Digital Information Security Policy in the National Security Strategy
DOI:
https://doi.org/10.59653/ijmars.v1i02.61Keywords:
Digital information, Security, ITE Policy, National security, StrategyAbstract
Security comes from the Latin word secure, significantly different from the dangers, fears, and threats associated with traditional and non-traditional security methods. Meanwhile, defense is defined as the most vital technology for the state in carrying out its national security function. National security is defined as the dynamic state of a country which covers all aspects of the nation's life in facing threats. National security includes protection for the state, society, and individuals. Until now, experts have provided several different definitions of the terms security and defense. This article analyzes the current digital information security threats in national security strategies and the implementation of adequate legal protections. This article applies a descriptive qualitative research approach by conducting document analysis. This article describes various information security threats in Indonesia, including disinformation, privilege escalation, and protection against phishing threats, data forgery, and card crime. The similarities and differences between the concepts of defense and security can be observed through regulations, the terminology used, institutions, and constitutions. This article shows that national information security is closely related to policy and closely relates to security, especially ITE policies. It cannot be separated that the security situation of a country depends on security and defense but synergistically with other factors, namely economic, political, legal, socio-cultural, ideological, geographical, and demographic.
Downloads
References
Aji, M. P. (2022). Sistem Keamanan Siber dan Kedaulatan Data Di Indonesia Dalam Perspektif Ekonomi Politik (Studi Kasus Perlindungan Data Pribadi). 222-238.
Astriani, D. R., & Rofii, M. S. (2021). Siber Intelejen Untuk Keamanan Nasional. Jurnal Renaissance, 703-709.
Al Jum'ah, N. M. (2018). Analisa Keamanan dan Hukum Untuk Perlindungan Data Privasi. II(1), 39-44.
Babys, S. A. (2021). Ancaman Perang Siber DI Era Digital dan Solusi Keamanan Nasional Indonesia. Journal Oratio Directa, 425-442.
Chotimah , H. C. (2019). Tata Kelola Keamanan Siber dan Diplomasi Siber Indonesia Di Bawah Kelembagaan Badan Siber dan Sandi Negara. Politica, 113-128. doi:https://doi.org/10.22212/jp.v10i1.1447
Dammann, O. (2018). Data, Informasi, Bukti, dan Pengetahuan : Proposal Untuk Informatika Kesehatan dan Ilmu Data. Jurnal Online Informatika Kesehatan Masyarakat.
Gulo, A. S., & Nawawi, S. L. (2020). Cyber Crime Dalam Bentuk Phising Berdasarkan Undang-Undang Informasi dan Transaksi Elektronik. Pampas Journal Of Crime , 68-81.
Islami, M. J. (2017). Tantangan Dalam Implementasi Strategi Keamanan Siber Nasional Indonesia Ditinjau Dari Penilaian Global Cybersecurity Indeks. 137-144.
Kornelius, Mahmudah, S., & Priyono, E. A. (2019). Perlindungan Hukum Terhadap Keamanan Data Konsumen Financial Technology Di Indonesia. Refleksi Hukum, 145-160
Kurniawan , N. A. (2014). Pencegahan Kejahatan Carding Sebagai Kejahatan Transnasional Menurut Hukum Internasional . 1-14.Munawar, Z., & Putri, NI (2020). Computer Network Security in the Big Data Era. 14-20.
Kusumoningtyas, A. A., & Puspitasari. (2020). Dilema Hak Perlindungan Data Pribadi dan Pengawasan Siber : Tantangan Di Masa Depan . 234-
Mardhani, D., Runturambi, A. J., & Hanita , M. (2020). Keamanan dan Pertahanan Dalam Studi Ketahanan Nasional Guna Mewujudkan Sistem Keamanan Nasional . 279-297
Munawar , Z., & Putri , N. I. (2020). Keamanan Jaringan Komputer Pada Era Big Data . 14-20.
Nugroho, I. I., Pratiwi, R., & Zahro, S. R. (2021). Optimalisasi Penanggulangan Kebocoran Data Melalui Regulatory Blockchain Guna Mewujudkan Keamanan Siber Di Indonesia. Iphmi Policy Journal, II(1), 115-129. doi:https://doi.org/10.15294/iphmhi.v1i2.53270
Nurpatria , B., & Ras , A. R. (2022). UU ITE : Kebebasan Berpendapat, Informasi Hoax Terhadap Ancaman Stabilitas Ketahanan Nasional. Jurnal Pendidikan Tambusai, II(6), 10220-10229
Purwantoro, S. A., Syahardani, R., Hermawan , E., & Damindarti , A. K. (2021). Media Sosial : Peran dan Kiprah Dalam Pengembangan Wawasan Kebangsaan. Jurnal Lembaga Ketahanan Nasional Republik Indonesia, IV(9), 55-79.
Radiansyah, I., Candiawan , & Priyadi, Y. (2016). Analisis Ancaman Phising Dalam Layanan Online Banking . 1-20.
Rahmatullah , I. (2021). Pentingnya Perlindungan Data Pribadi Dalam Masa Pandemi Covid-19 Di Indonesia . 11-16.
Rifauddin , M., & Halida , A. N. (2018). Waspada Cybercrime dan Informasi Hoax Pada Media Sosial Facebook. Jurnal Perpustakaan, Informasi, dan Kearsipan, 98-111. doi:https://doi.org/10.2452/kah.v6i2a2.
Rohmy, A. M., Suratman , T., & NIhayaty, A. I. (2021). UU ITE Dalam Perspektif Perkembangan Teknologi Informasi dan Komunikasi. Jurnal Dakwah dan Komunikasi Islam (7), 309-339.
Sebuah Kajian Undang-Undang Informasi dan Transaksi Elektronik (UU ITE). (2011). JEAM, X(1), 43-48.
Sidik, S. (2013). Dampak Undang-Undang Informasi dan Transaksi Elektronik (UU ITE) Terhadap Perubahan Hukum dan Sosial Dalam Masyarakat. Jurnal Ilmiah WIDYA, 1-7.
Syed, R., Khawer , A. A., & Yasin , M. (2019). Cyber Security. 1-3. Diambil kembali dari https://www.jstor.org/stable/resrep24376.5
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2023 Asmadi Asmadi, Hasan Almutahar, Sukamto Sukamto, Zulkarnaen Zulkarnaen, Endang Indri Listiani, Agus Sikwan

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).