United States National Strategy for Defending Vital Infrastructure from Cyberattacks

Cepi Novia Tristantri(1*), Haryo Prasodjo(2),

(1) University of Muhammadiyah Malang
(2) University of Muhammadiyah Malang
(*) Corresponding Author


The expanding information and communication technology landscape has led to complex security challenges, marked by dynamic and evolving cyber threats including hacking, malware, phishing, data theft, fraud, and Distributed Denial of Service (DDoS). Notably, the United States has faced the highest incidence of cybercrime cases from 2017 to 2021, affecting 2.9 billion victims and resulting in a cumulative material loss of US$18.7 billion during this period. This research centers on the United States, acknowledged as the primary target for global cybercriminals, comprising 38% of cybercrime targets. This research aims to find out the strategic efforts of the United States in overcoming cybercrime that befell its country so that it becomes the best country in cases of alleviating and controlling cases of cyberattacks even though it is also the country with the highest cases of cyberattacks in the world. Utilizing a qualitative research method, the study demonstrates that the United States collaborates systematically and synergistically with state governments, employing a centralized approach to delegate specific tasks and authorities. The study concludes that the United States has implemented the National Cybersecurity Strategy (NCS) 2023 program, aiming to establish a strategic environment and ecosystem by maintaining vital infrastructure and centralized integration.


Cyber Security; Cyber Attack; Data Defense and Security;National Strategy; United States of America

Full Text:



Alothaim, A., Hussain, S., & Al-Hadhrami, S. (2022). Analysis of Cybersecurities within Industrial Control Systems using Interval-Valued Complex Spherical Fuzzy Information. Computational Intelligence and Neuroscience, 2022. https://doi.org/10.1155/2022/3304333

Amin, M. E., & Huda, M. K. (2021). Harmonization of Cyber Crime laws with the Constitutional Law in Indonesia. International Journal of Cyber Criminology, 15(1), 79–94. https://cybercrimejournal.com/pdf/ijcc-6-2021.pdf

Benjamin, V., Zhang, B., Nunamaker, J. F., & Chen, H. (2016). Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities. Journal of Management Information Systems, 33(2), 482–510. https://doi.org/10.1080/07421222.2016.1205918

Burbidge, T. (2021). Cybercrime Thrives during Pandemic: Verizon 2021 Data Breach Investigations Report. Retrieved August 3, 2023, from Verizon website: https://www.verizon.com/about/news/verizon-2021-data-breach-investigations-report

Calix, R. A., Singh, S. B., Chen, T., Zhang, D., & Tu, M. (2020). Cyber Security Tool Kit (Cybersectk): a Python Library for Machine Learning and Cyber Security. Information (Switzerland), 11(2). https://doi.org/10.3390/info11020100

Charles, G. (2023). Election Law in the American Political System (3rd Edition). Los Angels: Aspen Publishing.

CNN Indonesia. (2023). FBI: Kejahatan Siber Meningkat 300 Persen Kala Pandemi Corona. Retrieved August 3, 2023, from CNN Indoensia website: https://www.cnnindonesia.com/teknologi/20200420185452-185-495401/fbi-kejahatan-siber-meningkat-300-persen-kala-pandemi-corona

Creemers, R. (2022). China’s Emerging Data Protection Framework. Journal of Cybersecurity, 8(1), 1–12. https://doi.org/10.1093/cybsec/tyac011

Creswell, J. W., & Poth, C. N. (2017). Qualitative Inquiry and Research Design and Mixed Methods Research. New York: Sage Publication, Inc.

Dasril. (2020). Pengantar Teknologi Informasi. Solok: CV Intan Cendekia.

Federal Bureau of Investigation. (2022). Internet Crime Report. Retrieved from https://www.ic3.gov/media/pdf/annualreport/2021_ic3report.pdf accessed on October 31, 2023.

Harianja, A., Arianto, A. R., & Setiawan, M. C. A. (2022). Implikasi Perang Siber antara Israel, Amerika Serikat dan Iran melalui Olimpic Game Operation terhadap Fasilitas Program Nuklir Iran pada Periode Pemerintahan Mahmoud Ahmadinejad: Perang Siber Stuxnet 2010. Moestopo Journal Of International Relation, 2(2), 91–117. Retrieved from https://journal.moestopo.ac.id/index.php/mjir/article/view/1895/1094

Hill, M., & Swinhoe. (2022). The 15 Biggest Data Breaches of the 21st Century. Retrieved from: https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html accessed on October 31, 2023

Horowitz, B. M. (2020). Cyberattack-Resilient Cyberphysical Systems. IEEE Security and Privacy, 18(1), 55–60. https://doi.org/10.1109/MSEC.2019.2947123

