Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 3 dokumen yang sesuai dengan query
cover
Basuki Erwin Setiyadi
Abstrak :
ABSTRAK Nama : Basuki Erwin Setiyadi Bidang Ilmu : Interdisiplin Program Studi : Kajian Ketahanan NasionalPeminatan : Kajian Stratejik Intelijen Judul Tesis : Kontra Intelijen Aksi Spionase Siber Terhadap Anggota Democratic National Committee Menjelang Pemilihan Presiden AS Tahun 2016 xiv, 131 halaman, 19 buku, 14 jurnal, 6 perundang-undangan, 56 website Penelitian ini adalah studi kasus mengenai peristiwa spionase siber kepada anggota Democratic National Committee DNC menjelang pilpres AS tahun 2016, yang mengakibatkan kebocoran email Hillary Clinton yang dirilis oleh WikiLeaks. Hal tersebut menunjukkan bahwa aktivitas intelijen telah berkembang ke ranah siber dan dapat menganggu ketahanan nasional, sehingga perlu dilakukan kontra intelijen sebagai upaya untuk menjaga keamanan siber. Penelitian ini menggunakan pendekatan kualitatif dengan pengumpulan data melalui wawancara dan studi literatur. Penelitian ini bertujuan untuk mengetahui 1 level ancaman dari aktivitas spionase siber kepada DNC, 2 metode kontra intelijen terhadap ancaman tersebut, dan 3 strategi Indonesia untuk menghadapi ancaman siber. Teori yang digunakan adalah Teori Kontra Intelijen dan Teori Ancaman, serta analisis SWOT. Hasil dari penelitian ini adalah 1 analisis ancaman spionase siber menunjukkan bahwa pelaku adalah sebuah ancaman dengan level tinggi sehingga membahayakan kepentingan negara dan dapat mempengaruhi ketahanan nasional, 2 kontra intelijen siber dilakukan melalui dua metode yaitu, kontra intelijen defensif yang bertujuan untuk memblokir dan mendeteksi terhadap aktivitas akses lawan dan kontra intelijen ofensif bertujuan untuk mengumpulkan informasi, memanipulasi, mengontrol, dan menggagalkan aksi lawan, 3 strategi Indonesia untuk menghadapi ancaman siber adalah dengan melakukan penguatan baik pada segi regulasi, teknik, organisasi, kemampuan, dan kerjasama.Kata kunci : kontra Intelijen; democratic national committee; spionase siber; email; hillary clinton; wikileaks.
ABSTRACT Name Basuki Erwin Setiyadi Study Program National Ressilience Studies Specificity Intelligence Strategic Studies Title Counterintelligence Against Cyber Espionage Conducted Against Member of Democratic National Committee Towards US Presidential Election of 2016 xiv, 131 pages, 19 books, 14 journals, 6 legislations, 56 website This research is a case study of cyber espionage conducted against the member of Democratic National Committee DNC towards the 2016 US presidential election, caused Hillary Clinton 39 s email leaked and published by WikiLeaks. It indicates the intelligence activities have entered into cyberspace and can disrupt the national ressilience, so it is necessary to do counterintelligence as an effort to maintain the cyber security. This research uses qualitative approach, data collected from interviews and literature study. The purposes of this research are 1 to determine the threat level of cyber espionage conducted against DNC, 2 counterintelligence methods against the threat, 3 and Indonesian Government Strategy against cyber threat. This research use counterintelligence theory, threat analysis theory, and SWOT analysis. The results of this research are 1 the threats analysis of cyber espionage indicating the threat agent has high level threat, it could harms the national interest and affect the national ressilience, 2 cyber counterintelligence are conducted by two ways i.e., defensive counterintelligence to block and detect enemy 39 s access activity, and offensive counterintelligence to collect informations, manipulate, control, and thwart enemy rsquo s action, 3 Indonesian Government Strategies against cyber threat are strengthening legal measure, technical measure, organizational measure, capacity building, and cooperation.Keyword counterintelligence democratic national committee cyber espionage email hillary clinton wikileaks.
Sekolah Kajian Stratejik dan Global, 2018
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Kemara Sukma Vinaya
Abstrak :
ABSTRACT
Seiring dengan berkembangnya zaman, ancaman keamanan nasional pun juga mengalami perubahan. Memasuki abad ke-21, isu keamanan nontradisional menjadi sorotan salah satunya adalah keamanan siber. Saking mengancamnya, konflik di ranah siber dianggap sebagai ancaman keamanan nasional paling serius yang dihadapi negara semenjak dikembangkannya senjata nuklir pada tahun 1940an. Tidak heran jika AS, yang merasa menjadi korban serangan spionase siber ekonomi Cina, kemudian melakukan berbagai cara untuk menghentikan permasalahan ini. Setelah sekian lama menyangkal tuduhan AS, Cina dan AS akhirnya membuat kesepakatan kerja sama di bidang keamanan siber pada tahun 2015. Akan tetapi, kesepakatan ini nampak lebih menguntungkan bagi AS. Dengan menggunakan pendekatan third image, tulisan ini mengkaji kapabilitas Cina militer dan ekonomi dan posisi Cina dalam sistem internasional untuk melihat faktor dari level sistemik yang mendorong keputusan Cina tersebut. Tulisan ini mendapati dua faktor yakni 1 kepentingan keamanan Cina untuk membangun kapabilitas pertahanan militernya di bidang siber dan 2 mencegah kemungkinan tindakan AS, seperti sanksi ekonomi atau litigasi di WTO, yang dapat mengganggu upaya peningkatan kekuatan ekonomi Cina. Kesepakatan ini dimanfaatkan sebagai sarana Confidence-Building Measure CBM di bidang militer sekaligus upaya untuk mempertahankan kelangsungan Made in China 2025 yang penting bagi kapabilitas Cina secara keseluruhan.
ABSTRACT
As time goes by, the threats to national security also evolve. At the dawn of the 21st century, nontraditional security issues gradually started to be the center of attention one of them is cybersecurity. The potential fatality of its attack drives conflicts in the cyber realm as the most serious nasional security threat since the development of nuclear weapon in the 1940s. No wonder, the United States, which claimed to be the victim of numerous economic cyber espionage that can be attributed to China, then tried its hands on various possible method to stop that. After a period of denying the charges, China and US reached an agreement on cybersecurity in 2015. However, at least on the surface, the agreement seemed to be more advantegous for the United States. Using the third image approach, this writing tries to analyze Chinas capability both in military and economy mdash and Chinas position in the current international system to see what factors from the systemic level that drove China to this particular decision. There are at least two factors, which are 1 Chinas security interest to develop its military defensive capability in the cyber dimension and 2 to prevent possible US conducts, such as economic sanction and a litigation in WTO, which can disrupt Chinas effort in modernizing its economy. This agreement can be seen as Confidence Building Measure CBM platform for China with US in the military sector whilst also maintaining the sustainability of the Made in China 2025 program that is vital for Chinas overall capability that is somehow directly related to its survival in the future.
2018
S-Pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Abstrak :
The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly implement this process. No other publication covers this topic in the detail provided in this book or provides hands-on exercises that will enforce the topics. Examples in the book follow a fictitious organization through the RMF, allowing the reader to follow the development of proper compliance measures. Templates provided in the book allow readers to quickly implement the RMF in their organization. The need for this book continues to expand as government and non-governmental organizations build their security programs around the RMF. The companion website provides access to all of the documents, templates and examples needed to not only understand the RMF but also implement this process in the reader’s own organization.
Waltham, MA: Syngress, 2013
e20427926
eBooks  Universitas Indonesia Library