Membangun Ketahanan Digital: Pengembangan Model Strategi Pertahanan Siber Berbasis Manajemen Risiko

Andi Sutomo, Suyono Thamrin, Pujo Widodo, Yono Reksoprodjo

Abstract


Penelitian ini bertujuan untuk mengembangkan model strategi pertahanan siber berbasis manajemen risiko guna meningkatkan ketahanan nasional terhadap ancaman siber yang semakin kompleks. Penelitian menggunakan pendekatan kualitatif dengan teknik pengumpulan data melalui studi pustaka dan analisis data berbantuan perangkat lunak NVivo 12 Pro untuk mengorganisasikan, mengkoding, dan menganalisis data secara tematik. Hasil penelitian menunjukkan bahwa model strategi pertahanan siber berbasis manajemen risiko mencakup tahapan perencanaan, pengorganisasian, pelaksanaan, dan evaluasi secara terintegrasi untuk menghadapi berbagai ancaman siber. Model ini juga menyoroti pentingnya kerja sama lintas sektor dan peran diplomasi siber dalam menjaga stabilitas keamanan nasional. Penelitian ini memberikan kontribusi berupa kerangka kerja strategis berbasis manajemen risiko yang dapat menjadi acuan dalam pengembangan kebijakan pertahanan siber nasional dan peningkatan posisi Indonesia dalam keamanan informasi global.

Keywords


pertahanan siber, manajemen risiko, keamanan informasi, strategi nasional, NVivo

Full Text:

PDF

References


Agrafiotis, I., Nurse, J. R. C., Goldsmith, M., Creese, S., & Upton, D. (2018). A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, 4(1), tyy006.

Al-Dosari, K., Fetais, N., & Kucukvar, M. (2024). Artificial intelligence and cyber defense system for banking industry: A qualitative study of AI applications and challenges. Cybernetics and Systems, 55(2), 302–330.

Arianto, A. R., & Anggraini, dan G. (2019). Membangun Pertahanan Dan Keamanan Siber Nasional Indonesia Guna Menghadapi Ancaman Siber Global Melalui Indonesia Security Incident Response Team On Internet Infrastructure (ID-SIRTII). Jurnal Pertahanan & Bela Negara, 9(1), 13–30.

Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333.

Bahri, I. S. (2023). Cyber Crime dalam Sorotan Hukum Pidana (Edisi 2023). Bahasa Rakyat.

Bardin, J. S. (2025). Cyber Warfare. In Computer and Information Security Handbook (pp. 1345–1380). Elsevier.

Bécue, A., Praça, I., & Gama, J. (2021). Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities. Artificial Intelligence Review, 54(5), 3849–3886.

Bradshaw, T. K., & Blakely, E. J. (2002). Planning Local Economic Development: Theory and Practice. Sage Publications.

Broeders, D. (2021). Private active cyber defense and (international) cyber security—pushing the line? Journal of Cybersecurity, 7(1), tyab010.

Bruggemann, R., Koppatz, P., Scholl, M., & Schuktomow, R. (2022). Global cybersecurity index (GCI) and the role of its 5 pillars. Social Indicators Research, 1–19.

Cebula, J. J., Popeck, M. E., & Young, L. R. (2014). A taxonomy of operational cyber security risks version 2. Software Engineering Institute, Carnegie Mellon Univ., Pittsburgh, PA, Tech. Rep. CMU/SEI-2014-TN-006.

Cebula, J. J., & Young, L. R. (2010). A taxonomy of operational cyber security risks. Software Engineering Institute, Carnegie Mellon University.

CNN Indonesia. (2024a). SAFEnet: Serangan Siber Naik Dua Kali Lipat di Awal 2024. CNN Indonesia. https://www.cnnindonesia.com/teknologi/20240509092409-192-1095674/safenet-serangan-siber-naik-dua-kali-lipat-di-awal-2024

CNN Indonesia. (2024b). Serangan Siber Menggila, 411 Ribu Malware Baru Muncul Tiap Hari di RI. CNN Indonesia. https://www.cnnindonesia.com/teknologi/20240522130109-185-1100872/serangan-siber-menggila-411-ribu-malware-baru-muncul-tiap-hari-di-ri

Cui, L., Guo, L., Gao, L., Cai, B., Qu, Y., Zhou, Y., & Yu, S. (2021). A covert electricity-theft cyberattack against machine learning-based detection models. IEEE Transactions on Industrial Informatics, 18(11), 7824–7833.

