Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 15 dokumen yang sesuai dengan query
cover
Barua, Yogesh
"Dayal, Denzyl P."
New Delhi: Dominant Publishers and distributors, 2001
364.1 BAR c
Buku Teks  Universitas Indonesia Library
cover
Barua, Yogesh
New Delhi: Dominant Publishers and distributors, 2001
364.1 BAR c I (1)
Buku Teks  Universitas Indonesia Library
cover
Barua, Yogesh
New Delhi: Dominant Publishers and distributors, 2001
364.1 BAR c
Buku Teks  Universitas Indonesia Library
cover
Barua, Yogesh
New Delhi: Dominant Publishers and distributors, [2001;2001;2001, 2001]
364.1 BAR c IV
Buku Teks  Universitas Indonesia Library
cover
Freddy Harris
Jakarta: Badan Pembinaan Hukum Nasional, Kementerian Hukum dan HAM Republik Indonesia, 2008
343.099 FRE p
Buku Teks  Universitas Indonesia Library
cover
Golose, Petrus Reinhard
"Buku ini berupaya mengungkapkan bahaya dan potensi penggunaan internet dalam kejahatan terorisme yang banyak ditemui di cyberspace, baik dalam negeri maupun luar negeri."
Jakarta: Yayasan Pengembangan Kajian Ilmu Kepolisian, 2015
363.325 095 98 GOL i
Buku Teks  Universitas Indonesia Library
cover
Waltham, MA: Syngress, 2014
005.8 CYB
Buku Teks SO  Universitas Indonesia Library
cover
Barus, Faby Izaura Yulvahera
"Tulisan ini mengkaji konsep cyberterrorism dalam konteks Indonesia, menggunakan pendekatan teoritis yang dikembangkan oleh Correia (2022) dan Prof. Golose (2015), serta berdasarkan kasus-kasus serangan siber aktual di negara tersebut. Studi ini memberi fokus pada karakteristik unik cyberterrorism yang mencakup aspek kognitif, di mana kerusakan di wilayah siber, korban, dan ancaman yang ditimbulkan menjadi kriteria penting dalam mengklasifikasikan jenis serangan. Correia mengidentifikasi bahwa cyberterrorism mencakup aktivitas siber yang mengajukan ideologi tertentu dan mengancam publik serta properti. Analisis kasus Bjorka, Polrileak, dan kebocoran data Bank Syariah Indonesia (BSI) dalam penelitian ini menyediakan contoh konkret dari Cyber Dependent Terrorism. Penelitian ini juga menyoroti bahwa parameter utama dalam mengevaluasi cyberterrorism bukanlah pada korban jiwa atau kerusakan fisik yang langsung tampak, melainkan lebih pada kerusakan data dan dampak psikologis yang diakibatkannya. Dampak serangan siber ini tidak hanya mengganggu layanan publik dan ekonomi, tetapi juga menimbulkan rasa takut dan ketidakamanan di masyarakat. Studi ini menekankan pentingnya pengembangan strategi pencegahan dan respons yang cepat dan efektif dalam menghadapi cyberterrorism, yang meliputi aspek kerjasama internasional dan peningkatan kesadaran serta pendidikan masyarakat. Dengan menggarisbawahi bahwa potensi ancaman cyberterrorism di Indonesia akan terus meningkat, penelitian ini mengajukan pendekatan holistik dalam mengatasi tantangan ini. Pendekatan tersebut mencakup perlunya kebijakan yang lebih kuat, kerjasama antar-sektor yang lebih intensif, dan pengembangan program pendidikan yang bertujuan untuk meningkatkan kesadaran tentang bahaya cyberterrorism. Diharapkan, dengan strategi dan langkah-langkah yang komprehensif ini, Indonesia dapat lebih efektif dalam melindungi keamanan nasionalnya serta privasi dan keamanan warganya dari ancaman cyberterrorism yang berkembang.

This paper examines the concept of cyberterrorism in the context of Indonesia, using theoretical approaches developed by Correia (2022) and Prof. Golose (2015), and based on actual cases of cyber attacks in the country. The study focuses on the unique characteristics of cyberterrorism, which include cognitive aspects, where damage in the cyber realm, victims, and the threats posed become important criteria in classifying the type of attack. Correia identifies that cyberterrorism encompasses cyber activities that advocate certain ideologies and threaten the public and property. The analysis of cases such as Bjorka, Polrileak, and the data breach of Bank Syariah Indonesia (BSI) in this study provides concrete examples of Cyber Dependent Terrorism. This paper also highlights that the main parameters in evaluating cyberterrorism are not based on casualties or immediate physical damage, but rather on data damage and the psychological impact it causes. The impact of these cyber attacks disrupts public services and the economy, and also generates fear and insecurity in society. The study emphasizes the importance of developing prevention strategies and rapid and effective responses to cyberterrorism, which include aspects of international cooperation and enhancing public awareness and education. By underlining that the potential threat of cyberterrorism in Indonesia will continue to increase, this study proposes a holistic approach to address this challenge. This approach includes the need for stronger policies, more intensive inter-sector cooperation, and the development of educational programs aimed at raising awareness of the dangers of cyberterrorism. It is hoped that with these comprehensive strategies and measures, Indonesia can be more effective in protecting its national security as well as the privacy and safety of its citizens from the growing threat of cyberterrorism."
Jakarta: Sekolah Kajian Stratejik dan Global Universitas Indonesia, 2024
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Akhgar, Babak
"Cyber crime and cyber terrorism investigator’s handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become.
Cyber crime and cyber terrorism investigator’s handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare.
"
Waltham, MA: Elsevier, 2014
e20426911
eBooks  Universitas Indonesia Library
cover
Vacca, John R.
"This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.
Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms.
Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements :
• Checklists throughout each chapter to gauge understanding
• Chapter Review Questions/Exercises and Case Studies
• Ancillaries: Solutions Manual; slide package; figure files"
Waltham, MA: Syngress, 2014
e20426913
eBooks  Universitas Indonesia Library
<<   1 2   >>