Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 45910 dokumen yang sesuai dengan query
cover
Miftahul Khausar
"Pada Juni 2017, Uni Eropa meningkatkan kewaspadaannya terkait masalah serangan siber dengan mendukung pembentukan The Cyber Diplomacy Toolbox (CDT) sebagai tanggapan diplomatik bersama Uni Eropa terhadap aktivitas serangan siber. Keputusan Uni Eropa untuk mengadopsi CDT sebagai bagian dari strategi Cyber Security nya didasari oleh faktor internal dan faktor eksternal. Penelitian ini menjelaskan lebih dalam tentang faktor-faktor tersebut serta menjelaskan implementasi CDT sebagai bagian dari tindakan strategi keamanan siber Uni Eropa. Metode penelitian pada penelitian ini adalah metode Kualitatif dengan menggunakan sumber data primer dan data sekunder. Penelitian ini dianalisis menggunakan Teori Regional Security Complexs dan Konsep Cyber Diplomacy. Teori Regional Security Complexs digunakan untuk menganalisis potensi ancaman pada sektor keamanan siber yang ada di regional Uni Eropa dan menjelaskan upaya pencegahan serta penanggulangan aktivitas serangan siber terhadap negara-negara anggota Uni Eropa dan Konsep Cyber Diplomacy untuk menganalisa proses diplomasi dalam memperkuat strategi Cyber Security Uni Eropa. Penelitian ini menemukan bahwa Keputusan Uni Eropa untuk mengadopsi CDT didasari oleh Faktor Internal dan Faktor Eksternal, kerangka kerjasama CDT dinilai dapat menjadi solusi permasalahan siber dikawasan Uni Eropa dan negara anggotanya, CDT memungkinkan Uni Eropa dan negara anggotanya untuk memanfaatkan instrumen diplomatik mereka, termasuk tindakan pembatasan, untuk menjaga dunia maya tetap global, terbuka, stabil, dan aman.

.In June 2017, the European Union increased its vigilance on the issue of cyberattacks with the establishment of The Cyber Diplomacy Toolbox (CDT) as a joint EU response to cyberattack activity. The European Union's decision to adopt CDT as part of its Cyber Security strategy was based on internal and external factors. This study explains more about these factors and explains the implementation of CDT as part of the European Union's cybersecurity strategy. The research method used in this study is a qualitative method using primary data sources in the form of interviews and secondary data in the form of literature review. This study analyzes using Regional Security Complexs Theory and the Concept of Cyber Diplomacy. The Regional Security Complexs theory is used to analyze potential threats to the cybersecurity sector in the European Union region and explain efforts to prevent and counter cyberattack activities against member countries of the European Union and the concept of Cyber Diplomacy to analyze the diplomatic process in strengthening cyber strategies European Union Security. This study found that the European Union's decision to adopt CDT was based on Internal and External Factors, the CDT cooperation framework is considered to be a solution to cyber problems in the European Union and its member states, CDT allows the European Union and its member countries to take advantage of their diplomatic instruments, including restrictive measures. , to keep cyberspace global, open, stable and secure."
Jakarta: Sekolah Kajian Stratejik dan Global Universitas Indonesia, 2022
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
London: Imperial College Press, 2014
005.8 DAT
Buku Teks  Universitas Indonesia Library
cover
Waltham, MA: Syngress, 2014
005.8 CYB
Buku Teks  Universitas Indonesia Library
cover
Vacca, John R.
"This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.
Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms.
Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements :
• Checklists throughout each chapter to gauge understanding
• Chapter Review Questions/Exercises and Case Studies
• Ancillaries: Solutions Manual; slide package; figure files"
Waltham, MA: Syngress, 2014
e20426913
eBooks  Universitas Indonesia Library
cover
Washington: DC Westphalia Press, an imprint of the Policy Studies Organization, 2017
003.5 ISS
Buku Teks SO  Universitas Indonesia Library
cover
Alsmadi, Izzat
"This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework.
Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE)
Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training
Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more
"
Switzerland: Springer Nature, 2019
e20509570
eBooks  Universitas Indonesia Library
cover
Dedeh Kurniasih
"Tesis ini bertujuan menganalisis mengenai pertanyaan penelitian, mengapa Benelux melakukan kerjasama keamanan untuk memperkuat Common Foreign and Security Policy (CFSP) Uni Eropa'Bagaimana Benelux mendukung kebijakan Uni Eropa dalam merespons perang Rusia-Ukraina (2014-2022), serta pendekatan apa yang dilakukan Benelux untuk itu. Penelitian ini menggunakan metode kualitatif dengan deskriptif analitik dengan menganalisis data-data yang bersumber dari data sekunder. Penelitian ini menggunakan empat level analisis teori Regional Security Complex oleh Barry Buzan dan menggunakan konsep keamanan kooperatif di tiap tingkat analisis tersebut. Temuan penelitian ini, Benelux dalam mendukung CFSP Uni Eropa dalam merespons perang Rusia-Ukraina belum kolektif secara institusional. Faktor kepentingan domestik Benelux tetap menjadi pertimbangan masing-masing negara. Selain itu ketergantungan Benelux terhadap Uni Eropa sebagai suatu kekuatan, sangat penting dalam menjaga stabilitas keamanan Benelux.

