United States National Strategy for Defending Vital Infrastructure from Cyberattacks
(1) University of Muhammadiyah Malang
(2) University of Muhammadiyah Malang
(*) Corresponding Author
Abstract
Keywords
Full Text:
PDFReferences
Alothaim, A., Hussain, S., & Al-Hadhrami, S. (2022). Analysis of Cybersecurities within Industrial Control Systems using Interval-Valued Complex Spherical Fuzzy Information. Computational Intelligence and Neuroscience, 2022. https://doi.org/10.1155/2022/3304333
Amin, M. E., & Huda, M. K. (2021). Harmonization of Cyber Crime laws with the Constitutional Law in Indonesia. International Journal of Cyber Criminology, 15(1), 79–94. https://cybercrimejournal.com/pdf/ijcc-6-2021.pdf
Benjamin, V., Zhang, B., Nunamaker, J. F., & Chen, H. (2016). Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities. Journal of Management Information Systems, 33(2), 482–510. https://doi.org/10.1080/07421222.2016.1205918
Burbidge, T. (2021). Cybercrime Thrives during Pandemic: Verizon 2021 Data Breach Investigations Report. Retrieved August 3, 2023, from Verizon website: https://www.verizon.com/about/news/verizon-2021-data-breach-investigations-report
Calix, R. A., Singh, S. B., Chen, T., Zhang, D., & Tu, M. (2020). Cyber Security Tool Kit (Cybersectk): a Python Library for Machine Learning and Cyber Security. Information (Switzerland), 11(2). https://doi.org/10.3390/info11020100
Charles, G. (2023). Election Law in the American Political System (3rd Edition). Los Angels: Aspen Publishing.
CNN Indonesia. (2023). FBI: Kejahatan Siber Meningkat 300 Persen Kala Pandemi Corona. Retrieved August 3, 2023, from CNN Indoensia website: https://www.cnnindonesia.com/teknologi/20200420185452-185-495401/fbi-kejahatan-siber-meningkat-300-persen-kala-pandemi-corona
Creemers, R. (2022). China’s Emerging Data Protection Framework. Journal of Cybersecurity, 8(1), 1–12. https://doi.org/10.1093/cybsec/tyac011
Creswell, J. W., & Poth, C. N. (2017). Qualitative Inquiry and Research Design and Mixed Methods Research. New York: Sage Publication, Inc.
Dasril. (2020). Pengantar Teknologi Informasi. Solok: CV Intan Cendekia.
Federal Bureau of Investigation. (2022). Internet Crime Report. Retrieved from https://www.ic3.gov/media/pdf/annualreport/2021_ic3report.pdf accessed on October 31, 2023.
Harianja, A., Arianto, A. R., & Setiawan, M. C. A. (2022). Implikasi Perang Siber antara Israel, Amerika Serikat dan Iran melalui Olimpic Game Operation terhadap Fasilitas Program Nuklir Iran pada Periode Pemerintahan Mahmoud Ahmadinejad: Perang Siber Stuxnet 2010. Moestopo Journal Of International Relation, 2(2), 91–117. Retrieved from https://journal.moestopo.ac.id/index.php/mjir/article/view/1895/1094
Hill, M., & Swinhoe. (2022). The 15 Biggest Data Breaches of the 21st Century. Retrieved from: https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html accessed on October 31, 2023
Horowitz, B. M. (2020). Cyberattack-Resilient Cyberphysical Systems. IEEE Security and Privacy, 18(1), 55–60. https://doi.org/10.1109/MSEC.2019.2947123
Justiari, M. P. J. (2019). AS Minati Investasi Keamanan Siber, Indonesia Masih Menimbang-nimbang. Retrieved August 16, 2023, from: https://www.kompas.id/baca/utama/2019/11/21/as-berminat-investasi-di-keamanan-siber-indonesia-masih-garap-aturan
Kandasamy, K., Srinivas, S., Achuthan, K., & Rangan, V. P. (2022). Digital Healthcare-Cyberattacks in Asian Organizations: An Analysis of Vulnerabilities, Risks, NIST Perspectives, and Recommendations. IEEE Access, 10, 12345–12364. https://doi.org/10.1109/access.2022.3145372
Purple Security. (2023). 2023 Cyber Security Statistics: The Ultimate List Of Stats, Data & Trends for 2023. Retrieved August 4, 2023, from Purple Security website: https://purplesec.us/resources/cyber-security-statistics/#Ransomware
