Kondisi Ruang Siber Selama Pandemi Covid-19 dan Upaya Mengembangkan Kebijakan Publik di Indonesia
DOI:
https://doi.org/10.37145/3r0gtz32Keywords:
Covid-19, Kebijakan Publik, Keamanan Siber, Kebijakan Keamanan SiberAbstract
Artikel ini membahas tentang kondisi ruang siber selama pandemi Covid-19 dan upaya mengembangkan kebijakan publik di Indonesia. Tujuan penelitian ini adalah menelusuri secara kritis kondisi ruang siber selama pandemi Covid-19. Penelitian ini menggunakan metode PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-analyses). Hasil penelitian menemukan target serangan, jenis serangan, dan respon beberapa negara terhadap kondisi ruang siber. Selama pandemi Covid-19, Indonesia telah mengeluarkan beberapa rilis atau kebijakan publiknya dalam mendeteksi, mencegah, mengedukasi, dan mengatasi beberapa insiden selama pandemi Covid-19. Untuk mengembangkan kebijakan publik yang unggul sebagai respon atas meningkatnya serangan siber selama pandemi direkomendasikan Indonesia perlu menetapkan strategi keamanan siber sebagai pondasi perumusan kebijakan publik, BSSN perlu mengoptimalkan ways-nya yaitu “memanfaatkan, mengembangkan, dan mengonsolidasikan unsur-unsur keamanan siber” kepada Lembaga yang memiliki kewenangan dalam 5 (lima) mandat keamanan siber nasional (five mandates national cybersecurity) sehingga dapat bersama-sama merespon serangan siber selama pandemi covid-19, serta BSSN perlu menentukan Jenis, model dan metode perumusan kebijakan publik secara tepat untuk mempermulus tersusunnya kebijakan dan mendapatkan dukungan dengan memperhatikan prinsip dasar kebijakan keamanan siber.
Downloads
References
Amoros, E. (2010). Cyber Attacks. Butterworth-Heinemann.
Bayuk. (2012). Cyber Security Policy Guidebook. John Wiley & Sons.
Dye, T. R. (2017). Understanding Public Policy (15th ed.). Pearson Education.
Gallaher, L. (2008). Cyber Security, Economic Strategies dan Publik Policy Alternatives. Edward Elgar.
Hathaway, M, et. a. (2009). Cyberspace Policy Review, assuring a trusted and Resillient Information, and Communication Infrastructure. US Executive Branch.
Klimburg, A. (2012). National Cyber Security Framework Manual. NATO CCD COE Publication.
Nugroho, R. (2014). Public Policy : Teori, Manajemen, Dinamika, Analisis, Konvergensi dan Kimia kebijakan (5th ed.). Elex Media Komputindo.
Nugroho, R. (2020a). Kebijakan Anti Pandemi Global: Kasus Covid 19 (1st ed.). Yayasan Rumah Reformasi Kebijakan.
Nugroho, R. (2020b). Model-Model Perumusan Kebijakan Publik (1st ed.). Yayasan Rumah Reformasi Kebijakan.
Nugroho, R. (2020c). Perumusan Kebijakan Dalam Praktik (1st ed.). Yayasan Rumah Reformasi Kebijakan.
Suwitri, S. (2008). Konsep Dasar Kebijakan Publik MODUL 1. In Analisis Kebijakan Publik (1st ed., Issue 2). Badan Penerbit Universitas Diponegoro. https://doi.org/http://dx.doi.org/10.1016/j.atmosenv.2007.12.054
Whitman ME, M. H. (2009). Principles of Information Security (3rd ed.). Thompson Course Technology.
Chigada, J., & Madzinga, R. (2020). Cyberattacks and threats during COVID-19 : A systematic literature review Coronavirus Disease-2019. South African Journal of Information Management, 1–11.
Khan, N. A., Brohi, S. N., & Zaman, N. (2020). Ten Deadly Cyber Security Threats Amid COVID-19 Pandemic. TechRxiv Powered by IEEE, May, 1–6. https://www.techrxiv.org/articles/Ten_Deadly_Cyber_Security_Threats_Amid_COVID-19_Pandemic/12278792
Muhyi, H. A., & Chan, A. (2017). The Penta Helix Collaboration Model in Developing Centers of Flagship Industry in Bandung City. Review of Integrative Business and Economics Research, 6(1), 412–417. http://buscompress.com/journal-home.html
Okereafor, K., & Adelaiye, O. (2020). Randomized Cyber Attack Simulation Model: A Cybersecurity Mitigation Proposal for Post COVID-19 Digital Era. International Journal of Recent Engineering Research and Development (IJRERD), 05(July), 61–72. www.ijrerd.com
Pranggono, B., & Arabo, A. (2020). COVID ‐19 pandemic cybersecurity issues. Internet Technology Letters, 4(2), 1–6. https://doi.org/10.1002/itl2.247
Solms, R. Von, & Niekerk, J. Van. (2013). From information security to cyber security. Computers & Security, 38, 97–102. https://doi.org/10.1016/j.cose.2013.04.004
Weil, T., & Murugesan, S. (2020). IT Risk and Resilience-Cybersecurity Response to COVID-19. IT Professional, 22(3), 4–10. https://doi.org/10.1109/MITP.2020.2988330
Akamai, McKeay, M., Ragan, S., Goedde, A., & Tuttle, C. (2021). Adapting to the Unpredictable. In State of the Internet (Vol. 7, Issue 1). https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/soti-security-research-adapting-to-the-unpredictable-report-2021.pdf
ISO. (2005). ISO/IEC: 27002 Code of Practice for Information Security Management. ISO.
NIST. (2018). Framework for improving critical infrastructure cybersecurity. In Proceedings of the Annual ISA Analysis Division Symposium (Vol. 535).
OECD. (2012). Cybersecurity Policy Making at a Turning Point. Analysing a new generation of national cybersecurity strategies for the Internet economy. https://doi.org/http://dx.doi.org/10.1787/5k8zq92vdgtl-en
Pusat Operasi Keamanan Siber Nasional. (2021). Laporan Tahunan Hasil Monitoring Keamanan Siber 2020. In Buletin Jendela Data dan Informasi Kesehatan.
Undang-Undang Republik Indonesia. (2008). UU RI Nomor 11 Tahun 2008 Tentang ITE (dan perubahannya).
Lindmark, A., Sturesson, E., & Nilsson-Roos, M. (2009). Difficulties of collaboration for innovation - A study in the Öresund region [Lund University]. http://lup.lub.lu.se/student-papers/record/1437850