Tripartite Collaborative Institutions: Skema Konvergensi Institusi Untuk Mewujudkan Ketahanan Siber Indonesia

Authors

  • Fradhana Putra Disantara Universitas Jember

DOI:

https://doi.org/10.32332/istinbath.v18i2.3641

Keywords:

Cyberspace, Cyberattack, Convergence, Tripartite Colaboration

Abstract

Cybercrime is a crime that is carried out systematically to damage or destroy computer networks, and will automatically have an impact on important data stored on the computer network. This article is written using a normative legal research method, with data sources in the form of primary legal materials and secondary legal materials, understood using a conceptual approach and a statute approach, then the data is analyzed qualitatively through deductive thinking. From the results of the research, it is known that the weakness of technical and non-technical infrastructure related to the network and information systems of a country is one of the reasons of cyber crime. So we need a defense concept that can overcome these weaknesses. The concept of cyber defense with tripartite collaborative institutions can be used as an option to strengthen cyber defense. With a system of cooperation between the Ministry of Defense, Kominfo, and BSSN. The Ministry of Defense focuses on cyber threats from abroad, the Ministry of Communication and Information focuses on cyber threats from within the country, while BSNN focuses on coordination, prevention, and handling of cyber crimes.

Author Biography

  • Fradhana Putra Disantara, Universitas Jember

    Peneliti Pusat Kajian Hukum dan Pembangunan Universitas Negeri Surabaya

References

Alexander, Keith B., and Jamil N. Jaffer. “COVID-19 and the Cyber Challenge.” The Cyber Defense Review 6, no. 2 (2021): 17–28.
Aravindakshan, Sharngan. “Cyberattacks: A Look at Evidentiary Thresholds in International Law.” Indian Journal of International Law 59, no. 1–4 (February 17, 2021): 285–99. https://doi.org/10.1007/s40901-020-00113-0.
Association, Information Resources Management. Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications. 1st ed. Pennsylvania: IGI Global, 2019.
Baezner, Marie. “Cybersecurity in Switzerland: Challenges and the Way Forward for the Swiss Armed Forces.” Connections 19, no. 1 (2020): 63–72.
Biberman, Yelena. “The Technologies and International Politics of Genetic Warfare.” Strategic Studies Quarterly 15, no. 3 (2021): 6–33.
Brown, Steven David. “Hacking for Evidence: The Risks and Rewards of Deploying Malware in Pursuit of Justice.” ERA Forum 20, no. 3 (February 6, 2020): 423–38. https://doi.org/10.1007/s12027-019-00571-z.
Burdon, Mark. Digital Data Collection and Information Privacy Law. New York: Cambridge University Press, 2020.
Castro, Sergio. “Towards the Development of a Rationalist Cyber Conflict Theory.” The Cyber Defense Review 6, no. 1 (2021): 35–62.
Crettez, Bertrand, Bruno Deffains, and Olivier Musy. “On the Dynamics of Legal Convergence.” Public Choice 156, no. 1/2 (2013): 345–56.
Egloff, Florian J., and Max Smeets. “Publicly Attributing Cyber Attacks: A Framework.” Journal of Strategic Studies, March 10, 2021, 1–32. https://doi.org/10.1080/01402390.2021.1895117.
Erickson, Jeffrey M. “The Cyber Defense Review: Cybersecurity within a Pandemic Environment.” The Cyber Defense Review 6, no. 2 (2021): 9–14.
———. “The Cyber Defense Review: Looking Forward.” The Cyber Defense Review 6, no. 1 (2021): 9–16.
Friend, Catherine, Lorraine Bowman Grieve, Jennifer Kavanagh, and Marek Palace. “Fighting Cybercrime: A Review of the Irish Experience.” International Journal of Cyber Crimology 14, no. 2 (2020): 383–99. https://doi.org/10.5281/zenodo.4766527.
Grotto, Andrew J., and Martin Schallbruch. “Cybersecurity and the Risk Governance Triangle.” International Cybersecurity Law Review 2, no. 1 (June 24, 2021): 77–92. https://doi.org/10.1365/s43439-021-00016-9.
Hayashi, Nobuo. Military Necessity: The Art, Morality and Law of War. New York: Cambridge University Press, 2020.
