INDONESIA FACING THE THREAT OF CYBER WARFARE: A STRATEGY ANALYSIS
(1) 
(2) 
(3) 
(*) Corresponding Author
Abstract
The threat of cyber warfare may disturb Indonesia's national interests. For this reason, efforts to create cyber defense forces are essential in dealing with the threat of cyberwar in this technological age. An effective strategy is needed to be carried out by the Government of Indonesia. This article analyzes the strategies implemented by the Government of Indonesia in dealing with the threat of cyber warfare. This study represents the use qualitative approach with an analytical descriptive design. The results of this study explain that the threat of cyber warfare in the future may have an impact that could shake the stability of national security. Through the National Cyber and Crypto Agency (Badan Siber dan Sandi Negara, BSSN) as the leading sector in handling national cyber problems, the Indonesian Government has taken strategic steps to safeguard the national interests and goals of the Indonesian nation and other state institutions stakeholders involved in the management of cyber security and defense. However, in practice, there are still several obstacles such as the unreadiness of regulation, quality, and quantity of human resources and technology infrastructure owned by Indonesia in dealing with any threats that can occur at any time.
Full Text:
PDFReferences
Anderson, N. (2007). Massive DDoS Attacks Target Estonia; Russia Accused. Retrieved October 15, 2021, from Information Technology website: https://arstechnica.com/information-technology/2007/05/massive-ddos-attacks-target-estonia-russia-accused/
Anggraeni, L. (2021). Pengguna Internet Indonesia Capai 202,6 Juta Orang. Retrieved October 15, 2021, from medcom.id website: https://www.medcom.id/teknologi/news-teknologi/yNL4R3qN-pengguna-internet-indonesia-capai-202-6-juta-orang
Arikunto, S. (2010). Prosedur Penelitian: Suatu Pendekatan Praktik. Jakarta: Rineka Cipta.
Athanassouli, K. (2018). Economic Implications of the Rise of Information Warfare, Cyber-War and Cyber-Security. In N. J. Daras (Ed.), Cyber Security and Information Warfare. New York: Nova.
Ayu, M. G. (2021). BSSN Tangani Ancaman Siber di Indonesia Bersama Quad Helix. Retrieved March 15, 2021, from Cloud Computing website: https://www.cloudcomputing.id/berita/bssn-tangani-ancaman-bersama-quad-helix
Badan Siber dan Sandi Negara. (2020). Laporan Tahunan Hasil Monitoring Keamanan Siber Tahun 2020. Retrieved October 15, 2021, from https://cloud.bssn.go.id/s/ZSdfebRTKW7p8nW#pdfviewer
BBC. (2019). Georgia Hit by Massive Cyber-Attack. Retrieved October 15, 2021, from BBC News website: https://www.bbc.com/news/technology-50207192
Brown, H., Guskin, E., & Mitchell, A. (2012). The Role of Social Media in the Arab Uprisings. Retrieved October 15, 2021, from Journalism website: https://www.pewresearch.org/journalism/2012/11/28/role-social-media-arab-uprisings/
Cichonsk, P., Millar, T., Grance, T., & Scarfone, K. (2012). Computer Security Incident Handling Guide (NIST Speci). National Institute of Standards and Technology.
CNN Indonesia. (2020). Serangan Siber 2020: Data Pasien Covid-19 RI Hingga KPU. Retrieved from cnnindonesia.com website: https://www.cnnindonesia.com/teknologi/20201223144145-185-585740/serangan-siber-2020-data-pasien-covid-19-ri-hingga-kpu
Electricity Information Sharing and Analysis Center. (2016). Analysis of the Cyber Attack on the Ukrainian Power Grid Defense Use Case. Washington, DC. Retrieved from https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2016/05/20081514/E-ISAC_SANS_Ukraine_DUC_5.pdf
Gray, C. S. (2013). Making Strategic Sense of Cyber Power: Why the Sky Is Not Falling. Carlisle: Strategic Studies Institute. Retrieved from https://press.armywarcollege.edu/monographs
Hart, B. H. L. (1967). Strategy: The Indirect Approach (4th ed.). London: Faber.
Kementerian Pertahanan Republik Indonesia. (2014). Pedoman Pertahanan Siber. Jakarta: Kemhan RI.
Kuehl, D. T. (2009). From Cyberspace to Cyberpower. In Cyberpower and Nation Security. Washington, DC: National Defense University. Retrieved from https://ndupress.ndu.edu/Media/News/Article/1216674/cyberpower-and-national-security/
Libicki, M. C. (2009). Cyberdeterrence and Cyberwar. Santa Monica: RAND Corporation. Retrieved from www.rand.org
McGuinness. Damien. (2017). How A Cyber Attack Transformed Estonia. Retrieved October 15, 2021, from News website: https://www.bbc.com/news/39655415
Moleong, L. J. (2018). Metodologi Penelitian Kualitatif. Bandung: PT. Remaja Rosdalarya.
Pusat Operasi Keamanan Siber Nasional. (2019). Indonesia Cyber Security Monitoring Report 2019. Retrieved from https://cloud.bssn.go.id/s/nM3mDzCkgycRx4S#pdfviewer
Rid, T. (2012). Cyber War Will Not Take Place. Journal of Strategic Studies, 35(1), 5–32. https://doi.org/10.1080/01402390.2011.608939
Riyanto, A. D. (2020). Hootsuite (We are Social): Indonesian Digital Report 2020. Retrieved October 15, 2021, from https://andi.link/hootsuite-we-are-social-indonesian-digital-report-2020/
Rofii, M. S. (2018). Antisipasi Perang Siber: Postur Ketahanan Nasional Indonesia Merespon Ancaman Perang Siber. Jurnal Kajian Stratejik Ketahanan Nasional, 1(2), 105–114. Retrieved from http://jurnalpkn.ui.ac.id/index.php/jkskn/article/view/10
Setyowati, D. (2020). Microsoft: Serangan Malware di Indonesia Tertinggi di Asia Pasifik. Retrieved October 16, 2021, from Digital website: https://katadata.co.id/desysetyowati/digital/5f76e3df376e1/microsoft-serangan-malware-di-indonesia-tertinggi-di-asia-pasifik
Singer, P. W., & Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. New York: Oxford University Press.
Smith, M. (2015). Research Handbook on International Law and Cyberspace. Massachusetts: Edwar Elgar Publishing Limited.
The United States Department of Justice. (2016). Chinese National Pleads Guilty to Conspiring to Hack into U.S. Defense Contractors’ Systems to Steal Sensitive Military Information. Retrieved October 16, 2021, from News website: https://www.justice.gov/opa/pr/chinese-national-pleads-guilty-conspiring-hack-us-defense-contractors-systems-steal-sensitive
DOI: https://doi.org/10.33172/jp.v7i3.1424
INDEXED BY:
Office Address:
Lembaga Penelitian dan Pengabdian Kepada Masyarakat
Republic of Indonesia Defense University
Jl. Salemba Raya No.14, Paseban,Jakarta Pusat, Daerah Khusus Ibukota Jakarta 10440, Indonesia
Email: jurnal.unhan@idu.ac.id
Jurnal Pertahanan: Media Informasi tentang Kajian dan Strategi Pertahanan yang Mengedepankan Identity, Nasionalism dan Integrity is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.