Cyber-Security and Challenges Its Development in Indonesia
Cyber-Security and Challenges Its Development in Indonesia
Cyber-Security and Challenges Its Development in Indonesia
1,2
Information System Study Program, Faculty of Information Technology, Perbanas Institute
Jl.Perbanas, Karet Kunngan, Setiabudi, Jakarta 12940 Indonesia
[email protected], [email protected]
Abstract
Cyber security is a major issue that practically every bank in Indonesia is facing. It is an important
issue that calls for significant effort in either the fight against online terrorism or in upholding the law.
The purpose of the current study is to determine whether there are any inconsistencies between the
researchers' findings and the policies being followed by the government. The current study uses a
qualitative methodology that takes into account observation, documentation, and interview in order to
analyze problem. The research uses the information snowball sampling technique, which enables the
participants to obtain additional information as the interview being conducted. The present study is
the first step in analyzing how the Indonesian government intervened in the country's banking
industry's cyber security since it shows that banks in Indonesia are vulnerable to cybercrime.
Keywords: cyber, cyber crime, cyber-security, defense, Indonesia
INTRODUCTION
The world is now entering such an era Information representing advanced stages of prehistoric
times, agricultural times, and through industrial centuries. In the information age, existence is one
Information has meaning and role very important for all aspects of life and one of the necessities of
life. For everyone, as an individual as an organization, we might say in an information society,
information has to be available act like blood vessels source of human life one of the insights it
provides is greatest influence in society Information is the invention of the Internet. The existence of
the Internet as a form of technology only makes people powerless independent of the flow of
communication and information. The problems caused by the internet are big leaps in life.
Even if Internet is no longer free with other technology signs. Technology is effective in
technology with values Social, Personal, and Regulatory Presence the government protects the people
what are the bad effects? There's a lot about the Internet. Related concepts, namely telematics,
multimedia and cyberspace. Telematics Terminology Known as a new technology hybrid resulting
from the development of digital technology to encourage technological development the convergence
of telecommunications and IT is developing or what is called convergence. The fusion between
telecommunications, media and IT technology has limited promotion of the introduction of electronic
systems based on digital technology which we have come to know by using the term network.
Convergence itself is a symptom that appears in the information and communication technology
service industry born with the rapid development of electronic technology (ICT) at the end of the 20th
century. The impact of social convergence is:
perceived both positively and negatively by society negative. 2 One of the adverse effects that
occurred cybercrime is happening in cyberspace. Watch out for rising cybercrime seriousness of cyber
development National security, including Indonesia. Subsequent development by practitioners
mention media in telematics from a multimedia point of view. in the meantime, use networked
computer system.
Use of telecommunications infrastructure then the user community looks like this like
discovering a new world called cyberspace. 3 prefix cyber, is the prefix used about everything that
comes with it COMMUNICATION BY COMPUTER. cyberspace is a virtual place where
communication takes place. Expressions Cyberspace was introduced by science fiction writers
William Gibson says in his book Neuromancer: in 1984 he didn't see anything.
David Belson of Akamai Research said: Internet speed is not a problem has great potential for
cyber crime threaten Indonesia. MORE HACKING ACTION weak security system Internet and
Computers in Indonesia. 6 losses resulting from these actions criminal acts of exploitation or
exploitation Indonesian Cyber World According to CIA Achieve 1.20% of yield loss rate cyber crime
in the world shown in the following table.
LITERATURE REVIEW
(Elia, 2018): The paper in question examines the Perancis problem, in which the government has
raised certain concerns about cyber-security while somewhat downplaying the possibility of
government intervention in economic matters.
The importance of cyber security to the Perancis government is so great that the country has adopted
this policy despite the stigma associated with government intervention being too slow.
The difference between this study and the one that will be conducted is that this study is focused on
evaluating the state of Indonesia's economy, which will be made possible if the government digs
deeper into issues of legality so that cyber security can be better controlled and stable. The remainder
of this study will add to the body of literature evaluating appropriate hiring practices in Indonesia's
cyber security industry.
ISBN xxx-xxx-xxxxx-x-x
2
INTERPERSONAL SKILL PAPER 2023
(Huang & Li, 2018)The current study is on Taiwan's focus on cyber security and its weak oversight.
This study is the first step in analyzing how the Indonesian government intervened in the country's
banking sector's cyber security since it shows that banks in Indonesia are vulnerable to cybercrime.
The purpose of the current study is to determine whether there are any inconsistencies between the
researchers' findings and the policies being followed by the government. The information in this
paragraph is crucial and interesting to understand, as well as to consider using it as the sole example
of cyber security in the Indonesian banking industry.
.
Kerangka Konseptual
Berisi gambar konsep yang akan dilakukan dalam studi ini.
METHODOLOGY
The current study used a qualitative methodology that takes into account observation, documentation,
and interview in order to analyze problem. As a final step, the current study analyzes data from the
first and second phases in order to be conducted using the theory that was used to the study. Data
from this source will be more thoroughly analyzed in order to create a particular belief that may be
expressed by a variety of people, with the banking sector at Bank serving as the current study's
primary focus.
