PERANG CYBER SEBAGAI BENTUK PEPERANGAN ASIMETRIS: PERSPEKTIF FILSAFAT KEAMANAN DIGITAL DAN NIST CYBERSECURITY FRAMEWORK
Abstract
Keywords
Full Text:
PDFReferences
Brown, H. (1983). Technology, Military Equipment, and National Security. The US Army War College Quarterly: Parameters, 13(1), 3
Clausewitz, C. (1984). On War. "An act of violence intended to compel our opponent to fulfil our will." Princeton University Press.
Denning, D. E. (1999). Information Warfare and Security. Addison-Wesley.
Freedman, L. (2006). The Transformation of Strategic Affairs. Routledge.
Kim, P., & Solomon, M. (2018). Digital security and ethical implications in the age of cyber warfare. Oxford University Press.
Nye, J. S. (2011). The Future of Power. PublicAffairs.
Susanto, H. (2011). Pertahanan siber dan tantangan nasional dalam era digital. Bandung: ITB Press.
Dunn Cavelty, M. (2015). Cybersecurity in the national security discourse: The case of the United States. International Studies Review, 17(2), 191–209. https://doi.org/10.1111/misr.12232
Turner, H. (1982). Britain, the United States and scandinavian security problems 1945-1949. University of Aberdeen (United Kingdom).
Lele, A. (2014). Asymmetric warfare in the contemporary strategic environment. Defence Studies Journal, 10(2), 123-145.
Lele, A. (2014). Asymmetric Warfare: A State vs Non-State Conflict. OASIS, (20), 97-111.
Liff, A. P. (2013). Cyberwar: A new "absolute weapon"? The proliferation of cyberwarfare capabilities and interstate war. Journal of Strategic Studies, 36(1), 33–62. https://doi.org/10.1080/01402390.2012.742014
Raharjo, D. (2017). Partisipasi masyarakat dalam keamanan digital: Perspektif etika dan keamanan. Jurnal Teknologi Informasi dan Komunikasi, 12(3), 221-236.
Khan, A. A. (2005). Asymmetric warfare: A theory for fighting complex threats. War College Research Papers.
McKenzie, K. (2000). Types of asymmetric warfare. [Publication details unavailable].
RAND Corporation. (1996). The Advent of Netwar (Revisited). RAND Corporation. Retrieved from https://www.rand.org/pubs/monograph_reports/MR1382.html
Arquilla, J., & Ronfeldt, D. (1993). Cyberwar is Coming!. RAND Corporation. Retrieved from https://www.rand.org/pubs/reports/R3991.html
Kompas. (2024). “Brain Cipher Telah Berikan Kunci Enkripsi Ransomware PDN, Apakah Sudah Bisa Dipakai?”. Kompas. Retrieved from https://www.kompas.com/tren/read/2024/07/04/121500065/brain-cipher-telah-berikan-kunci-enkripsi-ransomware-pdn-apakah-sudah-bisa?page=all
Kompas.com. (2024). Serangan hacker Brain Cipher terhadap Pusat Data Nasional Indonesia. Kompas. Retrieved from https://www.kompas.com
Kuehl, D. (2000). The Information Revolution and the Transformation of Warfare. Parameters, 30(3), 30–39.
DOI: http://dx.doi.org/10.31604/jips.v12i3.2025.1194-1206
Article Metrics
Abstract view : 144 timesPDF - 65 times
Refbacks
- There are currently no refbacks.