Ancaman Siber Dalam Persfektif Pertahanan Negara (Studi Kasus Sistem Pertahanan Semesta)
DOI:
https://doi.org/10.33172/pa.v4i2.255Abstract
Abstrak -- Kehidupan manusia senantiasa mengalami perubahan dan peningkatan akibat kemajuan peradaban yang terjadi akibat munculnya penemuan-penemuan oleh para ilmuwan. Internet merupakan salah satu penemuan terbesar dalam sejarah peradaban manusia yang memberikan banyak kemudahan sekaligus tantangan. Hal tersebut harus disikapi secara bijaksana sehingga perubahan yang ada dapat membawa kemajuan bangsa. Namun apabila tidak dapat disikapi dengan baik akan membawa dampak negatif khususnya bagi pertahanan negara. Tesis ini mencoba mengetahui dan menganalisis bagaimana persfektif para pemangku kepentingan khususnya di lingkungan TNI terkait pertahanan siber dihadapkan dengan pengembangan pertahanan negara yang menganut sistem pertahanan semesta. Metode yang digunakan dalam tulisan ini adalah metode penelitian kualitatif. Pengumpulan dan pengolahan data dengan melalui wawancara dengan para informan yang kemudian dilakukan analisis dengan menggunakan metode SWOT. Hasil penelitian ini nantinya diharapkan dapat dijadikan pertimbangan dalam membangun dan mengembangkan pertahanan siber khususnya di lingkungan TNI dalam menghadapi ancaman siber yang menimbulkan gangguan dan kerusakan pada infrastruktur kritis TNI yang dalam eskalasi besar dapat mengganggu pelaksanaan tugas pokok TNI dalam menegakkan kedaulatan negara, mempertahankan keutuhan wilayah Negara Kesatuan Republik Indonesia dan melindungi segenap bangsa dan seluruh tumpah darah Indonesia dari ancaman dan gangguan terhadap keutuhan bangsa dan negara.
Kata Kunci: ancaman, siber, dan pertahanan negara
Abstract -- Human life has always undergone changes and improvements due to the progress of civilization that occurred due to the emergence of discoveries by scientists. The internet is one of the greatest discoveries in the history of human civilization which provides many conveniences and challenges. This must be addressed wisely so that changes can bring the nation's progress. However, if it cannot be addressed properly it will have a negative impact, especially for the national defense. This thesis tries to find out and analyze how the perspectives of stakeholders, especially within the TNI, regarding cyber defense are faced with the development of national defense that adheres to the universal defense system. The method used in this paper is a qualitative research method. Data collection and processing through interviews with informants who then analyzed using the SWOT method. The results of this study are expected to be taken into consideration in building and developing cyber defense, especially in the TNI environment in the face of cyber threats that cause disruption and damage to critical infrastructure of the TNI, which in large escalation can interfere with the implementation of the TNI's main task in upholding state sovereignty, maintaining the territorial integrity of the State The unity of the Republic of Indonesia and protect all nations and all of Indonesia from the threat and disturbance of the integrity of the nation and state.Keywords: threat, cyber, and national defence
References
Daftar Pustaka
Buku
Andress, Jason and Steve Winterfield. 2011. Cyber Warfare, Techniques, Tactics and Tools for Security Practitioners. Elsiever, Inc.
Brooker, Paul. 2010. Modern Stateless Warfare. Palgrave Macmilan.
Carr, Jeffrey. 2010. Mapping The Cyber World Inside Cyber Warfare. O’Rieilly Media, Inc.
Carayannis, Elias G, David F.J Campbell and Marios P.E. 2014. Cyber-Development, Cyber-Democray, and Cyber-Defense, Challenges, Opportunities and Implication for Theory, Policy and Practise. Springer
Creative Industries Research Institute. (n.d). S.W.O.T Analysis. Product Brief Developments Tools: AUT University.
Creswell, John W. 2009. Research Design, Qualitative, Qualitative, and Mixed Approaches. Third Edition. Los Angeles: Sage Publication, Inc.
Czosseck, Christian and Kenneth Geers. 2009. The Virtual Battlefield: Perspectives on Cyberwarfare. IOS Press
David Hunger dan Thomas L. Wheelen. 2003. Manajemen Strategi, Yogyakarta.
Erbschloe, Michael. 2001. Information Warfare; How to Survive Cyber Attacks. Mc Graw Hill Companies.
Fomo, Richard and Ronald Baklarz. 1999. The Art of Information Warfare. Universal Publisher.
Garvalho, F.D. 2006. Cyberwar-Netwar, Security in The Information Age. IOS Press.
Giles, Lionel. 2008. The Art of War Sun Tzu. Pax Librorum Publishing House.
Halpin, Edwar, Phillipa Trevorrow, David Webb and Steve Wright. 2006. Cyberwar, Netwar and The Revolution in Military Affairs. Palgrave Macmilan.
Hart, Liddel, B.H. 1991. “The Theory of Strategy”, dalam Strategy: The Classic Book on Military Strategy. London: Meridian Book.
International Group of Experts. 2013. Tallin Manual on The International Law Applicable to Cyber Warfare. Cambridge University Press.
Kasali, Rhenaldi. 2018. Disruption.PT Gramedia Pusaka Utama.
Knapp, Kenneth J. 2009. Cyber Security and Global Information Assurance, Threat Analysis and Response Solutions. IGI Global.
Kott, Alexander. 2008. Battle of Cognition, The Future Information Rich Warfare and The Mind of The Commander, Preager Security International.
