Strategi Keamanan Siber Komisi Pemilihan Umum (KPU) Pusat Dalam Menghadapi Pemilu 2019
DOI:
https://doi.org/10.33172/pa.v4i3.297Abstrak
Abstrak--Kajian ini menganalisa keamanan siber pada pelaksanaan Pemilu yang tengah menjadi sorotan saat ini. Banyaknya serangan siber yang dialami oleh KPU dalam penyelenggaraan pesta demokrasi sejak Pemilu 2014, ternyata tidak hanya sebatas ancaman peretasan terhadap infrastruktur, tetapi juga telah merambah ke ranah sosio kultural dengan pergeseran ke Pemilu 2.0 yang ditandai dengan semakin intensifnya peran sosial media sebagai medium opini publik. Peneliti menggunakan teori strategi sebagai grand theory oleh Carl Von Clauswitz dan konsep keamanan siber oleh Ghernaoutti untuk mengkaji dimensi keamanan siber. Metode penelitian ini menggunakan kualitatif dengan pendekatan fenomenologi. Hasil penelitian ini mengungkapkan bahwa strategi keamanan siber yang diimplementasikan oleh KPU Pusat dalam menghadapi Pemilu 2019 adalah melalui kerjasama dengan konsep Triple Helix yang melibatkan Pemerintah, Akademisi dan Swasta. Pengamanan siber dilakukan pada 4 (empat) dimensi melalui deteksi, proteksi dan prevensi terhadap ancaman dimulai dari aspek teknologi hingga ke manusianya. Kajian ini juga menyumbangkancara untuk menganalisa terkait peta ancaman Pemilu, jenis serangan, maupun metode kerjasama yang selama ini dilaksanakan oleh KPU dengan para stakeholders lainnya.
Kata kunci: strategi, keamanan siber, komisi pemilihan umum, triple helix
Abstract--The study analyzes the the implementation of cyber security in the election which is currently become the spotlight. The number of cyber attacks experienced by the KPU in conducting a democratic party since the 2014 General Election was not only limited to the threat of hacking on infrastructure, but also penetration of the socio-cultural realm with a shifting to 2.0 elections marked by increasingly intensive social media role as a medium of public opinion. The researcher uses strategy theory as a grand theory by Carl Von Clauswitz and cyber security concepts by Ghernaoutti to examine cyber security dimensions. This research method uses qualitative phenomenological approaches. The results of this study reveals that the cyber security strategy implemented by the Central KPU in dealing with the 2019 Election is through Triple Helix cooperation concept involving the Government, Academics and the Private Sector. Cyber security is carried out on 4 (four) dimensions through detection, protection and prevention of threats starts from technology to human aspect. The study also contributes ways to analyze related maps of election threats, types of attacks, as well as methods of cooperation that has been carried out by KPU with other stakeholders.
Keywords: strategy, cyber security, general election commission, triple helix
Referensi
Daftar Pustaka
Agustini. 2013. Pengelolaan dan Unsur-unsur Manajemen. Jakarta: Citra Pustaka.
Albrow, Martin and Elizabeth King (eds). 1990. Globalization, Knowledge, and Society. London:Sage Publication
Baker N. & Stephens A. 2006. Making Sense of War: Strategy for the 21st Century Cambridge: Cambridge University Press
Ghernaouti, Solange. 2013. Cyber Power. Switzerland: EPLF Press
James A. Green. 2015. Cyber Warfare A Multidiciplinary Analysis. Lanchester University: Routledge Studies in Conflict, Security and Technology.
Krisna. 2005. Pengaruh Globalisasi Terhadap Pluralisme Kebudayaan Manusia di Negara Berkembang. Public Journal
Michael Smith. 2015. Research Handbook on International Law and Cyberspace. (Cheltenham UK: Edward Elgar Publishing Limited)
Moekijat. 1994. Koordinasi (Suatu Tinjauan Teoritis). Bandung: Mandar Maju.
Scholte, J.A. 2000. Globalization: A Critical Introduction. London: Palgrave.
Surowiecki, James. 2004. The Wisdom of Crowds: Why the Many Are Smarter Than the Few and How Collective Wisdom Shapes Business, Economies, Societies and Nations. USA: Doubleday; Anchor.
Jurnal
Gupta, O. & Roos, G. 1998. Mergers and acquisitions through an intellectual capital perspective. Journal of Intellectual Capital, 2(3). 2001. hlm. 297-309. & Krumm, J.M.M., Dewulf, G. & De Jonge, H. Managing key resources and capabilities: pinpointing the added value of corporate real estate management. Facilities, 16(12/13).
Unduhan
Diterbitkan
Cara Mengutip
Terbitan
Bagian
Lisensi
Proposed Policy for Journals That Offer Open Access. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.