KESIAPAN OEPRSI CYBER WARFARE MARKAS BESAR TNI ANGKATAN DARAT 2018

Authors

  • Bambang Prasetyo Universitas Pertahanan RI

DOI:

https://doi.org/10.33172/jspd.v8i2.1530

Abstract

The rapid development of information and communication technology has implications for the development of cyber life and has opened doors for those intent on achieving criminal aims. Namely, identity theft, cyber blackmail, fraud, data leakage and numbers of cyber crime that in fact they can be so expansive where could harm entire nations.1 Thus, cyber security measures play important role in restraining cyber threats. Indonesian Armed Forces is an military organization whose plays role in constructing sustainable cyber security. It is associated to the effort to protect various national defense entities related to fast response towards threats landscape. This makes the importanc of the readiness of the Indonesian Armed Forces Headquartes Operations in dealing with cyber warfare. This research was conducted to analyze the development of cyber warfare in the Indonesian Armed Forces (2018), the level of readiness of operations of the Indonesian Armed Forces Headquarters in dealing with cyber warfare and the formulation of strategies in improving the readiness operations of the Indonesian Armed Forces Headquarters in dealing with cyber warfare. In order to achieve those objectives, this research was conducted using qualitative methodes with data collection technique of obeservation, related documents review and in-depth interviews. The results of the study found that the development of information and communication technology had the implications on the increasingly massive cyber warfare in Indonesian Armed Forces, specifically the efforts of groups or organizations or countries to collect information, vandalism and sabotage. In addition, the readiness of the Indonesian Armed Forces Headquarters operation in dealing with cyber warfare is divided into two, namely offensive readiness and defensive readiness. Defensive readiness related to how Operations Staff conduct the internet security, ICT security, information security, while offensive readiness is related to digital security such as counter attacks. As for the readiness of the Indonesian Army Headquarters Operations, there are still problems with the limited bbudget, infrastructure and human resources. The strategy to improve readiness is to conduct a comprehensive evaluation of readiness. While the strategy in budgets facet is by setting priority scale according to operating needs. The infrastructure strategy is to procure in stages with measuring software and hardware independence in cyber warfare..

References

Buku

Arikunto, Suharasimi. 2001. Dasar-Dasar Evaluasi Pendidikan (edisi revisi). Jakarta: Bumi Aksara.

Badri, Muhammad. 2012. Perang Cyber dalam Dinamika Komunikasi Internasional. Pekanbaru: Universitas Islam Riau.

Cornish, David Livingstone, Clemente, Dave & Yorke, Claire. On Cyber Warfare. 2010. London: The Royal Institute of International Affairs.

Hadi Irandoost, Deniele. 2018 Cybersecurity: A National Security Issue?. EInternational Relations.

Iwan. 2012. Kajian Strategi Keamanan Cyber Nasional: Dalam Rangka Meningkatkan Ketahanan Nasional di Bidang Keamanan Cyber. Jakarta Universitas Pertahanan Indonesia.

Rheingold, H.. 2012. New Smart: How to Thrive Online. Cambridge: The Mit Press.

Salahuddien, M.. 2011. Pertahanan Keamanan Informasi Nasional. Indonesia Security Incident Response Team on Internet Infrastructure.

Sergei, Caitriona & Matthijs. 2015. Civil-Military Relations and International Military Cooperation in Cyber Security: common Challenges & State Practices Across Asia and Europe. Tallinn: NATO OCS COE Publication.

Slameto. 2010. Belajar dan Faktor yang Mempengaruhinya. Jakarta: Rineka Cipta

Yusnawati. 2007. Perencanaan Pengajaran Berdasarkan Pendekatan Sistem. Jakarta:Bumi Aksara.

Jurnal

Ameli, Saied Reza. 2007. “Dual Spacization of Cultures: Problematization of Cyberspace and Cultural Matters”, Journal of Cyberspace Policy Studies, Vol. 1, No. 1, Januari.

Ammar, Faruq & Usman. 2014. “Penyusunan Strategi dan Strategi Operasi Usaha Kecil dan Menengah pada Perusahaan Konveksi Scissors di Surabaya”, Jurnal Manajemen Teori dan Terapan Tahun 7, No. 3.

Cijic. 2016 .“Cyberlaw”, Revista Cyberlaw,No. 1.

Galinec, Darko & Guberina, Boris, 2017. “Cybersecurity and Cyber Defence: National Level Strategic Approach”, Journal of Control, Measurement, Electronics, Computing and Communications, Vol. 58, No. 3.

Hruza & Cerny. 2017. “Cyber Warfare”, International Conference Knowledge-Based Organization, Vil. XXIII, No. 1.

Jeffrey W., Meiser. 2017. “Are Our Strategic Models Flawed? Ends + Ways + Means = (Bad) Strategy”, Journal Parameters, Vol. 46, No. 4.

Permanasari. 2018. “Terorisme Siber, Perang Siber & Hukum Humaniter: Tantangan Bagi Kerangka Hukum Indonesia tentang Pertahanan Siber”, Tri Jurnal, Vol. 1.

Robinson, Kevin Jones & Janicke, Helge. 2015. “Cyber Warfare: Issues and Challenges”, Journal of Computers and Security, Vol. 8.

Sa’diyah & Vinata. 2016. “Rekonstruksi Pembentukan National Cyber Defense sebagai Upaya Mempertahankan Kedaulatan Negara.”, Jurnal Perspektif, Vol. 21, No. 3.

Thomposon, L. & Nadler, J. 2002. “Negotiatioing via Information Technology: Theory and Application”, Journal of Social Issues, Vol. 58, No. 1.

Website

Hugh Taylor. 18 Desember 2018. What is Cyber Security. Diakses di:https://preyproject.com/blog/en/what-is-cyber-security/ (diakses pada 13/02/2020)

Hugh Taylor. 22 Januari 2020. What are Cyber Threats and What To Do about Them. Diakses di: https://preyproject.com/blog/en/what-are-cyber-threats-howthey-affect-you-what-to-do-about-them/ (diakses pada 13/02/2020)

The New York Times. 29 May 2009. Text: Obama’s Remarks on Cyber-Security. Diakses di:https://www.nytimes.com/2009/05/29/us/politics/29obama.text.html (diakses pada 13/02/2020)

Downloads

Published

2022-12-31

How to Cite

Prasetyo, B. (2022). KESIAPAN OEPRSI CYBER WARFARE MARKAS BESAR TNI ANGKATAN DARAT 2018. Strategi Pertahanan Darat (JSPD), 8(2), 72–100. https://doi.org/10.33172/jspd.v8i2.1530