Howard, Glen E., and Matthew Czekaj. Russia’s Military Strategy and Doctrine. Washington: Jamestown Foundation, 2019.
Katagiri, Nori. “Why International Law and Norms Do Little in Preventing Non-State Cyber Attacks.” Journal of Cybersecurity 7, no. 1 (February 16, 2021): 1–9. https://doi.org/10.1093/cybsec/tyab009.
Kumar, Monesh, and Puru Lekhi. “Cyber Security: An Emerging Role of Law in the Field of Cyber Crime.” National Journal of Cyber Security Law 4, no. 1 (2021): 26–35.
Kusumawardhani, Noer Qomariah. “Ancaman Siber Di Indonesia Meningkat.” republika.co.id, 2021. https://republika.co.id/berita/trendtek/internet/qxkbqh368/ancaman-siber-di-indonesia-meningkat.
Laptev, Vasiliy, and Vladimir Fedin. “Legal Awareness in a Digital Society.” Russian Law Journal 8, no. 1 (March 27, 2020): 138–57. https://doi.org/10.17589/2309-8678-2020-8-1-138-157.
Ly, Bora, and Romny Ly. “Cybersecurity in Unmanned Aerial Vehicles (UAVs).” Journal of Cyber Security Technology 5, no. 2 (April 3, 2021): 120–37. https://doi.org/10.1080/23742917.2020.1846307.
Marzuki, Peter Mahmud. Penelitian Hukum: Edisi Revisi. 13th ed. Jakarta: KENCANA, 2017.
Mattei, Ugo, and Luca G. Pes. Civil Law and Common Law: Toward Convergence? Oxford University Press, 2008. https://doi.org/10.1093/oxfordhb/9780199208425.003.0015.
Milanovic, Marko, and Michael N. Schmitt. “Cyber Attacks and Cyber (Mis)Information Operations During a Pandemic.” Journal of National Security Law & Policy (JNSLP) 11, no. 1 (2021): 247–82.
Narechania, Tejas N., and Erik Stallman. “Internet Federalism.” Harvard Journal of Law & Technology 34, no. 2 (2021): 548–618.
Omand, David. “Natural Hazards and National Security: The COVID-19 Lessons.” PRISM 9, no. 2 (2021): 1–19.
Oster, Jan. “Code Is Code and Law Is Law—the Law of Digitalization and the Digitalization of Law.” International Journal of Law and Information Technology 29, no. 2 (July 3, 2021): 101–17. https://doi.org/10.1093/ijlit/eaab004.
Pasaribu, Alviansyah. “BSSN Catat 741 Juta Kali Serangan Siber Periode Januari-Juli 2021.” antaranews.com, 2021. https://www.antaranews.com/berita/2347446/bssn-catat-741-juta-kali-serangan-siber-periode-januari-juli-2021.
Phillips, Peter J, and Gabriela Pohl. “Disinformation Cascades, Espionage & Counter-Intelligence.” The International Journal of Intelligence, Security, and Public Affairs 22, no. 2 (October 20, 2020): 1–14. https://doi.org/10.1080/23800992.2020.1834311.
Pokhrel, Nawa Raj, Netra Khanal, Chris P. Tsokos, and Keshav Pokhrel. “Cybersecurity: A Predictive Analytical Model for Software Vulnerability Discovery Process.” Journal of Cyber Security Technology 5, no. 1 (January 2, 2021): 41–69. https://doi.org/10.1080/23742917.2020.1816647.
Rahardjo, Satjipto. Hukum Progresif: Sebuah Sintesa Hukum Indonesia. Yogyakarta: Genta Publishing, 2009.
———. Membedah Hukum Progresif. Jakarta: Penerbit Buku Kompas, 2006.
———. Penegakan Hukum Progresif. Jakarta: Penerbit Buku Kompas, 2010.
Sihaloho, Markus Junianto. “Sertifikat Vaksinasi Jokowi Bocor, Pakar: Keamanan Siber Kita Lemah.” beritasatu.com, 2021. https://www.beritasatu.com/digital/822641/sertifikat-vaksinasi-jokowi-bocor-pakar-keamanan-siber-kita-lemah.
Sotto, Lisa J. Privacy and Cybersecurity Law Deskbook. 2021st ed. New York: Wolters Kluwer Law & Business, 2020.
Steingartner, William, Darko Galinec, and Andrija Kozina. “Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model.” Symmetry 13, no. 1 (2021): 1–25.
Younies, Hassan, and Tareq Na’el Al-Tawil. “Effect of Cybercrime Laws on Protecting Citizens and Businesses in the United Arab Emirates (UAE).” Journal of Financial Crime 27, no. 4 (May 25, 2020): 1089–1105. https://doi.org/10.1108/JFC-04-2020-0055.
Zhao, Bo. “Seeking Legal Boundaries of Digital Home in the IOT Age: A Conceptual Reflection.” European Journal of Law and Technology 12, no. 1 (2021): 1–29.

Published

2021-12-31

How to Cite

Tripartite Collaborative Institutions: Skema Konvergensi Institusi Untuk Mewujudkan Ketahanan Siber Indonesia. (2021). Istinbath : Jurnal Hukum, 18(2), 194-215. https://doi.org/10.32332/istinbath.v18i2.3641