Defense Security Development: Cyber Security Capital and Gap in Indonesia

Dini Prilia Gamarlin, Humaizi, Opim Salim Sitompul, Muryanto Amin

2022

Abstract

Today’s human dependence on information technology directly presents its own challenges and threats. Attacks on cyberspace are a consequence of the rapid development of information. Information technology is also a central point that has the potential to cause massive damage to various sectors related to cyberspace. Cyberspace can be said to be a complex sector because it relates to other sectors. This relation is a challenge in countering threats in cyberspace. The potential threat of cyber security has encouraged other countries to compete in structuring policies in this field. Indonesia itself until now there is no policy in the cyber sector that is integrative, therefore there must be a seriousness of the government to immediately issue a policy to protect the public from all the onslaught of cyber threats that occur in Indonesia. Discussing about cybersecurity threats means discussing information in cyberspace. Information, data, is a valuable asset that must be protected. Not to mention the growing development of misleading information or hoaxes that have been circulating in the community caused by misuse of information. Information as a very valuable asset for an organization or institution is a strategic resource. Protection of information or information security is an absolute thing that must be seriously considered by all levels of owners, management or employees of the organization or institution concerned. Information security includes policies, procedures, processes, and activities to protect information from various types of threats to it so that it can cause losses for the survival of the organization or institution. Information security assurance can basically be achieved through the activity of implementing a number of appropriate controls. The intended control is the implementation of certain policies, procedures, structures, practices, and functions. The overall control must be implemented by the organization or institution so that all the intended security objectives can be achieved. Therefore, this paper wants to examine the extent of Indonesia’s cyber security defense capital, the gap between capital and the facts of the threats that occur, as well as whether existing regulations are sufficient to protect Indonesia from cyber threat attacks, or vice versa. So that cyberspace can be said to be safe from potential cyber threats and crimes. This research is qualitative research with a descriptive method that emphasizes efforts to find the right answer so that it is expected to improve the quality of the implementation of a better cyber defense.

Download


Paper Citation


in Harvard Style

Gamarlin D., Humaizi., Sitompul O. and Amin M. (2022). Defense Security Development: Cyber Security Capital and Gap in Indonesia. In Proceedings of the 4th International Conference on Social and Political Development - Volume 1: ICOSOP, ISBN 978-989-758-618-7, SciTePress, pages 167-173. DOI: 10.5220/0011563300003460


in Bibtex Style

@conference{icosop22,
author={Dini Prilia Gamarlin and Humaizi and Opim Salim Sitompul and Muryanto Amin},
title={Defense Security Development: Cyber Security Capital and Gap in Indonesia},
booktitle={Proceedings of the 4th International Conference on Social and Political Development - Volume 1: ICOSOP,},
year={2022},
pages={167-173},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0011563300003460},
isbn={978-989-758-618-7},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 4th International Conference on Social and Political Development - Volume 1: ICOSOP,
TI - Defense Security Development: Cyber Security Capital and Gap in Indonesia
SN - 978-989-758-618-7
AU - Gamarlin D.
AU - Humaizi.
AU - Sitompul O.
AU - Amin M.
PY - 2022
SP - 167
EP - 173
DO - 10.5220/0011563300003460
PB - SciTePress