Peran Keamanan Siber Dalam Mengatasi Konten Negatif Guna Mewujudkan Ketahanan Informasi Nasional
DOI:
https://doi.org/10.33172/pa.v4i3.268Abstract
Abstrak -- Latar belakang perkembangan teknologi informasi dan komunikasi telah menjadikan dunia siber sebagai peluang terhadap seluruh aspek lini kehidupan manusia. Pada sisi lain perkembangan teknologi informasi/siber tersebut telah dijadikan media produksi dan penyebaran konten negatif seperti hoax, ujaran kebencian, penipuan, SARA, dan lain sebagainya. Tahun 2017 Kemenkominfo RI mencatat Jumlah konten negatif berdasarkan aduan masyarakat mencapai 51.456 konten. Masifnya penyebaran konten negatif di internet, selain sebagai serangan psikologis terhadap masyarakat luas, juga berpotensi tinggi sebagai phising untuk menyebarkan mallware yang mengancam integritas, kerahasiaan dan ketersediaan informasi serta keamanan infrastruktur. Oleh karena itu konten negatif di internet dikategorikan sebagai serangan siber (cyber attack) dan kejahatan siber (cyber crime) yang berdampak menimbulkan instabilitas ketahanan informasi nasional. Cyber Security berperan sebagai backbone dalam mengatasi konten negatif. Penelitian ini menggunakan metode kualitatif dengan pembahasan menggunakan pendekatan teori cyber security dan teori peran (role play theory). Hasil penelitian menunjukkan bahwa penyelenggaraan cyber security oleh Dirjen Aptika Kemenkominfo RI dan lembaga lain seperti Kemhan dan Pusinfolahta TNI telah dapat menjadi fundasi penyelenggaraan cyber security atau keamanan informasi tetapi belum sepenuhnya dapat mengatasi serangan siber konten negatif saat ini dan ancaman di masa yang akan datang disebabkan tingginya ketergantungan terhadap respon, mekanisme dan policy penyedia platform dan faktor lainnya. Disimpulkan bahwa konten negatif merupakan bagian dari serangan siber yang mengancam instabilitas ketahanan informasi nasional dan cyber security memiliki peran sebagai kebijakan, penguasaan teknologi informasi dan shok terapi dalam mengatasi konten negatif.Kata kunci: Cybersecurity, Cybercrime, Serangan, Kandungan, Blokir Abstrack - The background of the development of information and communication technology has made cyber world as an opportunity to all aspects of the human life line. On the other hand the development of information technology / siber has been used as media production and dissemination of negative content such as hoaxes, hate speech, fraud, racial intolerance, and so forth. Year 2017 Kemenkominfo RI recorded the amount of negative content based on complaints reached 51,456 content. The massive spread of negative content on the internet, as well as psychological attacks on the wider community, is also potentially high as a phishing to spread mallware that threatens integrity, secrecy and availability of information and security of infrastructure. Therefore, negative content on the internet is categorized as cyber attack and cyber crime, which has an impact on the instability of national information security. Cyber Security acts as a backbone in overcoming negative content. This research uses qualitative method with discussion using cyber security theory approach and role theory (role play theory). The results showed that the implementation of cyber security by the Directorate General of Aptika Kemenkominfo RI and other institutions such as Kemhan and Pusinfolahta TNI has been able to be the foundation of cyber security or information security but has not fully overcome the cyber attacks of current negative content and threats in the future due to the high dependence on platform responses, mechanisms and policy providers and other factors. It was concluded that negative content is part of cyber attack that threaten the instability of national information security and cyber securityKeywords: Cybersecurity, Cybercrime, Attack, Content, BlockingReferences
Referensi
Buku
Dunn, M. (2005). The socio-political dimensions of critical information infrastructure protection (CIIP). International Journal of Critical Infrastructures, 1(2-3), 258-268
Furchan, A. (1992). Pengantar metode penelitian kualitatif.
Henderson, L. (2007). Theorizing a multiple cultures instructional design model for e-learning and e-teaching.
Jones, R. H., & Hafner, C. A. (2012). Understanding digital literacies: A practical introduction. Routledge
Perundang-undangan
Undang Nomor 11 Tahun 2008 Tentang Informasi dan Transaksi Elektronik
Artikel Online
Jumlah Pengguna Internet Indonesia” APJII,http://www.apjii.or.id/v2/index.php/read/page/halamandata/9/statistik.html#, dikutip dari website APJI, diakses 20 Februari 2018
ProfilKominfo,https://kominfo.go.id/profilhttps://bssn.go.id/tugas-dan-fungsi-bssn/, diakses 10 januari 2018
Kominfo, “BSSN Hanya Tangani Keamanan Siber dan Jaringan”,https://kominfo.go.id/content/detail/12329/bssn-hanya tangani-keamanan-siber-dan-jaringan/0/sorotan_media,diakses 10 Januari 2018.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.