Rawindaran, N., Jayal, A., & Prakash, E. (2022). Exploration of the Impact of Cybersecurity Awareness on Small and Medium Enterprises (SMEs) in Wales Using Intelligent Software to Combat Cybercrime. Computers, 11(12). https://doi.org/10.3390/computers11120174
Surfshark. (2023). Data breach monitoring. Retrieved August 3, 2023, from https://surfshark.com/research/data-breach-monitoring
Szczypiorski, K. (2020). Cyber(in)Security. International Journal of Electronics and Telecommunications, 66(1), 243–248. https://doi.org/10.24425/ijet.2020.131870
Tatarinova, L. F., Shakirov, K. N., & Tatarinov, D. V. (2016). Criminological Analysis of Determinants of Cybercrime Technologies. Mathematics Education, 11(5), 1127–1134. Retrieved from https://www.iejme.com/article/criminological-analysis-of-determinants-of-cybercrime-technologies
Temple, W. G., Wu, Y., Cheh, C., Li, Y., Chen, B., Kalbarczyk, Z. T., … Nicol, D. (2023). CyberSAGE: The Cyber Security Argument Graph Evaluation Tool. Empirical Software Engineering, 28(1). https://doi.org/10.1007/s10664-021-10056-8
Tenis, A. A. & Santhosh, R. (2022). Challenges and Security Issues of Online Social Networks (OSN). Notes on Data Engineering and Communications Technologies, 68, 703–709. Retrieved from https://www.semanticscholar.org/paper/Challenges-and-Security-Issues-of-Online-Social-Tenis-Santhosh/cd6f47cc532f6aafbd7e59935be4e22b795d84ca accessed on October 31, 2023.
The White House. Presidential Policy Directive--United States Cyber Incident Coordination. , Pub. L. No. Presidential Policy Directive/PPD-41, (2016). United States: https://obamawhitehouse.archives.gov/the-press-office/2016/07/26/presidential-policy-directive-united-states-cyber-incident.
Tongkachok, K., Apinawatawornkul, K., Promsaka, T., & Sakolnakorn, N. (2021). Legal Response in Thailand When Facing Cybercrime. Journal of Legal, Ethical and Regulatory Issues, 24(1), 1–6. Retrieved from https://www.abacademies.org/articles/legal-response-in-thailand-when-facing-cybercrime-10979.html
United States Census Bureau. (2023). U.S. Population Trends Return to Pre-Pandemic Norms as More States Gain Population. Retrieved August 3, 2023, from https://www.census.gov/newsroom/press-releases/2023/population-trends-return-to-pre-pandemic-norms.html
Wahid, A. A. (2020). Analisis Metode Waterfall Untuk Pengembangan Sistem Informasi. Jurnal Ilmu-Ilmu Informatika Dan Manajemen STMIK, (November), 1–5. Retrieved from https://www.researchgate.net/publication/346397070_analisis_metode_waterfall_untuk_pengembangan_sistem_informasi
West Java Regional Revenue Agency. (2017). Jenis Cybercrime Berdasarkan Motif dan Aktivitasnya. Retrieved August 15, 2023, from https://bapenda.jabarprov.go.id/2017/11/10/jenis-cybercrime-berdasarkan-motif-dan-aktivitasnya/ website: https://bapenda.jabarprov.go.id/2017/11/10/jenis-cybercrime-berdasarkan-motif-dan-aktivitasnya/
Widakuswara, P. (2023). US Launches Aggressive National Cybersecurity Strategy. Retrieved December 1, 2023, from VOA website: https://www.voanews.com/a/us-launches-aggressive-national-cybersecurity-strategy-/6986279.html
Yuvaraj, & Venkatanarayanan, S. (2019). Analysis of Cybercrime as the Object of a Criminal Investigation. Journal of Advanced Research in Dynamical and Control Systems, 11(4 Special Issue), 280–284. https://jardcs.org/abstract.php?id=502
DOI: https://doi.org/10.33172/jp.v9i3.16970
INDEXED BY:
Office Address:
Lembaga Penelitian dan Pengabdian Kepada Masyarakat
Republic of Indonesia Defense University
Jl. Salemba Raya No.14, Paseban,Jakarta Pusat, Daerah Khusus Ibukota Jakarta 10440, Indonesia
Email: jurnal.unhan@idu.ac.id
Jurnal Pertahanan: Media Informasi tentang Kajian dan Strategi Pertahanan yang Mengedepankan Identity, Nasionalism dan Integrity is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.