Justiari, M. P. J. (2019). AS Minati Investasi Keamanan Siber, Indonesia Masih Menimbang-nimbang. Retrieved August 16, 2023, from: https://www.kompas.id/baca/utama/2019/11/21/as-berminat-investasi-di-keamanan-siber-indonesia-masih-garap-aturan

Kandasamy, K., Srinivas, S., Achuthan, K., & Rangan, V. P. (2022). Digital Healthcare-Cyberattacks in Asian Organizations: An Analysis of Vulnerabilities, Risks, NIST Perspectives, and Recommendations. IEEE Access, 10, 12345–12364. https://doi.org/10.1109/access.2022.3145372

Purple Security. (2023). 2023 Cyber Security Statistics: The Ultimate List Of Stats, Data & Trends for 2023. Retrieved August 4, 2023, from Purple Security website: https://purplesec.us/resources/cyber-security-statistics/#Ransomware

Rawindaran, N., Jayal, A., & Prakash, E. (2022). Exploration of the Impact of Cybersecurity Awareness on Small and Medium Enterprises (SMEs) in Wales Using Intelligent Software to Combat Cybercrime. Computers, 11(12). https://doi.org/10.3390/computers11120174

Surfshark. (2023). Data breach monitoring. Retrieved August 3, 2023, from https://surfshark.com/research/data-breach-monitoring

Szczypiorski, K. (2020). Cyber(in)Security. International Journal of Electronics and Telecommunications, 66(1), 243–248. https://doi.org/10.24425/ijet.2020.131870

Tatarinova, L. F., Shakirov, K. N., & Tatarinov, D. V. (2016). Criminological Analysis of Determinants of Cybercrime Technologies. Mathematics Education, 11(5), 1127–1134. Retrieved from https://www.iejme.com/article/criminological-analysis-of-determinants-of-cybercrime-technologies

Temple, W. G., Wu, Y., Cheh, C., Li, Y., Chen, B., Kalbarczyk, Z. T., … Nicol, D. (2023). CyberSAGE: The Cyber Security Argument Graph Evaluation Tool. Empirical Software Engineering, 28(1). https://doi.org/10.1007/s10664-021-10056-8

Tenis, A. A. & Santhosh, R. (2022). Challenges and Security Issues of Online Social Networks (OSN). Notes on Data Engineering and Communications Technologies, 68, 703–709. Retrieved from https://www.semanticscholar.org/paper/Challenges-and-Security-Issues-of-Online-Social-Tenis-Santhosh/cd6f47cc532f6aafbd7e59935be4e22b795d84ca accessed on October 31, 2023.

The White House. Presidential Policy Directive--United States Cyber Incident Coordination. , Pub. L. No. Presidential Policy Directive/PPD-41, (2016). United States: https://obamawhitehouse.archives.gov/the-press-office/2016/07/26/presidential-policy-directive-united-states-cyber-incident.

Tongkachok, K., Apinawatawornkul, K., Promsaka, T., & Sakolnakorn, N. (2021). Legal Response in Thailand When Facing Cybercrime. Journal of Legal, Ethical and Regulatory Issues, 24(1), 1–6. Retrieved from https://www.abacademies.org/articles/legal-response-in-thailand-when-facing-cybercrime-10979.html

United States Census Bureau. (2023). U.S. Population Trends Return to Pre-Pandemic Norms as More States Gain Population. Retrieved August 3, 2023, from https://www.census.gov/newsroom/press-releases/2023/population-trends-return-to-pre-pandemic-norms.html

Wahid, A. A. (2020). Analisis Metode Waterfall Untuk Pengembangan Sistem Informasi. Jurnal Ilmu-Ilmu Informatika Dan Manajemen STMIK, (November), 1–5. Retrieved from https://www.researchgate.net/publication/346397070_analisis_metode_waterfall_untuk_pengembangan_sistem_informasi

West Java Regional Revenue Agency. (2017). Jenis Cybercrime Berdasarkan Motif dan Aktivitasnya. Retrieved August 15, 2023, from https://bapenda.jabarprov.go.id/2017/11/10/jenis-cybercrime-berdasarkan-motif-dan-aktivitasnya/ website: https://bapenda.jabarprov.go.id/2017/11/10/jenis-cybercrime-berdasarkan-motif-dan-aktivitasnya/

Widakuswara, P. (2023). US Launches Aggressive National Cybersecurity Strategy. Retrieved December 1, 2023, from VOA website: https://www.voanews.com/a/us-launches-aggressive-national-cybersecurity-strategy-/6986279.html

Yuvaraj, & Venkatanarayanan, S. (2019). Analysis of Cybercrime as the Object of a Criminal Investigation. Journal of Advanced Research in Dynamical and Control Systems, 11(4 Special Issue), 280–284. https://jardcs.org/abstract.php?id=502

DOI: https://doi.org/10.33172/jp.v9i3.16970


Journal Terindex di Garuda


Lisensi Creative Commons
Jurnal Pertahanan is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.