Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 13 dokumen yang sesuai dengan query
cover
Andri Apriyana SA
Abstrak :
ABSTRAK
Sebagai proses alamiah dalam mencapai titik ekuilibrium, perkembangan ekonomi digital akan selalu diikuti oleh peningkatan risiko keamanan cyber. Penelitian ini membahas analisis big data percakapan media sosial Twitter dengan tipe data yang tidak terstruktur untuk memprediksi risiko cyber berupa keberhasilan serangan exploit terhadap kerentanan sistem informasi yang dipublikasikan pada situs kerentanan global cvedetails.com common vulnerabilities and exposures CVE . Penelitian ini mengeksplorasi aspek kualitatif dan kuantitatif atas data yang bersumber dari twitter dan CVE menggunakan metode pemodelan algoritmik statistical machine learning. Prediksi dilakukan dengan membandingkan beberapa model klasifikasi yang dipilih dari sepuluh algoritma yang paling banyak digunakan dalam data mining berdasarkan survey yang dilakukan oleh IEEE pada International Conference on Data Mining tahun 2006. Hasil prediksi terbaik dihasilkan melalui model algoritma Artificial Neural Networks dengan tingkat akurasi 96,73 . Model prediksi dapat dimanfaatkan oleh perusahaan asuransi dengan produk perlindungan risiko cyber untuk mengurangi potensi penyebaran klaim terjadinya risiko. Model juga dapat dimanfaatkan oleh perusahaan umum untuk melakukan mitigasi risiko cyber secara efektif dan efisien dengan menghindari situasi false-negatives error dalam pengelolaan risiko.
ABSTRACT
As a natural process in achieving equilibrium state, digital economic progress will always be followed by the increase of cyber security risk exposure. This research is focusing on unstructured Twitter social media big data analytics to predict cyber risks event in terms of successful attack on exploit based software vulnerability published in global vulnerability information websites cvedetails.com common vulnerabilities and exposures CVE . This research explores qualitative and quantitative aspect of data extracted from Twitter and CVE using statistical machine learning algorithmic modeling method. Prediction result obtained by comparing and selecting classification model from several statistical machine learning algorithm based on top ten algorithms in data mining survey produced by IEEE in 2006 International Conference on Data Mining. The best prediction results provided through Artificial Neural Networks algorithm with 96,73 accuracy rate. This prediction model offers advantages for insurance company with cyber liability product by reducing claim spread probability over cyber risk loss event. Prediction model can also be beneficial for company in general by providing an effective and efficient way to mitigate cyber risks through false negatives error avoidance in risk management.
2017
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Fuad Saroha
Abstrak :
Keamanan dan ketahanan siber suatu negara saat ini telah menjadi elemen penting karena memiliki keterkaitan dengan keamanan nasional. Serangan siber yang pernah terjadi di berbagai belahan dunia khususnya pada infrastruktur informasi kritis nasional menunjukkan bahwa dampak yang dihasilkan bisa mengganggu stabilitas keamanan nasional. Berdasarkan data Global Cybersecurity Index (GCI) tahun 2018, saat ini Indonesia menempati urutan 41 dari 194 negara di dunia. Indeks tersebut menilai tingkat kesiapan dan komitmen suatu negara terhadap keamanan dan ketahanan sibernya. Oleh karena itu masih terdapat hal-hal yang harus diperbaiki untuk memperkuat keamanan dan ketahanan siber Indonesia. Penelitian ini bertujuan untuk (1) menjelaskan dan menganalisis ancaman siber pada infrastruktur informasi kritis nasional yang dapat mengganggu kedaulatan negara atas ruang siber, (2) menjelaskan dan menganalisis sejauh mana kesiapan Indonesia dalam menghadapi serangan siber pada infrastruktur informasi kritis serta (3) menganalisis strategi untuk mengatasi ancaman siber pada infrastruktur informasi kritis dalam mewujudkan kedaulatan negara atas ruang siber. Metodologi yang digunakan pada penelitian ini adalah deskriptif analitis dimana sumber data didapatkan melalui studi literatur dan wawancara terhadap perwakilan dari pihak pemerintah, operator infrastruktur informasi kritis nasional serta lembaga penelitian keamanan siber. Penelitian ini berfokus pada konsep keamanan dan ketahanan siber berdasarkan indikator yang digunakan pada GCI dan akan membandingkan kondisi Indonesia saat ini dengan negara dengan peringkat tiga teratas pada regional Asia Tenggara. Hasil yang didapat adalah kondisi keamanan dan ketahanan siber Indonesia sudah cukup baik. Namun demikian masih terdapat beberapa area yang perlu diperbaiki untuk mengatasi ancaman siber pada infrastruktur informasi kritis nasional sehingga dapat mewujudkan kedaulatan negara atas ruang siber. ......Nowadays cybersecurity and cyber resilience of a country has become an important element because it's impact on national security. Cyber attacks that have occurred in various parts of the world, especially on national critical information infrastructure, show that