Cyberterrorism Threats in Indonesia and State Responses
DOI:
https://doi.org/10.37010/lit.v2i2.92Keywords:
industrial revolution 4.0, cyberterrorism, IndonesiaAbstract
This article intend to elaborate the threats from cyberterrorism in Indonesia and the anticipation or response made by the state. That tactically, terrorist groups have made various changes and adjustments to launch a plan of terror action. When a target is deemed to be highly secure and difficult to penetrate, the terrorist group then carries out a series of tactical evolutions targeting more vulnerable targets. This praxis is shown in the practices of terrorism that have changed during the last hundred years until now it has adapted to a form of cyberterrorism. This research uses qualitative methods and types of phenomenology. The phenomenon of cyberterrorism is linked to the threat in Indonesia and the government's response to anticipating this problem. The research result shows that most of the terrorist groups in the world, including in Indonesia, have used cyber means to attack certain targets. In responding to cyberterrorism crimes, Indonesia has made several efforts to tackle cyberterrorism through the establishment of special agencies and strengthening regulations. However, there are still things that need to be addressed in order to strengthen the national security system from the threat of cyberterrorism.
Downloads
References
APJII. (2018). Buletin APJII edisi Maret 2018. Diakses dari https://apjii.or.id/downfile/file/BULETINAPJIIEDISI22Maret2018.pdf
Antara News. (2017). Pakar: Pertahanan Siber Indonesia Masih Lemah. Diakses dari https://jogja.antaranews.com/berita/351229/pakar-keamanan-siber-indonesia-masih-lemah
BSSN. (2018). Press Release Antisipasi Cyber Terrorism, BSSN Siap Sinergikan Pemangku Kepentingan Keamanan Siber di Asia Tenggara. Diakses dari https://bssn.go.id/wp-content/uploads/2018/11/PRESS-RELEASE_SRM-ON-CT-JAKARTA.pdf
Cambridge Centre for Risk Studies. (2017). Cyber Terrorism: Assessment of the Threat to Insurance; Cambridge Risk Framework series; Centre for Risk Studies, University of Cambridge. Diakses dari https://www.jbs.cam.ac.uk/fileadmin/user_upload/research/centres/risk/downloads/pool-re-cyber-terrorism.pdf
Colarik, A. M. (2006). Cyber Terrorism: Political and Economic Implications. London: Idea Group Publishing.
Goutam, R. K. (2015). Importance of Cybersecurity. International Journal of Computer Applications Vol. 111 (7). hlm. 14-17. Diakses dari https://pdfs.semanticscholar.org/5cfb/7a5bd2e6c181e8a69ebd49b1dadb795f493b.pdf
Hoffman, B. (2006). The Use of the Internet By Islamic Extremists: Testimony presented to the House Permanent Select Committee on Intelligence. Diakses dari https://www.rand.org/content/dam/rand/pubs/testimonies/2006/RAND_CT262-1.pdf
Internet World Stats. (2019). Top 20 Countries with the Highest Numbers of Internet Users. Diakses dari https://www.internetworldstats.com/top20.htm
Medium. (2018). Fintech and the 4th Industrial Revolution. Diakses dari https://medium.com/@alcormna/fintech-and-the-4th-industrial-revolution-b328088399dc
Merah Putih. (2019). Pertahanan Siber Indonesia Masih Lemah, Pengamat: Yang Dibahas Jokowi dan Prabowo Hanya Unicorn. Diakses dari https://merahputih.com/post/read/pertahanan-siber-indonesia-masih-lemah-pengamat-yang-di-bahas-jokowi-dan-prabowo-hanya-unicorn
National Initiative for Cybersecurity Careers and Studies. (2018). Explore Terms: A Glossary of Common Cybersecurity Terminology. Diakses dari https://niccs.us-cert.gov/about-niccs/glossary#cybersecurity
Rachmat, A. N. (2015). Keamanan Global: Transformasi Isu Keamanan Pasca-Perang Dingin. Bandung: Alfabeta
White House. (2018). National Cyber Strategy. Diakses dari https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
Zerzri, M. (2017). The Threat of Cyber Terrorism and Recommendations for Countermeasures. Diakses dari https://www.cap-lmu.de/download/2017/CAPerspectives-Tunisia-2017-04.pdf
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 I Putu Hadi Pradnyana, Muhammad Syaroni Rofii

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The copyright of the received article shall be assigned to the journal as the publisher of the journal. The intended copyright includes the right to publish the article in various forms (including reprints). The journal maintains the publishing rights to the published articles.
LITERATUS Journal is licensed under a Attribution-NonCommercial-NoDerivatives 4.0 International License