Internet Eavesdropping: Information Security Challenge in the Cyberspace

Rudy Agus Gemilang Gultom

Abstract


In the era of information globalization the activity of information tapping over the Internet is one of the negative impacts of the interconnectivity between the Internet users and the ease of the process of exchanging data on the Internet. The disclosure of classified sensitive or confidential information or the loss of important documents is the result of information that is not well protected. Therefore, Internet users need to know more information about eavesdropping via the Internet to improve information security.

Full Text:

PDF

References


Badan Cyber Nasional. Plan To Establish BCN [National Cyber Agency]), http://nasional.kompas.com/read/2015/01/06/12550571/Presiden.Bahas.Pembentukan.Badan.Cyber.Nasional, downloaded on October 3rd 2017.

Baxter, P., & Jack, S. (2008). Qualitative case study methodology: Study design and implementation for novice researchers. The qualitative report, 13(4), 544-559.

Cyber Attacks: Technique, Tools, Motivation & Impact, downloaded on October 28th 2017.

Drew, D. M., & Snow, D. M. (2006). Making Twenty-First-Century Strategy. An Introduction to Modern National Security Processes and Problems. AIR UNIV PRESS MAXWELL AFB AL.

Election Commission Regulation No. 12/2016 on Campaign for Regional Head Election.

Government Regulation No. 53/2010 on Disciplinary Regulations for Civil State Employees.

Gultom, Rudy. (2003). “Tantangan Teknologi Informasi Dalam Perang Modern.” The Information Technology Challenge in Modern War, Kompas Newspaper, Monday, July 14th 2003.

Gultom, Rudy. (2015). “Development of the NIST Cybersecurity Framework”, Materials of Cyber Security Policy & Practice Course, The Naval Postgraduate School (NPS), Monterey, California, USA, May 2015.

Gultom, Rudy. (2015). “Cyber Conflict & Cyber Warfare,” Materials of Cyber Security Policy & Practice Course, The Naval Postgraduate School (NPS), Monterey, California, USA, May 2015.

Gultom, Rudy. (2015). “Cyber Intelligence Overview”, Materials of Cyber Security Policy & Practice Course, The Naval Postgraduate School (NPS), Monterey, California, USA, May 2015.

Gultom, Rudy. (2015). “Cyberspace as Global Domain,” Materials of Cyber Security For Information Leaders Course, The National Defense University (NDU), Washington, DC. USA, March 2015.

Gultom, Rudy. (2015). Presidential Executive Order 13636, on February 12th 2015, ”Improving Critical Infrastructure Cyber“ Materials of Cyber Security Policy & Practice Course, The Naval Postgraduate School (NPS), Monterey, California, USA, May 2015.

Gultom, Rudy. (2015). Presidential Policy Directive 21 (PPD-21) on 12 February 2015, ”Critical Infrastructure Security and Resilience”, Materials of Cyber Security Policy & Practice Course, The Naval Postgraduate School (NPS), Monterey, California, USA, May 2015.

Kompas. (2017). Alasan Pemerintah Bentuk Badan.Cyber.Nasional (Reasons for the Government to Form National Agency.Cyber), http://nasional.kompas.com/read/2015/01/06/15464401/Ini.Alasan.Pemerintah.Ingin.Bentuk.Badan.Cyber.Nasional, downloaded on October 3rd 2017.

Law No. 10/2016 on the Election of Governor, Regent / Mayor

Law No. 11/2008 on Electronic Transaction Information (ITE).

Law No. 14/2008 on Public Information Disclosure.

Law No. 23/2014 on Regional Government.

Law No. 3/2002 on State Defense.

Law No. 5/2014 on the State Civil Apparatus.

Lemhannas RI. (2014). Strategic Review on "Indonesia Readiness Strategy Facing ASEAN Community (2015). Ditjian Internasional Debidjianstrat Lemhannas RI,

National Institute of Standard and Technology. http://www.nist.gov/ downloaded on October 2nd 2017.

Paramadina Foundation. (2017). “Belajar dari Kasus Edward Snowden” (Learn from Edward SnowdenCase), http://paramadina.or.id/2015/04/20/belajar-dari-kasus-edward-snowden/, downloaded on November 12nd 2017.

Pemerintah RI mempercepat pembentukan Badan Siber Nasional di tahun 2017 (The Government of Indonesia has accelerated the formation of the National Cyber Agency in the year 2017), http://nasional.kompas.com/read/2017/01/03/18063511/pemerintah.percepat.pembentukan.badan.siber.nasional.pada.2017, downloaded on October 23rd 2017.

President Obama’s International Strategy for Cyberspace, “Prosperity, Security, and Openness in a Networked World”, May 2011,https://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf, downloaded on 3 November 2017.

Prof. Kevin P. Newmeyer, “Who Should Lead U.S. Cybersecurity Efforts?”, PRISM Magazine vol. 3, no. 2, The National Defense University (NDU), Washington, DC., USA, March 2015.

Russian hacking and the 2016 election: What you need to know http://edition.cnn.com/2016/12/12/politics/russian-hack-donald-trump-2016-election/, downloaded on March 17th 2017.

The Famous Cyber Attacks/Cyber Warfare in the World,” downloaded on August 20th 2017.

The Indonesian Constitution 1945.

The Tallinn Manual, "Tallinn Manual on the International Law Applicable to CyberWarfare",https://ccdcoe.org/tallinn-manual.html, downloaded on November 12nd 2017.

The US DoD, “Department of Defense Strategy for Operating in Cyberspace”, http://www.defense.gov/news/d20110714cyber.pdf, downloaded on October 27th 2017.

United Nations Convention on the Law of the Sea (UNCLOS) year 1982, downloaded on October 28th 2017.




Copyright (c) 2017 Jurnal Pertahanan

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

p-ISSN: 2087-9415

e-ISSN: 2549-9459