Roadmap to Enhance Capabilities. Washington: The George Washington University.

Investment Industry Regulatory Organization of Canada (IIORC). Cybersecurity Best Practices Guide for IIROC Dealer Members. Canada: IIORC.

General Accounting Office. (2004). Cybersecurity for Critical Infrastructure Protection. Amerika: General Accounting Office.

Trusted Information Sharing Network (TISN). (2008). Defence in Depth. Australia: TISN.

Karya Ilmiah

Studer, Evelyne. (2018). Regulating Cybersecurity - What civil liability in case of cyber attacks. Jenewa: University of Geneva.

Ali, Irhamni. (2011). Kejahatan Terhadap Informasi (Cybercrime) Dalam Konteks Perpustakaan Digital. Bogor: Institut Pertanian Bogor.

Erwin, Basuki. (2018). Kontra Intelijen Aksi Spionase Siber Terhadap Anggota Democratic National Committee Menjelang Pemilihan Presiden AS Tahun 2016. Jakarta: Universitas Indonesia.

Maskun. (2013). Kedudukan Hukum Cyber Crime Dalam Perkembangan Hukum Internasional Kontemporer. Makassar: Universitas Hasanuddin Makassar.

Putra, David dan Datumaya, Arwin. (2016). Diplomasi Pertahanan Indonesia Dalam Pencapaian Cybersecurity Melalui Asean Regional Forum On Cybersecurity Initiatives. Bogor: Universitas Pertahanan.

ISSN: 2620-7419

Jurnal Kajian Stratejik Ketahanan Nasional, Vol..2, No.2, 2019

Rahayu, Ning. (2008). Praktik Penghindaran Pajak (Tax Avoidance) pada Foreign Direct Investment yang Berbentuk Subsidiary Company (PT PMA) di Indonesia (Suatu Kajian Tentang Kebijakan Anti Tax Avoidance.

Triwahyuni, Dewi dan Agustin, Tine. (2016). Strategi Keamanan Cyber Amerika Serikat. Jakarta: Universitas Komputer Indonesia.

Yuliansyah, Moehammad. (2015). Pengaruh Cyber Security Amerika Serikat Menghadapi Ancaman Cyber Warfare. Riau: Universitas Riau.

Yuliardi, Ryscha. Penggunaan Cyberwar Melalui Stuxnet Project Oleh Amerika Serikat Dalam Merespon Perkembangan Proyek Nuklir Iran di Natanz. Surabaya: Universitas Airlangga.

Jurnal

Ardiyanti, Handrini. (2014). Cyber-Security Dan Tantangan Pengembangannya Di Indonesia. Jakarta: Jurnal Politica.

Budiman, Ahmad. (2017). Optimalisasi Badan Siber dan Sandi Nasional. Jakarta: Pusat Penelitian Badan Keahlian DPR RI.

Hadi, Astar. (2005). Matinya Dunia Cyberspace: Kritik Humanis Mark Slouka Terhadap Jagat Maya. LkiS.

Lippman, Walter. (1943). US Foreign Policy: Shield of The Republic. Boston: Little, Brown.

Rosmawati. (2012). Makalah Pendidikan Kewarganegaraan.

Walker, Seth. (2010). My [Sacred] Space: Discovering Sacred Space in Cyberspace, Summer.

Wolfers, Arnold. (1962). Discord and Collaboration Essays On International Politics. Baltimore: John Hopkins University Press.

World Economic Forum. (2012). Risk and Responsibility in a Hyperconnected World Pathways to Global Cyber Resilience.

181

Burhansyah, Encik Mochammad. (2016). Kerja sama Kepolisian Negara Republik Indonesia (POLRI)-Australian Federal Police (AFP) Sektor Capacity Building Dalam Penanggulangan Tindak Pidana Cyber Crime Di Indonesia Periode 2012-2014. Semarang: Universitas Diponegoro.

Peraturan

Undang-Undang Nomor 36 Tahun 1999 tentang Telekomunikasi.

Undang-Undang Nomor 14 Tahun 2008 tentang Keterbukaan Informasi Publik.

Undang-Undang Nomor 25 Tahun 2009 tentang Pelayanan Publik.

Undang-Undang Nomor 17 Tahun 2011 tentang Intelijen.

