STRATEGI KEAMANAN INFORMASI DALAM MENGHADAPI ANCAMAN SIBER PADA SISTEM PENGADAAN SECARA ELEKTRONIK (STUDI SERANGAN HACKER PADA SPSE PROVINSI LAMPUNG TAHUN 2015)
DOI:
https://doi.org/10.33172/pa.v5i2.411Abstrak
Abstrak-- Keamanan Informasi di era perkembangan teknologi saat ini telah menjadi kebutuhan yang wajib di penuhi. Pemerintah sebagai salah satu pemanfaat teknologi telah melahirkan sistem elektronik procurement yang merupakan bentuk dari elektronik goverment. Beralihnya proses pengadaan ke dalam sistem elektronik justru menimbulkan kerentanan terhadap keamanan sistem informasi tersebut. Hal ini menyebabkan terjadinya serangan hacker pada sistem pengadaan secara elektronik (SPSE) Provinsi Lampung tahun 2015 yang mengakibatkan ratusan paket yang sedang proses tander harus tander ulang. Maka dari itu dibutuhkan suatu strategi keamanan informasi yang dapat mencegah terjadinya serangan hacker maupun ancaman siber tersebut. Untuk membangun strategi keamanan informasi tersebut menggunakan model keamanan informasi defense in depth sebagai teori atau pisau analisis. Pelaksanaan penelitian ini menggunakan metode penelitinan kualitatif dengan pendekatan studi kasus. Hasil penelitian menunjukan bahwa strategi keamanan informasi dalam menghadapi ancaman siber pada sistem pengadaan secara elektronik Provinsi Lampung belum memenuhi aspek-aspek pada model keamanan informasi defense in depth yaitu: governance, people, processes, dan technology.
Kata Kunci: keamanan informasi, ancaman siber, strategi, spse provinsi lampung
Abstract-- Information security in the current era of technological development has become a necessity that must be fulfilled. The government as one of the technology users has produced a procurement electronic system which is a form of electronic government. The shifting of the procurement process into an electronic system actually creates vulnerability to the security of the information system. This led to a hacker attack on Lampung's Sistem Pengadaan Secara Elektronik (SPSE) in 2015 which resulted in hundreds of packages being tandered to have to be restarted. Therefore we need an information security strategy that can prevent hacker attacks and cyber threats. To build an information security strategy using the defense in depth information security model as a theory or analysis knife. The implementation of this study used a qualitative research method with a case study approach. The results showed that the information security strategy in dealing with cyber threats in the electronic procurement system of Lampung Province had not fulfilled aspects of the defense in depth information security model, that are: governance, people, processes, and technology.
Keywords: information security, cyber threat, strategy, spse provinsi lampung
Referensi
Daftar Pustaka
Alzoni. 2015. Situs Mesuji Kerap Dihacker. dalam http://le-ut.blogspot.com/2015/ 08/situs-lpse-mesuji-kerap-dihacker.
Instruksi Presiden No 3 tahun 2003 tentang Kebijakan dan Strategi Nasional Pengembangan E-Government.
Jasin, Mochammad. 2007. Mencegah Korupsi Melalui E-procurement. Jakarta: Komisi Pemberantasan Korupsi.
Julan, Tritus. 2016. Laman LPSE Diretas, Proses Lelang Kacau. dalam http://koran-sindo.com/page/news/ 2016-05-10/6/47/Laman_LPSE_Diretas_ Proses_Lelang_Kacau
Koentjaraningrat. 1983. Metode-Metode Penelitian Masyarakat. Jakarta: Gramedia.
Kurniawati, Putri. 2016. Hacker Pembobol LPSE Kementerian PUPR Terancam Kurungan Empat Tahun Penjara. dalam https://www.kupastuntas.co/2016/08/hacker-pembobol-lpse-kementerian-pupr-terancam-kurungan-empat-tahun-penjara/
Peraturan Presiden Nomor 54 Tahun 2010 tentang Pengadaan Barang/Jasa Pemerintah
Rianse, Usman. 2009. Metodologi Penelitian Sosial dan Ekonomi, Teori dan Aplikasi. Bandung: Alfabeta.
SANS Institute InfoSec Reading Room. 2001. Defense in depth. United State:
Sugiyono. 2015. Metode Penelitian Kuantitatif, Kualitatif dan R&D. Bandung: Alfabeta.
Undang-Undang Republik Indonesia Nomor 14 tahun 2008, Bab IV Pasal 13 ayat 1 huruf a,
Yulianto, Beni. 2018. Awalnya Diserang Hacker, Katanya Sudah Bisa Diakses, Nyatanya Tak Bisa. Dalam http://lampung.tribunnews.com/2015/05/23/awalnya-diserang-hacker-katanya-sudah-bisa-diakses-nyatanya-tak-bisa
Unduhan
Diterbitkan
Cara Mengutip
Terbitan
Bagian
Lisensi
Proposed Policy for Journals That Offer Open Access. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.