the resulting impact could disrupt national security stability. Based on data from the Global Cybersecurity Index (GCI) in 2018, Indonesia currently ranks 41 out of 194 countries in the world. The index assesses the level of readiness and commitment of a country to its cybersecurity and resilience. Therefore there are still things that need to be improved to strengthen the security and resilience of Indonesia's cyberspace. This study aims to (1) explain and analyze cyber threats to the national critical information infrastructure that can disrupt the country's sovereignty over cyber space, (2) explain and analyze the extent of Indonesia's readiness in facing cyber attacks on critical information infrastructure and (3) analyze strategies to overcome cyber threats to critical information infrastructure in realizing state sovereignty over cyber space. The methodology used in this research is analytical descriptive where data sources are obtained through literature studies and interviews with representatives from the government, operators of the national critical information infrastructure and cyber security research institutions. This research focuses on the concept of cyber security and resilience based on indicators used in GCI and will compare the current condition of Indonesia with countries ranked in the top three in Southeast Asia Region. The results are the conditions of Indonesia's cyber security and resilience is quite good. However, there are still some areas that need to be improved to overcome cyber threat on the national critical information infrastructure to realize state sovereignty over cyber space.
Depok: Sekolah Kajian Stratejik dan Global Universitas Indonesia, 2019
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Abi Jam An Kurnia
Abstrak :
ABSTRAK
Skripsi ini membahas tentang analisis hukum terhadap ketahanan dan keamanan nasional negara Indonesia dari adanya potensi konglomerasi industri informasi dan komunikasi yang ditimbulkan oleh perusahaan asing di Indonesia. Perkembangan dan akselerasi teknologi digital di bidang industri informasi dan komunikasi di masing-masing negara di dunia juga mempengaruhi persaingan industri secara global, termasuk Indonesia. Penelitian hukum dalam skripsi ini menggunakan pendekatan normatif dengan menganalisis kaedah-kaedah hukum dalam peraturan perundang-undangan yang terkait, dengan sifat peneltian yaitu preskriptif-analitis. Dengan mengambil kasus dari Google Application dan Google Loon di Indonesia, penelitian ini menemukan bahwa struktur industri informasi dan komunikasi yang tadinya terpisah satu sama lain berubah menjadi terintegrasi, karena dua atau lebih produk atau layanan yang sebelumnya diselenggarakan oleh perusahaan yang berbeda, kemudian diselenggarakan oleh perusahaan yang sama. Perlindungan hukum yang diberikan negara Indonesia terhadap potensi konglomerasi dalam industri informasi dan komunikasi dalam kasus Google Application dan Google Loon didasarkan pada ketentuan khusus mengenai larangan praktek monopoli dan persaingan usaha tidak sehat dalam UU No. 5 Tahun 1999. Untuk penerapan Google Loon di Indonesia, dari hasil kajian yang telah ada, opsi yang menjadi pilihan pertama adalah opsi Status Quo atau Loon tidak diimplementasikan. Oleh karena itu, diharapkan pemerintah harus bisa bertindak tegas terhadap produk-produk asing dalam industri informasi dan komunikasi yang tidak mentaati regulasi yang ada di Indonesia.
ABSTRAK
This thesis discusses the legal analysis of Indonesian national resilience and security against potential conglomeration of information and communication industry which is caused by foreign companies in Indonesia. The development and acceleration of digital technology in the field of information and communication industry in each country in the world also affect the industry competition globally, including Indonesia. The legal research in this thesis uses normative approach by analyzing the legal principles in the related laws and regulations, with the nature of research that is the prescriptive analytical. Taking the case of Google Application and Google Loon in Indonesia, the study found that the information and communication industry structure that was once separate from one another turned into integrated, because two or more products or services previously held by different companies became organized by the same company. Legal protection granted by the state of Indonesia to potential conglomeration in the information and communication industry in the case of Google Application and Google Loon is based on special provisions concerning the ban on monopolistic practices and unfair business competition in Law of Republic of Indonesia Number 5 of 1999. For the implementation of Google Loon in Indonesia, from the results of existing studies, the option that became the first choice is the Status Quo or Loon option is not implemented. Therefore, it is expected that the government should be able to act firmly against foreign products in the information and communication industries that do not comply with the existing regulations in Indonesia.
