Digital Information Security Policy in the National Security Strategy

Authors

  • Asmadi Asmadi Universitas Tanjungpura
  • Hasan Almutahar Universitas Tanjungpura
  • Sukamto Sukamto Universitas Tanjungpura
  • Zulkarnaen Zulkarnaen Universitas Tanjungpura
  • Endang Indri Listiani Universitas Tanjungpura
  • Agus Sikwan Universitas Tanjungpura

DOI:

https://doi.org/10.59653/ijmars.v1i02.61

Keywords:

Digital information, Security, ITE Policy, National security, Strategy

Abstract

Security comes from the Latin word secure, significantly different from the dangers, fears, and threats associated with traditional and non-traditional security methods. Meanwhile, defense is defined as the most vital technology for the state in carrying out its national security function. National security is defined as the dynamic state of a country which covers all aspects of the nation's life in facing threats. National security includes protection for the state, society, and individuals. Until now, experts have provided several different definitions of the terms security and defense. This article analyzes the current digital information security threats in national security strategies and the implementation of adequate legal protections. This article applies a descriptive qualitative research approach by conducting document analysis. This article describes various information security threats in Indonesia, including disinformation, privilege escalation, and protection against phishing threats, data forgery, and card crime. The similarities and differences between the concepts of defense and security can be observed through regulations, the terminology used, institutions, and constitutions. This article shows that national information security is closely related to policy and closely relates to security, especially ITE policies. It cannot be separated that the security situation of a country depends on security and defense but synergistically with other factors, namely economic, political, legal, socio-cultural, ideological, geographical, and demographic.

Downloads

Download data is not yet available.

References

Aji, M. P. (2022). Sistem Keamanan Siber dan Kedaulatan Data Di Indonesia Dalam Perspektif Ekonomi Politik (Studi Kasus Perlindungan Data Pribadi). 222-238.

Astriani, D. R., & Rofii, M. S. (2021). Siber Intelejen Untuk Keamanan Nasional. Jurnal Renaissance, 703-709.

Al Jum'ah, N. M. (2018). Analisa Keamanan dan Hukum Untuk Perlindungan Data Privasi. II(1), 39-44.

Babys, S. A. (2021). Ancaman Perang Siber DI Era Digital dan Solusi Keamanan Nasional Indonesia. Journal Oratio Directa, 425-442.

Chotimah , H. C. (2019). Tata Kelola Keamanan Siber dan Diplomasi Siber Indonesia Di Bawah Kelembagaan Badan Siber dan Sandi Negara. Politica, 113-128. doi:https://doi.org/10.22212/jp.v10i1.1447

Dammann, O. (2018). Data, Informasi, Bukti, dan Pengetahuan : Proposal Untuk Informatika Kesehatan dan Ilmu Data. Jurnal Online Informatika Kesehatan Masyarakat.

Gulo, A. S., & Nawawi, S. L. (2020). Cyber Crime Dalam Bentuk Phising Berdasarkan Undang-Undang Informasi dan Transaksi Elektronik. Pampas Journal Of Crime , 68-81.

Islami, M. J. (2017). Tantangan Dalam Implementasi Strategi Keamanan Siber Nasional Indonesia Ditinjau Dari Penilaian Global Cybersecurity Indeks. 137-144.

Kornelius, Mahmudah, S., & Priyono, E. A. (2019). Perlindungan Hukum Terhadap Keamanan Data Konsumen Financial Technology Di Indonesia. Refleksi Hukum, 145-160

Kurniawan , N. A. (2014). Pencegahan Kejahatan Carding Sebagai Kejahatan Transnasional Menurut Hukum Internasional . 1-14.Munawar, Z., & Putri, NI (2020). Computer Network Security in the Big Data Era. 14-20.

Kusumoningtyas, A. A., & Puspitasari. (2020). Dilema Hak Perlindungan Data Pribadi dan Pengawasan Siber : Tantangan Di Masa Depan . 234-

Mardhani, D., Runturambi, A. J., & Hanita , M. (2020). Keamanan dan Pertahanan Dalam Studi Ketahanan Nasional Guna Mewujudkan Sistem Keamanan Nasional . 279-297

Munawar , Z., & Putri , N. I. (2020). Keamanan Jaringan Komputer Pada Era Big Data . 14-20.

Nugroho, I. I., Pratiwi, R., & Zahro, S. R. (2021). Optimalisasi Penanggulangan Kebocoran Data Melalui Regulatory Blockchain Guna Mewujudkan Keamanan Siber Di Indonesia. Iphmi Policy Journal, II(1), 115-129. doi:https://doi.org/10.15294/iphmhi.v1i2.53270

Nurpatria , B., & Ras , A. R. (2022). UU ITE : Kebebasan Berpendapat, Informasi Hoax Terhadap Ancaman Stabilitas Ketahanan Nasional. Jurnal Pendidikan Tambusai, II(6), 10220-10229

Purwantoro, S. A., Syahardani, R., Hermawan , E., & Damindarti , A. K. (2021). Media Sosial : Peran dan Kiprah Dalam Pengembangan Wawasan Kebangsaan. Jurnal Lembaga Ketahanan Nasional Republik Indonesia, IV(9), 55-79.

Radiansyah, I., Candiawan , & Priyadi, Y. (2016). Analisis Ancaman Phising Dalam Layanan Online Banking . 1-20.

Rahmatullah , I. (2021). Pentingnya Perlindungan Data Pribadi Dalam Masa Pandemi Covid-19 Di Indonesia . 11-16.

Rifauddin , M., & Halida , A. N. (2018). Waspada Cybercrime dan Informasi Hoax Pada Media Sosial Facebook. Jurnal Perpustakaan, Informasi, dan Kearsipan, 98-111. doi:https://doi.org/10.2452/kah.v6i2a2.

Rohmy, A. M., Suratman , T., & NIhayaty, A. I. (2021). UU ITE Dalam Perspektif Perkembangan Teknologi Informasi dan Komunikasi. Jurnal Dakwah dan Komunikasi Islam (7), 309-339.

Sebuah Kajian Undang-Undang Informasi dan Transaksi Elektronik (UU ITE). (2011). JEAM, X(1), 43-48.

Sidik, S. (2013). Dampak Undang-Undang Informasi dan Transaksi Elektronik (UU ITE) Terhadap Perubahan Hukum dan Sosial Dalam Masyarakat. Jurnal Ilmiah WIDYA, 1-7.

Syed, R., Khawer , A. A., & Yasin , M. (2019). Cyber Security. 1-3. Diambil kembali dari https://www.jstor.org/stable/resrep24376.5

Downloads

Published

2023-05-31

How to Cite

Asmadi, A., Almutahar, H., Sukamto, S., Zulkarnaen, Z., Listiani, E. I., & Sikwan, A. (2023). Digital Information Security Policy in the National Security Strategy. International Journal of Multidisciplinary Approach Research and Science, 1(02), 96–103. https://doi.org/10.59653/ijmars.v1i02.61