scholarly journals Strategi Penguatan Cyber Security Guna Mewujudkan Keamanan Nasional di Era Society 5.0

Author(s):  
Eko Budi ◽  
Dwi Wira ◽  
Ardian Infantono

Konsep Society 5.0 berpusat pada manusia dan berbasis teknologi. Dimana penggerak utama industri adalah teknologi dan masyarakat modern. Di era teknologi dan informasi berkembang dengan pesat memiliki dampak terhadap seluruh aspek kehidupan. Salah satunya adalah aspek keamanan berupa ancaman cyber crime. Oleh karena itu cyber security mempunyai peran vital untuk mencegah terjadinya cyber crime. Tujuan dari penelitian ini adalah untuk memperoleh gambaran tentang cyber crime dan tantangannya kedepan, strategi cyber security di Indonesia serta penguatan cyber security di Indonesia dalam rangka mewujudkan keamanan nasional di era society 5.0. Metode penelitian yang digunakan adalah pendekatan kualitatif dan deskriptif analitis dengan teknik pengumpulan data menggunakan studi pustaka dari penelitian sebelumnya dan data sekunder lainnya. Hasil dari penelitian ini adalah pandemi Covid-19 menjadi topik utama dalam tren keamanan siber. Para peretas memanfaatkan keresahan masyarakat sebagai celah dalam meluncurkan berbagai serangan, mulai dari phishing hingga ransomware, kasus kebocoran data 91 juta pengguna situs belanja online Tokopedia dan kebocoran data 1,2 juta pengguna situs Bhinneka. Indonesia pun terdampak oleh kasus keamanan siber global seperti Coronavirus Ransomware, Covidlock Malware, peretasan Border Gateway Protocol, kerentanan pada produk router Draytek Vigor, adanya Remote Code Execution pada beberapa versi produk sistem operasi Windows, kerentanan terjadinya Arbitrary Code Execution pada seluruh sistem operasi Google Android, hingga eksploitasi produk Solar Winds Orion Platform. Kesimpulannya adalah saat ini Indonesia tengah dalam keadaan darurat cyber security dan sudah mencapai tahap memprihatinkan. Strategi cyber security yang harus dilakukan Indonesia untuk mewujudkan keamanan nasional di era society 5.0, adalah 1) capacity building, 2) Pembentukan undang-undang khusus tentang tindak pidana siber, 3) Peningkatan sumberdaya manusia, 4) Kerjasama stakeholder di dalam negeri dan kerjasama internasional bidang cyber security untuk mewujudkan keamanan nasional di era society 5.0.

Author(s):  
Juveriya Afreen

Abstract-- With increase in complexity of data, security, it is difficult for the individuals to prevent the offence. Thus, by using any automation or software it’s not possible by only using huge fixed algorithms to overcome this. Thus, we need to look for something which is robust and feasible enough. Hence AI plays an epitome role to defense such violations. In this paper we basically look how human reasoning along with AI can be applied to uplift cyber security.


2021 ◽  
pp. 000486582110039
Author(s):  
Benoît Dupont ◽  
Chad Whelan

‘Cybercrime’ is an umbrella concept used by criminologists to refer to traditional crimes that are enhanced via the use of networked technologies (i.e. cyber-enabled crimes) and newer forms of crime that would not exist without networked technologies (i.e. cyber-dependent crimes). Cybersecurity is similarly a very broad concept and diverse field of practice. For computer scientists, the term ‘cybersecurity’ typically refers to policies, processes and practices undertaken to protect data, networks and systems from unauthorised access. Cybersecurity is used in subnational, national and transnational contexts to capture an increasingly diverse array of threats. Increasingly, cybercrimes are presented as threats to cybersecurity, which explains why national security institutions are gradually becoming involved in cybercrime control and prevention activities. This paper argues that the fields of cyber-criminology and cybersecurity, which are segregated at the moment, are in much need of greater engagement and cross-fertilisation. We draw on concepts of ‘high’ and ‘low’ policing ( Brodeur, 2010 ) to suggest it would be useful to consider ‘crime’ and ‘security’ on the same continuum. This continuum has cybercrime at one end and cybersecurity at the other, with crime being more the domain of ‘low’ policing while security, as conceptualised in the context of specific cybersecurity projects, falls under the responsibility of ‘high’ policing institutions. This unifying approach helps us to explore the fuzzy relationship between cyber- crime and cyber- security and to call for more fruitful alliances between cybercrime and cybersecurity researchers.


Author(s):  
Thokozani Ian Nzimakwe

Cybersecurity is the practice of making the networks that constitute cyber space secure against intrusions. The aim is to maintain the confidentiality, the availability and integrity of information, by detecting interferences. Traditionally, cybersecurity has focused on preventing intrusions and monitoring ports. The evolving threat landscape, however, calls for a more dynamic approach. It is increasingly clear that total cybersecurity is impossible, unless government develops a cyber-security strategy. The aim of this chapter is to discuss government's dynamic approach to addressing challenges of cybersecurity. The chapter looks at the co-ordination of cyber-security activities so as to have a coordinated approach to cyber-crime. This chapter also highlights the idea of protecting sensitive data for the public good. It is generally accepted that technology has become indispensable in modern society. Government's cybersecurity presents a unique challenge simply because of the volume of threats that agencies working for government face on a daily basis.


Author(s):  
Sujitha S. ◽  
Parkavi R.