133 Undang-Undang Nomor 24 Tahun 2014 tentang

Administrasi Kependudukan. Undang-Undang Nomor 19 Tahun 2016 tentang

Informasi dan Transaksi Elektronik. Peraturan Pemerintah Nomor 82 Tahun 2012 tentang Penyelenggaraan Sistem dan

Transaksi Elektronik. Peraturan Presiden Nomor 53 Tahun 2017

tentang Badan Siber dan Sandi Negara (Lembaran Negara Tahun 2017 Nomor 100) sebagaimana telah diubah dengan Peraturan Presiden Nomor 133 Tahun 2017 tentang Perubahan atas Peraturan Presiden Nomor 53 Tahun 2017 tentang Badan Siber dan Sandi Negara (Lembaran Negara Tahun 2017 Nomor 277).

Media Internet

http://library.binus.ac.id/eColls/eThesisdoc/Bab 2HTML/2013201542MCBab2001/page 20.html. Tanggal akses 9 Maret 2018

http://nasional.kompas.com/read/2017/11/21/21 260801/januari-hingga-juli-2017- indonesia-alami-1773-juta-serangan- siber. Tanggal Tayang 21 November 2017. Tanggal Akses 19 Februari 2018

ISSN: 2620-7419

Jurnal Kajian Stratejik Ketahanan Nasional, Vol..2, No.2, 2019

http://news.liputan6.com/read/2972837/ahli- digital-forensik-sebut-15-situs- pemerintah-diretas-per-hari. Tanggal Tayang 31 Mei 2017. Tanggal Akses 21 Februari 2018

http://www.bbc.com/indonesia/indonesia- 40106424. Tanggal Tayang 31 Mei 2017. Tanggal Akses 21 Februari 2018

http://www.hackmageddon.com/2018/01/17/20 17-cyber-attacks-statistics/. Tanggal tayang 17 Januari 2018. Tanggal akses 9 Februari 2018

https://kominfo.go.id/content/detail/9636/siaran -pers-no-55hmkominfo052017-tentang- himbauan-agar-segera-melakukan- tindakan-pencegahan-terhadap- ancaman-malware-khususnya- ransomware-jenis- wannacry/0/siaran_pers. Tanggal tayang 13 Mei 2017. Tanggal akses 8 Februari 2018

https://www.anonimcyber.com/2017/12/seranga n-cyber-yang-menghebohkan- dunia.html. Tanggal tayang 8 Desember 2017. Tanggal akses 7 Februari 2018

http://industri.bisnis.com/read/20171227/105/7 21489/ini-catatan-penting-seputar- serangan-siber-sepanjang-tahun-2017. Tanggal tayang 27 Desember 2017. Tanggal akses 3 Mei 2018.

https://www.csa.gov.sg/. Tanggal akses 4 April 2018.

https://www.nacsa.gov.my/index.php. Tanggal akses 4 April 2018.

https://www.acsc.gov.au/index.html. Tanggal akses 4 April 2018.

http://meity.gov.in/home. Tanggal akses 4 April 2018.

https://www.ncsc.gov.uk/. Tanggal akses 4 April 2018.

https://www.gov.za/. Tanggal akses 4 April 2018.

https://ccdcoe.org/. Tanggal akses 4 April 2018. https://www.dhs.gov/. Tanggal akses 4 April

2018. https://www.defense.gov/. Tanggal akses 4

April 2018.

182

https://www.state.gov/. Tanggal akses 4 April 2018.

http://computer.expressbpd.com/magazine/dedi cated-legislation-for-cyber-security-is- needed-pavan-duggal/13378/. Tanggal tayang 30 Agustus 2015. Tanggal akses 18 Mei 2018.

https://www.jica.go.jp/english/index.html. Tanggal akses 12 Mei 2018.

http://www.aots.jp/hida/en/index.html. Tanggal akses 12 Mei 2018.

http://www.koica.go.kr/english/main.html. Tanggal akses 12 Mei 2018.

https://www.jclec.org/. Tanggal akses 12 Mei 2018.

https://www.first.org/. Tanggal akses 12 Mei 2018.

http://www.impact- alliance.org/home/index.html. Tanggal akses 12 Mei 2018.

https://www.apcert.org/. Tanggal akses 12 Mei 2018.

https://www.intgovforum.org/multilingual/. Tanggal akses 12 Mei 2018.

http://asean.org/. Tanggal akses 12 Mei 2018.

Share

COinS