Davis, R. E. (2021). Auditing Information and Cyber Security Governance: A Controls-based Approach. CRC Press.

Ding, S., Gu, W., Lu, S., Yu, R., & Sheng, L. (2022). Cyber-attack against heating system in integrated energy systems: Model and propagation mechanism. Applied Energy, 311, 118650.

Dirgantara, N. C., Maharani, Y., Nada, R. Q., & Hidayatullah, A. F. (2024). Ecological Justice for Timbulsloko: A Disaster Jurisprudence Approach. TEMALI: Jurnal Pembangunan Sosial, 7(1), 57–64.

Gurtu, A., & Johny, J. (2021). Supply chain risk management: Literature review. Risks, 9(1), 16.

Hunger, J. (2010). Essentials of Strategic Management. Pearson.

Husák, M., Bartoš, V., Sokol, P., & Gajdoš, A. (2021). Predictive methods in cyber defense: Current experience and research challenges. Future Generation Computer Systems, 115, 517–530.

Iftikhar, S. (2024). Cyberterrorism as a global threat: a review on repercussions and countermeasures. PeerJ Computer Science, 10, e1772.

Jacks, W., & Adler, J. (2015). A proposed typology of online hate crime. Open Access Journal of Forensic Psychology, 7, 64–89.

Javier, F. (2024). Serangan Siber ke Pusat Data Nasional hingga Kebocoran Data Berbagai Lembaga, Bagaimana Kinerja Indonesia dalam Keamanan Siber? Tempo.Co. https://www.tempo.co/data/data/serangan-siber-ke-pusat-data-nasional-hingga-kebocoran-data-berbagai-lembaga-bagaimana-kinerja-indonesia-dalam-keamanan-siber--991201

Kalangi, D., & Tewu, M. L. (2022). Problem Loans in Banks and Implementation of Good Corporate Governance (GCG). Budapest International Research and Critics Institute-Journal (BIRCI-Journal), 5(3), 24430–24443.

Kao, D.-Y., & Hsiao, S.-C. (2018). The dynamic analysis of WannaCry ransomware. 2018 20th International Conference on Advanced Communication Technology (ICACT), 159–166.

Kementerian Komunikasi dan Informatika RI. (2007). Peraturan Menteri Komunikasi dan Informatika Nomor 26/PER/M.KOMINFO/5/2007 tentang Pengamanan Pemanfaatan Jaringan Telekomunikasi Berbasis Protokol Internet. Kementerian Komunikasi dan Informatika RI.

Kementerian Komunikasi dan Informatika RI. (2010). Peraturan Menteri Komunikasi dan Informatika Nomor 29/PER/M.KOMINFO/12/2010 tentang Perubahan Kedua atas Peraturan Menteri komunikasi dan Informatika Nomor: 26/PER/M.KOMINFO/5/2007 tentang Pengamanan Pemanfaatan Jaringan Telekomunikasi Berbasis Protokol I. Kementerian Komunikasi dan Informatika RI. https://jdih.kominfo.go.id/produk_hukum/view/id/271/t/peraturan+menteri+komunikasi+dan+informatika+nomor+29permkominfo122010+tanggal+30+desember+2010

Kementerian Pertahanan RI. (2019). Pusdatin Kemhan Harus Siap dan Mampu Tangkal Serangan Siber. Kementerian Pertahanan RI. https://www.kemhan.go.id/2019/05/17/pusdatin-kemhan-harus-siap-dan-mampu-tangkal-serangan-siber.html

Kementerian Pertahanan RI. (2024). Pedoman Pertahanan Siber. Kementerian Pertahanan RI.

Krisnata, R., Reksoprodjo, A. H. S., & Waluyo, S. D. (2020). Strategi Pengembangan Kapabilitas Siber Pertahanan Untuk Menghadapi Peperangan Siber (Studi Kasus Pada Pushansiber Kemhan Ri 2020-2021). Nusantara: Jurnal Ilmu Pengetahuan Sosial, 9(6), 2094–2103. https://doi.org/10.31604/jips.v9i6.2022.2094-2103

Lee, S., & Kim, S. (2021). Blockchain as a cyber defense: opportunities, applications, and challenges. Ieee Access, 10, 2602–2618.

