Cyber Security Analysis and Law; Bjorka Case

Aldiyan Harun Prasetyo

Abstract

Technology has always been a powerful tool for advancing human civilization. It had allowed us more organized, efficient, and connected. Since the dawn of the Internet, we have increasingly relied on electronic communications as a means of doing business. Cybersecurity, which also encompasses authentication, non-repudiation (non-denial), and accountability, is an effort to safeguard the confidentiality, integrity, and accessibility of information in cyberspace. The process of defending computers, servers, mobile devices, electronic systems, networks, and data from hostile attacks falls under the category of cybersecurity. The following questions are used to evaluate the descriptive data in this paper, which employs a qualitative management approach: What prompted hackers to inflitrate Indonesia and How is the government responding.

Keywords

Technology; Cybersecurity

Full Text:

PDF

References

“UU No. 27 Tahun 2022 tentang Pelindungan Data Pribadi [JDIH BPK RI],” peraturan.bpk.go.id. https://peraturan.bpk.go.id/Home/Details/229798/uu-no-27-tahun-2022 (accessed Dec. 29, 2022). [2]C. N. N. Indonesia, “Siapa Bjorka dan Kenapa ‘Mengacak-acak’ Indonesia?,” teknologi, Oct. 12, 2022. https://www.cnnindonesia.com/teknologi/20220912053812-192-846395/siapa-bjorka-dan-kenapa-mengacak-acak-indonesia (accessed Dec. 29, 2022). [3]Kaspersky, “What is Cyber Security?,” Kaspersky.com, 2019. https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security (accessed Dec. 29, 2022). [4]R. K. Siregar, “Perbedaan Hacker dan Cracker,” www.djkn.kemenkeu.go.id, Sep. 27, 2022. https://www.djkn.kemenkeu.go.id/kanwil-rsk/baca-artikel/15422/Perbedaan-Hacker-dan-Cracker.html (accessed Dec. 29, 2022). [5]Kaspersky, “Black hat, White hat, and Gray hat hackers – Definition and Explanation,” www.kaspersky.com, Apr. 09, 2021. https://www.kaspersky.com/resource-center/definitions/hacker-hat-types (accessed Dec. 29, 2022). [6]O. Buxton, “Hacker Types: Black Hat, White Hat, and Gray Hat Hackers,” Hacker Types: Black Hat, White Hat, and Gray Hat Hackers, Oct. 12, 2022. https://www.avast.com/c-hacker-types#:~:text=White%20hat%20hackers%20probe%20cybersecurity (accessed Dec. 29, 2022). [7]“UU No. 19 Tahun 2016 tentang Perubahan Atas Undang-Undang Nomor 11 Tahun 2008 Tentang Informasi Dan Transaksi Elektronik [JDIH BPK RI],” peraturan.bpk.go.id. https://peraturan.bpk.go.id/Home/Details/37582/uu-no-19-tahun-2016 (accessed Dec. 28, 2022). [8]A. Chendramata, “Indonesia Cyber Security Strategy,” dephub.go.id. https://dephub.go.id/public/files/uploads/posts/posts/postbody/strategi_cs_nasional_desember2016.pdf (accessed Dec. 28, 2022). [9]I. R. Dewi, “Hacker Bjorka is Back, Data Apa Saja yang Pernah Dibocorkan?,” CNBC Indonesia, Nov. 11, 2022. https://www.cnbcindonesia.com/tech/20221111075351-37-386931/hacker-bjorka-is-back-data-apa-saja-yang-pernah-dibocorkan (accessed Dec. 28, 2022).

Refbacks

  • There are currently no refbacks.