2017
S69494
UI - Skripsi Membership  Universitas Indonesia Library
cover
cover
Hershey : Business Science Reference, 2017
658.05 BUS
Buku Teks  Universitas Indonesia Library
cover
Rinaldi Ikhsan Nasrulloh
Abstrak :
ABSTRAK
Skripsi ini berfokus pada masalah upaya pencegahan yang dilakukan oleh Badan Nasional Penanggulangan Terorisme (BNPT) terhadap cyber propaganda oleh Islamic State of Iraq and Syria (ISIS) di Indonesia. Pembahasan masalah ini dianalisis dengan menggunakan konsep high policing. Pendekatan yang digunakan ialah pendekatan kualitatif dengan tujuan deskriptif. Hasil penelitian menunjukkan bahwa upaya pencegahan yang dilakukan oleh BNPT dalam mencegah cyber propaganda ISIS di Indonesia, dapat menggunakan metode high policing. Meskipun penerapan karakteristik high policing tidak selalu dapat diterapkan untuk kebijakan di BNPT. Hal ini disebabkan hukum dan pedoman organisasi yang tidak sejalan dengan karakteristik dari high policing.
ABSTRACT
This thesis focuses on the problem of prevention efforts undertaken by the National Counter Terrorism Agency (BNPT) against the cyber propaganda of the Islamic State of Iraq and Syria (ISIS) in Indonesia. Discussion of this issue was analyzed using the concept of high policing. The approach used is a qualitative approach with descriptive purposes only. The results show that prevention efforts undertaken by BNPT in preventing cyber propaganda ISIS in Indonesia, can use the method of high policing. Although the application of the characteristics of high policing cannot always be applied to policies.
2017
S67756
UI - Skripsi Membership  Universitas Indonesia Library
cover
Abstrak :
This timely Research Handbook contains an analysis by leading scholars and practitioners of various legal questions concerning cyberspace and cyber activities. Comprehensive and thorough, it succeeds in mapping out the range of international rules that apply to cyberspace and to specific cyber activities, assesses their regulatory efficacy and offers insightful suggestions, where necessary, for revised standards. Contributors examine the application of fundamental international law principles to cyberspace such as the principle of sovereignty, jurisdiction, state responsibility, individual criminal responsibility, human rights and intellectual property rights. They explore the application of international rules to cyber terrorism, cyber espionage, cyber crime, cyber attacks and to cyber war. They deal with the meaning of cyber operations, the ethics of cyber operations as well as with cyber deterrence. Finally, they comment on the cyber security policies of international and regional institutions such as those of the United Nations, the European Union, NATO and of Asian-Pacific institutions. This Research Handbook will benefit scholars in the fields of international law, international relations, public and private law. Researchers will find the suggested future research avenues in this field invaluable whilst policy-makers and practitioners will gain fresh insights into topical issues concerning the regulation of cyberspace and of cyber activities.
Cheltenham, UK : Edward Elgar Pub. Ltd., 2015
343.099 RES
Buku Teks  Universitas Indonesia Library
cover
Singer, P. W.
Abstrak :
Summary: Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into U.S. government computer systems by Chinese hackers -- presumably sponsored by the Chinese government -- is another. Together, they point to a new era in the evolution of human conflict. Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They explain what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves
Oxford, Chichester: Oxford University Press, 2014
005.8 SIN c
Buku Teks  Universitas Indonesia Library
cover
Weber, Rolf H.
Abstrak :
Anonymization explores the legal framework developed to help protect netizens’ privacy and their wish for anonymous communication over the Internet. It debates the value in helping to protect anonymity over a network which sees an increasing number of cybercrimes, and explores governmental interventions into anonymity requests, and whether requests should only be legal if a sufficiently legitimized public interest is given.
London: Springer, 2012
e20407911
eBooks  Universitas Indonesia Library
cover
Abstrak :
Introduction to Cyber-warfare : a multidisciplinary approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.
Waltham, MA: Syngress, 2013
e20427002
eBooks  Universitas Indonesia Library
<<   1 2   >>