Analisis Keamanan Siber dan Hukum: Studi Kasus Bjorka
DOI:
https://doi.org/10.61722/jemba.v2i3.948Abstract
Technology has always been a powerful tool in advancing human civilization. It allows us to become more organized, efficient, and connected. Since the advent of the Internet, we have increasingly relied on electronic communications as a means of conducting business. Cybersecurity, which also includes authentication, non-repudiation, and accountability, is an effort to protect the confidentiality, integrity, and availability of information in cyberspace. The process of protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks falls under the category of cybersecurity. The following questions were used to evaluate the descriptive data in this paper, which uses a qualitative management approach: What triggers hackers to infiltrate Indonesia and how does the government respond to it?
Keywords: cybersecurity, data privacy, cyber law
References
“UU No. 27 Tahun 2022 tentang Pelindungan Data Pribadi,” peraturan.bpk.go.id. [Online]. Available: https://peraturan.bpk.go.id/Home/Details/229798/uu-no-27- tahun-2022. .Database Peraturan | JDIH BPK
CNN Indonesia, “Siapa Bjorka dan Kenapa ‘Mengacak-acak’ Indonesia?,” teknologi, Oct. 12, 2022. [Online]. Available: https://www.cnnindonesia.com/teknologi/20220912053812-192-846395/siapa- bjorka-dan-kenapa-mengacak-acak-indonesia. .
Kaspersky, “What is Cyber Security?,” 2019. [Online]. Available: https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security. .
R. K. Siregar, “Perbedaan Hacker dan Cracker,” www.djkn.kemenkeu.go.id, Sep. 27, 2022. [Online]. Available: https://www.djkn.kemenkeu.go.id/kanwil-rsk/baca- artikel/15422/Perbedaan-Hacker-dan-Cracker.html. .
Kaspersky, “Black hat, White hat, and Gray hat hackers – Definition and Explanation,” Apr. 09, 2021. [Online]. Available: https://www.kaspersky.com/resource- center/definitions/hacker-hat-types. .
O. Buxton, “Hacker Types: Black Hat, White Hat, and Gray Hat Hackers,” Oct. 12, 2022. [Online]. Available: https://www.avast.com/c-hacker-types. .
“UU No. 19 Tahun 2016 tentang Perubahan Atas Undang-Undang Nomor 11 Tahun 2008 Tentang Informasi Dan Transaksi Elektronik,” peraturan.bpk.go.id. [Online].
Available: https://peraturan.bpk.go.id/Home/Details/37582/uu-no-19-tahun-2016. [Accessed: Dec. 28, 2022].
A. Chendramata, “Indonesia Cyber Security Strategy,” dephub.go.id. [Online]. Available: https://dephub.go.id/public/files/uploads/posts/posts/postbody/strategi_cs_nasiona l_desember2016.pdf. [Accessed: Dec. 28, 2022].
I. R. Dewi, “Hacker Bjorka is Back, Data Apa Saja yang Pernah Dibocorkan?,” CNBC Indonesia, Nov. 11, 2022. [Online]. Available: https://www.cnbcindonesia.com/tech/20221111075351-37-386931/hacker-bjorka- is-back-data-apa-saja-yang-pernah-dibocorkan. [Accessed: Dec. 28, 2022].
A. Subagyo, “SINERGI DALAM MENGHADAPI ANCAMAN CYBER WARFARE,”
Jurnal Pertahanan & Bela Negara, vol. 5, no. 1, Aug. 2018. [Online]. Available: https://doi.org/10.33172/jpbh.v5i1.350.
P. Pannen, “Quality Assurance in Online Learning at Scale at the Indonesia Cyber
Education Institute,” Education in the Asia-Pacific Region: Issues, Concerns and Prospects, pp. 121–134, 2021. [Online]. Available: https://doi.org/10.1007/978- 981-16-0983-1_9.
“Menyingkap Tabir Istilah Hacker dan Cracker,” www.djkn.kemenkeu.go.id. [Online].
Available: https://www.djkn.kemenkeu.go.id/kpknl-purwakarta/baca- artikel/15368/Menyingkap-Tabir-Istilah-Hacker-dan-Cracker.html. .Kemenkeu
“Permen Kominfo Nomor 20 Tahun 2016 tentang Perlindungan Data Pribadi dalam Sistem Elektronik,” peraturan.bpk.go.id. [Online]. Available: https://peraturan.bpk.go.id/Download/142743/Permen%20Kominfo%20Nomor%2 020%20Tahun%202016.pdf. .Database Peraturan | JDIH BPK
“Personal Data Protection Authority Institute,” Wikipedia. [Online]. Available: https://en.wikipedia.org/wiki/Personal_Data_Protection_Authority_Institute. . Wikipedia
“Perpres Nomor 49 Tahun 2024 tentang Pelaksanaan UU No. 27 Tahun 2022,” peraturan.bpk.go.id. [Online]. Available:https://peraturan.bpk.go.id/Download/341380/Perpres%20Nomor%2049%20Tahu n%202024.pdf. .
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 JURNAL ILMIAH EKONOMI, MANAJEMEN, BISNIS DAN AKUNTANSI

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.