Evaluation of State Cryptographic Institutions
(1) Universitas Pertahanan Indonesia
(2) Universitas Pertahanan Indonesia
(*) Corresponding Author
Abstract
State cryptographic institutions, coordinated by the State Cryptography Agency have contribute to protect the state classified information from potential threats and vulnerabilities posed by information warfare, using the methods of cryptography. State Cryptography Agency, so that need the anticipatory efforts to reduce the inhibiting factors. The research was conducted using the qualitative research methods with descriptive analysis techniques. Based on this research, it is known that the role of State Cryptography Agency in facing the information warfare is more widely available in the defense/defensive effort to protect state information, as well as there are still some factors that cannot be minimized.
Keywords
Full Text:
PDFReferences
Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. computers & security. Vol. 32. pp. 90-101. DOI: http://dx.doi.org/10.1016/j.cose.2012.09.010
CERT ID. (2013). Report of the bi-month. Retrieved from http://www.cert.or.id.
Creswell, J. W. (2014). Research design: Qualitative, quantitative, and mixed methods approaches. California: SAGE Publications, Inc.
Ciampa, M. (2010). Security awareness: Applying practical security in your world. Boston: Cengage Learning.
Haeni, R. E. (1997). Information warfare: An introduction. Washington: Cyberspace Policy Institute, The George Washington University.
Hutchinson, B., and Warren, M. (2001). Information warfare: Corporate attack and defence in a digital world. Oxford: Butterworth Heinemann.
Krutz, R. L., and Vines, R. D. (2007). The CISSP® and CAPCM prep guide: Platinum edition, Indianapolis: Wiley Publishing, Inc.
Lembaga Sandi Negara. (2007). Jelajah Kriptologi. Jakarta: Lembaga Sandi Negara.
Libicki, M. C. (1996). What is information warfare? Washington: National Defense University.
McLeod, R., and Schell, G. P. (2004). Management information systems. New Jersey: Prentice Hall.
Peltier, T. R. (2014). Information security fundamentals. Boca Raton: CRC Press.
Schaeffer, R. C. (2010). CNSS instruction No. 4009: National Information Assurance (NIA) Glossary. Maryland: Committee on National Security Systems.
Thornton, R. (2011). Asymmetric warfare: Threat and response in the twenty-first century. Cambridge: Polity Press.
Thomas, T. (2014). Russia’s Information Warfare Strategy: Can the Nation Cope in Future Conflicts?. The Journal of Slavic Military Studies. Vol. 27 No. 1. pp. 101-130. DOI: 10.1080/13518046.2014.874845
Taddeo, M. (2012). Information warfare: A philosophical perspective. Philosophy & Technology. Vol. 25 No. 1. pp. 105-120.
Whitman, M. E. (2003). Communication of the ACM/Vol.46 No.8: Enemy at the Gate – Threats to Information Security. New York: Association for Computing Machinery.
Whitman, M. E., and Mattord, H. J. (2011). Principles of information security. Atlanta: Cengage Learning.
Wilson, C. (2007). Information operations, electronic warfare, and cyberwar: Capabilities and related policy issues. Washington: CRS.
DOI: https://doi.org/10.33172/jp.v1i2.61
INDEXED BY:
Office Address:
Lembaga Penelitian dan Pengabdian Kepada Masyarakat
Republic of Indonesia Defense University
Jl. Salemba Raya No.14, Paseban,Jakarta Pusat, Daerah Khusus Ibukota Jakarta 10440, Indonesia
Email: jurnal.unhan@idu.ac.id
Jurnal Pertahanan: Media Informasi tentang Kajian dan Strategi Pertahanan yang Mengedepankan Identity, Nasionalism dan Integrity is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.