Threats of Data Leakage in Military Security Systems In the Regional Military Command III/Siliwangi

Authors

  • Diana Indriyana Sekolah Tinggi Intelijen Negara
  • Budi Prasetyono Sekolah Tinggi Intelijen Negara
  • Aloysus Mado Sekolah Tinggi Intelijen Negara

DOI:

https://doi.org/10.70710/sitj.v2i1.37

Keywords:

Data Leakage, Military Security System, Threat

Abstract

This research investigates the threat of data leakage to the military security system in the Kodam III/Siliwangi region. While advancements in information technology have positively impacted society, they also bring the threat of cybercrime. The Indonesian government has responded by enacting the Personal Data Protection Law and strengthening inter-agency collaboration to prevent and address cybercrimes. The threat of data leakage in the Kodam III/Siliwangi region falls under non-physical and unconventional military threats, posing risks to national security and social stability.

Downloads

Download data is not yet available.

References

Alan F. Westin. 1967. Privacy and Freedom. New York :Atheneum

Bhatia, P., & Sehrawat, R. 2014. Type of Security Threats and its Prevention. IJSRDInternational Journal for Scientific Research & Development|, 2(08), 2321–0613. Retrieved from www.ijsrd.com

Bram Hazkiel, Ulfatun Fatma. 2022. Perlidungan Data Pribadi Warga Negara

Cengage Learning.

Clarke,Richard A. dan Robert K.Knake. 2010. Cyber War-The Next Threat to National Security and What to Do About It.

Cornish, D. B., & Clarke, R. V. 2003. Opportunities, Precipitators, and Criminal Decisions: A Reply to Wortley’s Critique of Situational Crime Prevention. Crime Prevention Studies, Vol.16, 41-96.

Dian Ekawati, Dian. 2018. “Perlindungan Hukum Terhadap Nasabah Bank Yang Dirugikan Akibat Kejahatan Skimming Ditinjau Dari Perspektif Teknologi Informasi Dan Perbankan,” Jurnal Unes Law Review 1, No. 2 (2018): 158

Grant, Robert M. 2016. Contemporary Strategy Analysis: Text and Cases. Ninth Edition. Chichester, West Sussex, United Kingdom: Wiley.

Habermas, Jürgen, Thomas Burger, and Frederick Lawrence. 1992. The Structural Transformation of The Public Sphere: An Inquiry Into a Category of Bourgeois Society. Cambridge (Mass.): The MIT press.

Indonesia Terkait Dengan Kebocoran Data. Jurnal Kewarganegaraan. Vol.6. No. 1. Universitas Sebelas Maret.

Jemadu, Aleksius. 2007. ‘Praktek-Praktek Intelijen Dan Pengawasan Demokratis: Pandangan Praktisi’. Geneva Centre For The Democratic Control Of Armed Forces (Dcaf) II: 23.

Jouini, M., Rabai, L. B. A., & Aissa, A. Ben. 2014. Classification of security threats in information systems. Procedia Computer Science, 32, 489–496. https://doi.org/10.1016/j.procs.2014.05.452

Kahn, David. 2001. ‘An Historical Theory of Intelligence’. Intelligence and National Security 16(3): 79–92.

Konakalla, A., & Veeranki, B. 2013. Evolution of Security Attacks and Security Technology. Ijcsmc, 2(11), 270–276

M Hasan Rumlus, Hartadi. 2020. Kebijakan Penanggulangan Pencurian Data

M. Ade. 2022. Analisis RUU Perlindungan Data Pribadi.

M. Romli, Asep Syamsul. 2008. Kamus Jurnalistik. Bandung: Simbiosa Rekatama Media.

Pawar, M. V., & Anuradha, J. 2015. Network security and types of attacks in network. Procedia Computer Science, 48(C), 503–506. https://doi.org/10.1016/j.procs.2015.04.126

Pribadi dalam Media Elektronik. Volume 11, No. 2

Pusat Operasi Keamanan Siber Nasional (Pusopskamsinas) BSSN. 2019. “Panduan Menghadapi Data Breach,”

Putri, Edelweiss Premaulidiani. 2022. Pentingnya Perlindungan Data di Indonesia Sebagai Upaya Tanggung Jawab Hukum Atas Kebocoran Data. Tesis. Magister Hukum. Universitas Islam Indonesia

Segala, Saiful. 2013. Administrasi Pendidikan Kontemporer. Bandung: Alfabeta.

Silalahi, Putri Hasian dan Fiorella Angella Dameria. 2023. Perlindungan Data Pribadi Mengenai Kebocoran Data Dalam Lingkup Cyber Crime Sebagai Kejahatan Transnasional. Wajah Hukum Volume 7(2), Oktober 2023, 614-627 Fakultas Hukum Universitas Batanghari Jambi ISSN 2598-604X (Online) | DOI 10.33087/wjh.v7i2.1244

Singer, P. W., & Friedman, A. 2014. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.

Warner J. Severin dan James W. Tankard, Jr..2011. Teori Komunikasi: Sejarah, Metode, & Terapan Di dalam Media Massa. Jakarta: Kencana Prenada Media Group

Whitman, M., & Mattord, H. 2017. Management of Information Security.

Downloads

Published

2025-03-07

How to Cite

Indriyana, D., Prasetyono, B., & Mado, A. (2025). Threats of Data Leakage in Military Security Systems In the Regional Military Command III/Siliwangi. Security Intelligence Terrorism Journal (SITJ), 2(1), 95–98. https://doi.org/10.70710/sitj.v2i1.37

Issue

Section

Articles

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.