This book chapter will be an introduction to hacking, DDOS attacks and Malware Analysis. This chapter will also describe about the cyber-crime against properties and Persons and will give a detailed description about the cyber security and privacy. This chapter will deal with the cyber-crime investigations, law enforcement policy and procedures. This chapter will also describe about the peer supporting programs for the law enforcement authorities and a detailed description about the control devices and techniques that are used by an officer. This chapter will give an opportunity to know about the evidence collecting procedures in cyber-crime and also the barriers to cybercrime investigations.


2018 ◽  
Vol 7 (3.19) ◽  
pp. 39 ◽  
Author(s):  
Moses Adah Agana ◽  
Ruth Wario

This research work was designed to utilize multi-level cyber crime detection and control system to provide enhanced real-time evidence to cyber crime investigators to aid them in prosecuting cyber criminals. The design was based on a robust system combining user-identity, device identity, geographical location and user activities to provide evidences to uniquely identify a cyber user and detect crimes committed. The system captures the user’s facial image and biometric finger print as mandatory login parameters in addition to username and password before granting access. The system was tested and implemented in a real time cyber security website www.ganamos.org.  The results showed that it is possible to divulge the identity of cyber users and associate their activities with the devices they use, the date, time and location of operation. These can provide real-time evidences to law enforcement agencies to track down and prosecute cyber criminals. 


2016 ◽  
Vol 8 (1) ◽  
pp. 59
Author(s):  
Ritesh Saxena

The book beings with introduction to Cyber Security discuss the alarming growth rate of Cyber crime and its consequences. It acquaints the users with the risks and vulnerabilities of the cyber world. It emphasizes on the need of a secured IT infrastructure.


Author(s):  
Vihang Dilip Gaokar ◽  
Karan Harish Tundejwala

In the world of full of technology and digitization security is the main concern right now. With the help of internet, we can do most of our work like shopping, office work, e-banking, other transactions, etc. With mobile banking everyone knows how to do transactions, online shopping, but most of the people don’t know what the security while doing any kind of online work, people have lack of knowledge in cyber security and hacker, cyber criminals take advantage of that. According to report in 2020, the transaction volume share in India stood at 15.6 per cent and 22.9 per cent for instant payments and other electronic payments respectively, while paper-based payments had a considerable share of 61.4 per cent. And by the 2024 the electronic transaction will increase by 50% and this will touch 71.7% by 2025. India is a developing country and is moving forward in digitization. While this is happening securing the online data or transaction will become more and more challenging. E- banking makes work easier and fast but it is not safe, it will never be 100% secure. And cybercrime is increasing faster than we imagine. This study paper mainly focuses on banking frauds in India, online transaction, scenarios faced by cyber victims, e-banking challenges. It also focuses on the cyber security and how can we avoid most of the e-banking fraud.


With the rapid advancements in technology, our lives have become completely digitalised. We sit in the comfort of our home, and carry out our day-to-day activities like grocery shopping, education, banking, through the Internet. However, this has given rise to several threats to our security, called the cyber-crime which has become a global concern. Cybercrimes affect the lives of millions of people all around the world, including businesses, organisations and governments of different nations. This paper aims to determine the association between cybercrime awareness and the age, and to identify the difference between main cause of cybercrime and the gender. Descriptive research has been carried out which helps us to understand the characteristics of an individual or a group. The sampling method used here is convenient sampling where the samples have been chosen based on ease of access of availability. The sample size is 1540. Age, Gender and Occupation are the independent variables. Cyber-crime awareness, the main cause of cybercrime and the most popular cyber-crime are the dependent variables used here. The tools used here are Chi-Square, Independent Sample t test and ANOVA. It was found that there is a significant association between the cyber-crime awareness and the age of the respondent and that there is no significant difference between the main cause of cyber-crime and gender. With the rapid rise in the rate of cyber-crimes, it is imperative that the government provide the people with more effective ways of cyber security in order to protect the society.


Author(s):  
Syed Ubaid ◽  
Shakil ◽  
Mohammed Talha Alam ◽  
Shahab Saquib Sohail

This paper analyses the increasing cyber-crime in India, especially in the rural areas, andcyber-attacks on service-providing government websites. Cyber-attacks are viewed within the context of important events to reveal the effectiveness of cyber-attack campaigns. The analysis highlights the range of cyber issues experienced during the lockdown in the country due to the COVID-19 pandemic. The paper shows how work-from-home campaigns digitalize the population, and how rural people become the victim of cyber-attacks. The analysis also emphasizes possible solutions to strengthen cyber security.


2015 ◽  
Vol 3 (3) ◽  
pp. 266-270
Author(s):  
Muhamad Asyraf Ahmad Termimi ◽  
Muhammad Ikhlas Rosele ◽  
Khairul Azhar Meerangani ◽  
Syamsul Azizul Marinsah ◽  
Mohd Anuar Ramli

Cyber crimes is a new millennium threat to society nowadays which brings by developments of technology and information. Various forms of cyber crimes exist either theft and fraud involving money and property or safety threat involving contamination of dignity. Therefore, this study will identify cyber crimes related to women in Malaysia for cases of theft and fraud of money and property through cyberspace. Cyber crimes will be identified and classified according to cases that often occurred in Malaysia and legal protection provided to the victim. The results showed lack of awareness about cyber security transactions and the provision of existing law that exists for cyber crime cause women to be victims of cyber crime.


Sign in / Sign up

Export Citation Format

Share Document