Libicki, Marthin C. 2007. Conquest In Cyber Space, National Security and Information Warfare. Cambridge University Press.
Molander, Roger C, Andrew Riddile, Peter A. Wilson, Stephanie Williamson. Strategic Information Warfare: A New Face of War.
Moleong, Lexy J. 2014. Metodologi Penelitian Kualitatif. Bandung: PT Remaja Rosdakarya.
Nurmantyo, Gatot. 2016. Memahami Ancaman, Menyadari Jati Diri sebagai Modal Membangun menuju Indoensia Emas. Jakarta. Puspen TNI.
Poerwadarminta. W.J.S. 2003. Kamus Umum Bahasa Indonesia. Jakarta: Balai Pustaka.
Prilleltensky, Isaac and Ora Prilleltensky. 2006. Promoting Well being, Linking Personal, Organizational and Community Change. John Wiley & Sons, Inc.
Setiawan Hari Purnomo. 1996. Manajemen Strategi: Sebuah Konsep Pengantar, Jakarta: Fakultas Ekonomi Universitas Indonesia.
Skopik, Florian. 2018. Collaborative Cyber Threat Intelligence, Detecting and Responding to Advanced Cyber Attacks at The National Level. CRC Press Taylor and Prancis Group, LLC.
Sugiyono. 2014. Metode Penelitian Kuantitatif, Kualitatif, dan Kombinasi (Mixed. Methods). Bandung: Alfabeta.
Tanuwidjaja, William. 2008. Buku "101 Intisari Seni Perang Sun Tzu".
Tippe, Syarifudin 2012. Human Capital Management, Jakarta: Pt. Elek Media Komputindo
Ulsch, Macdonnel. 2014. Cyber Threat! How to Manage The Growing Risk of Cyber Attacks. John Wiley & Sons, Inc.
Velez, Tony Uceda and Marco M. Morana. 2015. Risk Centric Threat Modeling, Process for Attack Simulation and Threat Analysis. John Wiley & Sons, Inc.
Waters, Garry. 2008. Australia and Cyberwarfare. Anu E. Press.
Peraturan
Undang - Undang Republik Indonesia Nomor 3 Tahun 2002 tentang
Pertahanan Negara.
Undang - Undang Republik Indonesia Nomor 34 Tahun 2004 tentang TNI.
Peraturan Presiden Nomor 97 Tahun 2015 tentang Kebijakan Umum
Pertahanan Negara Tahun 2015-2019.
Doktrin Tri Dharma Eka Karma Tahun 2017
Doktrin TNI AD Kartika Eka Paksi Tahun 2017
Doktrin Operasi Gabungan TNI Tahun 2013
Pedoman Strategis Pertahanan Nirmiliter, Kementerian Pertahanan Republik
Indonesia, Jakarta, 2014.
Pedoman Pertahanan Siber, Kementeian Pertahanan Republik Indonesia,Jakarta, 2014.
Kemhan. 2010. Minimum Essential Force Komponen Utama. Jakarta: Direktorat Jenderal Strategi Pertahanan, Kementerian Pertahanan.
Jurnal
Chotimah, Chusnul Hidayat. 2015. Membangun Pertahanan dan Keamanan Nasional dari Ancaman Cyber di Indonesia. Jurnal Diplomasi.
Edmon Makarim, Indonesian Legal Framework for Cybersecurity http://www.nisc.go.jp/security-site/campaign/ ajsympo/pdf/lecture2.pdf
Elvia, Marissa. 2018. Peran Kepolisian dalam Penenaggulangan Tindak Pidana Penyebar Berita Bohong (Hoax). Jurnal Universitas Lampung.
Khanisa. 2013. Dilema Kebebasan Dunia Maya: Kajian Dari Sudut Pandang Negara.
Kurnia, Erwin. 2014. Sistem Pertahanan Negara berbasis teknologi informasi dalam mengantisipasi cyberwarfare.
Montratama, Ian dan Yanyan Mochammad pada tahun 2017 dengan judul “ Bargaining: Revisi Teori Perimbangan Kekuatan dalam Hubungan Diplomasi Indonesia, Malaysia, Cina dan Amerika Serikat”
Paresti, Awindtya. 2016. Negara Liliput Dalam Persoalan Digital: Upaya-Upaya Swiss Menghadapi Ancaman Keamanan Siber.
Praditya, Yosua. 2017. Penggunaan Strategi Operasi Kontra Intelijen dalam rangka Menghadapi Ancaman Siber Nasional. Jurnal Pertahanan dan Bela Negara.
Usmani, Amarmuazam. 2017. Analisis Penggunaan Media Siber Terhadap Keamanan Nasional : Suatu Studi di Malaysia.
Sthepen.M.W. 1985 International Security Vol-9 No.4 Spring.
Internet
https://ilmupengetahuan.org/sejarah-perkembangan-internet/, diakses pada tanggal 13 Mei 2018.
https://www.cnnindonesia.com/pilkadaserentak/nasional/2018070314575632-311128/situs-kpu-diretas-serangan-hampir-tiap-menit?; diakses pada tanggal 7 Juli 2018
https://finance.detik.com/berita-ekonomi-bisnis/d-4063468/situs-resmi-diretas-
ini-penjelasan-ditjen-pajak: diakses pada tanggal 7 Juli 2018
https://news.linuxsec.org/waduh-situs-ppid-tentara-nasional-indonesia-dijahili-hacker/;diakses pada tanggal 7 Juli 2018
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.