Threats of Data Leakage in Military Security Systems In the Regional Military Command III/Siliwangi
DOI:
https://doi.org/10.70710/sitj.v2i1.37Keywords:
Data Leakage, Military Security System, ThreatAbstract
This research investigates the threat of data leakage to the military security system in the Kodam III/Siliwangi region. While advancements in information technology have positively impacted society, they also bring the threat of cybercrime. The Indonesian government has responded by enacting the Personal Data Protection Law and strengthening inter-agency collaboration to prevent and address cybercrimes. The threat of data leakage in the Kodam III/Siliwangi region falls under non-physical and unconventional military threats, posing risks to national security and social stability.
Downloads
References
Alan F. Westin. 1967. Privacy and Freedom. New York :Atheneum
Bhatia, P., & Sehrawat, R. 2014. Type of Security Threats and its Prevention. IJSRDInternational Journal for Scientific Research & Development|, 2(08), 2321–0613. Retrieved from www.ijsrd.com
Bram Hazkiel, Ulfatun Fatma. 2022. Perlidungan Data Pribadi Warga Negara
Cengage Learning.
Clarke,Richard A. dan Robert K.Knake. 2010. Cyber War-The Next Threat to National Security and What to Do About It.
Cornish, D. B., & Clarke, R. V. 2003. Opportunities, Precipitators, and Criminal Decisions: A Reply to Wortley’s Critique of Situational Crime Prevention. Crime Prevention Studies, Vol.16, 41-96.
Dian Ekawati, Dian. 2018. “Perlindungan Hukum Terhadap Nasabah Bank Yang Dirugikan Akibat Kejahatan Skimming Ditinjau Dari Perspektif Teknologi Informasi Dan Perbankan,” Jurnal Unes Law Review 1, No. 2 (2018): 158
Grant, Robert M. 2016. Contemporary Strategy Analysis: Text and Cases. Ninth Edition. Chichester, West Sussex, United Kingdom: Wiley.
Habermas, Jürgen, Thomas Burger, and Frederick Lawrence. 1992. The Structural Transformation of The Public Sphere: An Inquiry Into a Category of Bourgeois Society. Cambridge (Mass.): The MIT press.
Indonesia Terkait Dengan Kebocoran Data. Jurnal Kewarganegaraan. Vol.6. No. 1. Universitas Sebelas Maret.
Jemadu, Aleksius. 2007. ‘Praktek-Praktek Intelijen Dan Pengawasan Demokratis: Pandangan Praktisi’. Geneva Centre For The Democratic Control Of Armed Forces (Dcaf) II: 23.
Jouini, M., Rabai, L. B. A., & Aissa, A. Ben. 2014. Classification of security threats in information systems. Procedia Computer Science, 32, 489–496. https://doi.org/10.1016/j.procs.2014.05.452
Kahn, David. 2001. ‘An Historical Theory of Intelligence’. Intelligence and National Security 16(3): 79–92.
Konakalla, A., & Veeranki, B. 2013. Evolution of Security Attacks and Security Technology. Ijcsmc, 2(11), 270–276
M Hasan Rumlus, Hartadi. 2020. Kebijakan Penanggulangan Pencurian Data
M. Ade. 2022. Analisis RUU Perlindungan Data Pribadi.
M. Romli, Asep Syamsul. 2008. Kamus Jurnalistik. Bandung: Simbiosa Rekatama Media.
Pawar, M. V., & Anuradha, J. 2015. Network security and types of attacks in network. Procedia Computer Science, 48(C), 503–506. https://doi.org/10.1016/j.procs.2015.04.126
Pribadi dalam Media Elektronik. Volume 11, No. 2
Pusat Operasi Keamanan Siber Nasional (Pusopskamsinas) BSSN. 2019. “Panduan Menghadapi Data Breach,”
Putri, Edelweiss Premaulidiani. 2022. Pentingnya Perlindungan Data di Indonesia Sebagai Upaya Tanggung Jawab Hukum Atas Kebocoran Data. Tesis. Magister Hukum. Universitas Islam Indonesia
Segala, Saiful. 2013. Administrasi Pendidikan Kontemporer. Bandung: Alfabeta.
Silalahi, Putri Hasian dan Fiorella Angella Dameria. 2023. Perlindungan Data Pribadi Mengenai Kebocoran Data Dalam Lingkup Cyber Crime Sebagai Kejahatan Transnasional. Wajah Hukum Volume 7(2), Oktober 2023, 614-627 Fakultas Hukum Universitas Batanghari Jambi ISSN 2598-604X (Online) | DOI 10.33087/wjh.v7i2.1244
Singer, P. W., & Friedman, A. 2014. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.
Warner J. Severin dan James W. Tankard, Jr..2011. Teori Komunikasi: Sejarah, Metode, & Terapan Di dalam Media Massa. Jakarta: Kencana Prenada Media Group
Whitman, M., & Mattord, H. 2017. Management of Information Security.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Security Intelligence Terrorism Journal (SITJ)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.






