FONDASI KEMANANAN SIBER UNTUK LAYANAN PEMERINTAH

Al-Ijtima`I: International Journal of Government and Social Science 9 (1):21-38 (2023)
  Copy   BIBTEX

Abstract

The use of the internet in the current government environment continues to grow. The increasingly complex use of the internet can cause vulnerabilities to cyber attacks in information security, which include aspects of confidentiality, integrity, and service availability, so that it can disrupt the performance of public service delivery. The systematic literature review research method was carried out because of the large amount of information and data regarding cyber security strategies. This can be traced through various information in books, scientific journals, newspapers, magazines, as well as sources of information from web pages/websites via the internet. This method is important in analyzing the concept of cyber security strategy in Indonesia. The obstacles that the government has are expired devices that are still used on local government networks, which may not have the latest updates, security devices such as antiviruses have expired, human resources have not fully supported this cybersecurity. Indonesia needs policies that regulate all elements related to cyber security. This infrastructure standard must comply with international standards for dealing with cyber warfare.

Similar books and articles

ISSUES AND CHALLENGES OF CYBER CRIME IN INDIA: AN ETHICAL PERSPECTIVE.Gobinda Bhattacharjee - 2021 - International Journal of Creative Research Thoughts 9 (9):b615-b620.
Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.Marwan Albahar - 2019 - Science and Engineering Ethics 25 (4):993-1006.

Analytics

Added to PP
2023-12-11

Downloads
117 (#150,896)

6 months
102 (#52,754)

Historical graph of downloads
How can I increase my downloads?