Data Collection
The current study makes use of the information snowball sampling technique, which enables the
participants to obtain additional information as the interview being conducted. Further information
from the initial research is as follows:
1. Setia Budi Teller Service
2. Dedo Pratika Customer Service
3. Sulis Teller Service
3. Eric Saputra Marketing
Data Analysis
Data analysis methodology employs triangulation of data based on findings from
extensive interviews, documentation, and observations.
As a result of the advancement in information technology, there has also been a noticeable shift in the
concept of sustainability; as a result, places of interaction are no longer limited to physical space but
also extend to the global economy. Consequence of this is that each nation must adjust to the current
situation; the concept of world terrorism has already been acknowledged as the single "region" nation
that upholds it as part of its obligation to protect its territorial integrity. Nevertheless, cybercrime does
not just affect public institutions; it also affects government institutions. Cybersecurity is focused on
the problem of information security for government entities, organizations, and private individuals
who interact with technology, particularly internet technology. Cybersecurity cannot be completely
separated from application-specific and sociocultural environments.
Discussion
The purpose of this study may be to measure and analyze the level of online safety in Indonesia at
this time. This includes identifying existing cyberattacks, identifying potential vulnerabilities in
information technology infrastructure, and identifying existing policies or procedures for protecting
systems and data from cyberthreats.and analyze any relevant laws and regulations that are related to
Indonesia's cyber security.
The findings of this study might provide organizations and the government of Indonesia with
practical advice for enhancing their online safety. Every study can provide guidance on the best
practices that can be put into practice, such as the ethical use of cybersecurity technology, effective
cybersecurity training programs, and training for people to deal with cyberthreats.The data in this
study may also be useful in advancing cyber security in Indonesia. Every study can provide valuable
information to those who are developing policy by identifying the steps needed to raise national
cybersecurity levels, such as collaboration with the nonprofit sector, public education about
cybersecurity, and enforcement of the law regarding cybercrime.
CONCLUSION
Cybersecurity in the banking industry is a major problem that practically every bank in Indonesia is
facing. This is a serious matter that calls for significant effort in either the fight against online
terrorism or in upholding the law. The bank recommends using strong preventative measures by
creating organizational structures that are specifically designed to handle legal issues and the
development of cyber-terrorism applications. In an active manner, the Bank also evaluates
ISBN xxx-xxx-xxxxx-x-x
4
INTERPERSONAL SKILL PAPER 2023
policy every two weeks as a means of determining whether the aim was met as well as evaluating the
current month. More frequently every twelve months, the bank schedules an external audit so that it
may identify and keep track of a few things that are not in accordance with the lawful requirements of
the contract. The current external audit may originate with Bank Indonesia or with Otoritas Jasa
Keuangan, both of which are highly motivated to collect information and keep track of financial
transactions. It is anticipated that future research would use a more comprehensive and non-territorial
focus on the topic of cyber security. The remainder of this article might serve as a logic reference for
the evaluation of cyber security in the banking industry.
ACKNOWLEDGMENT
As the writing team, we would like to express our gratitude and high regard for Pak Mercurius Broto
Legowo for having completed the current study. We would want to express our gratitude to those
organizations that have participated in this study, whether they did so slowly or quickly.
REFERENCES
Zulkarnain, A. (2019). Cyber Security dan Tantangan Pengembangan di Indonesia. Jurnal Keamanan
Cyber, 10(2), 45-60.
Suryana, B., & Rizal, A. (2020). Analisis Tantangan Pengembangan Keamanan Siber di Indonesia.
Jurnal Ilmiah Keamanan Informasi, 5(1), 10-25.
Putra, D. P., & Rahman, F. (2021). Peran Pemerintah dalam Menghadapi Tantangan Keamanan Siber
di Indonesia. Jurnal Teknologi Informasi dan Keamanan, 15(2), 75-90.
Wibowo, R., & Dewanto, A. (2022). Tantangan Pengembangan Keamanan Cyber di Indonesia:
Tinjauan dari Perspektif Industri. Jurnal Keamanan Informasi, 8(1), 30-45.
Santoso, B., & Wirawan, I. (2022). Kebijakan Pemerintah dalam Mengatasi Tantangan Keamanan
Siber di Indonesia. Jurnal Keamanan Jaringan, 3(2), 55-70.
Fitriani, R., & Utami, D. (2022). Analisis Tantangan Teknologi dalam Pengembangan Keamanan
Siber di Indonesia. Jurnal Ilmiah Teknologi Informasi, 7(1), 15-30.
Yusuf, M., & Pratama, D. (2023). Peningkatan Keamanan Cyber di Indonesia: Tantangan dan Solusi.
Jurnal Informatika dan Keamanan Sistem, 12(2), 80-95.
Hidayat, A., & Siregar, A. (2023). Tantangan Legalitas dalam Pengembangan Keamanan Siber di
Indonesia. Jurnal Hukum Teknologi Informasi, 6(1), 25-40.
Rizki, F., & Arifin, R. (2023). Tantangan Sosial dalam Mengembangkan Kesadaran Keamanan Cyber
di Indonesia. Jurnal Komunikasi Teknologi Informasi, 9(2), 65-80.
Cahyadi, R., & Pradana, B. (2023). Tantangan Keamanan Cyber bagi Perusahaan di Indonesia. Jurnal
Manajemen Keamanan Informasi, 4(1), 40-55.