This thesis aims to analyze the research question, why is the Benelux conducting security cooperation to strengthen the EU CFSP? How the Benelux supported the EU's policy in response to the Russian-Ukrainian war (2014-2022), as well as what approach the Benelux took to it. This research uses a qualitative method with descriptive analytics by analyzing data sourced from secondary data. This study used four levels of analysis of the theory of the Regional Security Complex by Barry Buzan and used the concept of cooperative security at each level of analysis. The findings of this study, the Benelux in supporting the EU CFSP in responding to the Russian-Ukrainian war have not been institutionally collective. The factor of domestic interests of the Benelux remains the consideration of each country. In addition, the Benelux's dependence on the European Union as a power, is very important in maintaining the security stability of the Benelux."
Depok: Sekolah Kajian Stratejik dan Global Universitas Indonesia, 2022
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Reyhan Syofyano
"Tesis ini membahas mengenai pembentukan peraturan keamanan data European Union General Data Protection Regulation (EU GDPR). Uni Eropa berhasil menetapkan EU GDPR pada tahun 2016, disaat negara-negara masih kesulitan menghasilkan kebijakan keamanan yang dapat menjangkau ranah siber secara efektif. Peraturan tersebut berbentuk regulasi sehingga tidak membutuhkan ratifikasi tingkat nasional, sedangkan belum semua negara anggota Uni Eropa memiliki aturan dasar mengenai keamanan siber. Sehingga menjadi pertanyaan mengapa Uni Eropa berhasil membentuk EU GDPR tanpa mendapatkan penolakan dari badan-badan Uni Eropa. Penelitian dilakukan menggunakan metode kualitatif dan teori neofungsionalisme sebagai kerangka analisis. Neofungsionalisme melihat adanya fenomena spillover dalam terjadinya integrasi di Eropa. Tiga variabel spillover yaitu functional spillover, political spillover dan cultivated spillover menjadi faktor-faktor yang mempengaruhi pembentukan kebijakan. Berdasarkan faktor-faktor tersebut disimpulkan bahwa peran badan supranasional merupakan kunci penting pada proses integrasi penyebab berhasilnya pembentukan EU GDPR.

This thesis examines the establishment of EU's new data protection regulation, European Union General Data Protection Regulation (EU GDPR). EU officially signed EU GDPR in 2016, at the moment when states are still in the hassle of procuring a security policy which able to reach the cyberspace effectively. With the form of an EU regulation the EU GDPR do not have to go through ratification on national level, whereas many of EU countries still haven't set their own basic law on cyber security yet. Thus, it brings up the question on why EU's managed to establish EU GDPR without any objections from the EU bodies. This study uses quantitative methodology and neofunctionalism theory as the analytical framework. Neofunctionalism recognize the spillover phenomenon in the occurrence of European Integration. Three variables of spillover: functional spillover, political spillover and cultivated spillover are the main factors which decides the result of the policy agreement. Based on those factors it can be concluded that supranational bodies within EU act as the important key regarding the process of integration which lead to the successful establishment of EU GDPR."
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2021
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Boston: Elsevier, 2011
355.343 CYB
Buku Teks  Universitas Indonesia Library
cover
Hershey : Business Science Reference, 2017
658.05 BUS
Buku Teks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>