Lehto, M. (2022). Cyber-attacks against critical infrastructure. In Cyber security: Critical infrastructure protection (pp. 3–42). Springer.

Lindsay, J. R. (2021). Cyber espionage. The Oxford Handbook of Cyber Security, 223.

Lune, H., & Berg, B. L. (2017). Qualitative research methods for the social sciences. Pearson.

Mahadwartha, P. A., & Ismiyanti, F. (2022). Manajemen Risiko.

Mahmudov, N. (2023). Cyber Warfare: understanding the elements, effects, and future trends of cyber-attacks and defences. Сигурност и Отбрана, 2, 37–53.

Maxwell, J. A. (2008). Designing a qualitative study. The SAGE Handbook of Applied Social Research Methods, 2, 214–253.

Miles, M. B., & Huberman, A. M. (2013). Qualitative Data Analysis: An Expanded Sourcebook. Sage Publications, Inc.

Mohurle, S., & Patil, M. (2017). A brief study of wannacry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science, 8(5), 1938–1940.

Novita, D., Mulyono, M., & Retnowati, A. (2024). Perkembangan Hukum Siber di Indonesia: Studi Literatur tentang Tantangan dan Solusi Keamanan Nasional. Innovative: Journal Of Social Science Research, 4(6), 1179–1186.

Pushansiber Kemhan RI. (2022). Serangan Siber Terhadap Kemhan RI Setiap Tahun. Pushansiber Kemhan RI.

Rai, S., Singh, K., & Varma, A. K. (2019). Global Research Trend On Cyber Security: A Scientometric Analysis. Library Philosophy And Practice (E-Journal), 3339.

Rizki, M. (2022). Perkembangan Sistem Pertahanan/Keamanan Siber Indonesia Dalam Menghadapi Tantangan Perkembangan Teknologi Dan Informasi. Politeia: Jurnal Ilmu Politik, 14(1), 54–62.

Robinson, S. (2021). The Blind Strategist: John Boyd And The American Art Of War. Exisle Publishing.

Sari, R. P. (2024). PDN diserang Hacker, Seberapa Lemah Keamanan Siber Indonesia? Cloud Computing Indonesia. https://www.cloudcomputing.id/berita/keamanan-siber-indonesia#google_vignette

Steingartner, W., & Galinec, D. (2021). Cyber threats and cyber deception in hybrid warfare. Acta Polytechnica Hungarica, 18(3), 25–45.

Sun-Tzu. (2002). Sun-Tzu Seni Perang (R. A. B. Centre (ed.)). Lucky Publishers.

Sun, N., Ding, M., Jiang, J., Xu, W., Mo, X., Tai, Y., & Zhang, J. (2023). Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives. IEEE Communications Surveys & Tutorials, 25(3), 1748–1774.

Yurekten, O., & Demirci, M. (2021). SDN-based cyber defense: A survey. Future Generation Computer Systems, 115, 126–149.

Zhang, L., & Thing, V. L. L. (2021). Three decades of deception techniques in active cyber defense-retrospect and outlook. Computers & Security, 106, 102288.




DOI: https://doi.org/10.15575/jt.v8i1.38690

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

View My Stats

________________________________________________________________________

E - ISSN : 2615-5028


TEMALI is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.>

 

Published by : Prodi Sosiologi Fakultas Ilmu Sosial dan Ilmu Politik UIN Sunan Gunung Djati Bandung

Sponsored by : Ikatan Sosiologi Indonesia (ISI)

 

Flag Counter

 

 
slot https://bursaikan.kkp.go.id/obc/ https://www.assets.rpg.co.id/ https://www.linkandthink.org/ Slot Gacor https://www.theyashotel.com/ https://elearning.itbwigalumajang.ac.id/ https://bapeten.go.id/upload/ https://sentraki.itbwigalumajang.ac.id/ https://lppm.itbwigalumajang.ac.id/ https://bkombandung.kemkes.go.id/ slot gacor hari ini https://sinovik.kemkes.go.id/assets/run/ https://pdcproductions.com/ https://kkp.umt.ac.id/ https://csirt.sulbarprov.go.id/uploads/