Analisis kebijakan standardisasi keamanan perangkat telekomunikasi untuk menunjang kebijakan pertahanan dan keamanan nasional [Policy analysis on telecommunication devices security standardization to support national security and defence policy]
Main Article Content
Abstract
Beberapa tahun terakhir, kejadian yang terkait dengan pembobolan informasi meningkat dengan signifikan dan menyebabkan kerugian yang tidak sedikit baik bagi pemerintah, industri maupun perorangan. Oleh karenanya diperlukan jaminan terhadap keamanan informasi terutama yang menyangkut informasi yang sensitif dan rahasia. Untuk mengatasi hal tersebut, diperlukan kebijakan di bidang standarisasi keamanan perangkat telekomunikasi untuk menjamin validitas dan kerahasiaan informasi yang dilewatkan melalui perangkat tersebut. Pendekatan kualitatif maupun kuantitatif digunakan dalam studi ini untuk memperoleh gambaran tentang kondisi penerapan standar keamanan perangkat baik oleh pemerintah maupun industri telekomunikasi serta mengidentifikasi kendala yang dihadapi dalam menjamin keamanan perangkat telekomunikasi baik untuk kebutuhan umum maupun kebutuhan khusus baik dari aspek teknologi, kelembagaan, maupun regulasi. Hasil penelitian menunjukkan belum ada regulasi yang mengatur standarisasi keamanan perangkat telekomunikasi untuk kebutuhan khusus. Selain itu belum ada penetapan secara eksplisit tentang lembaga yang berwenang dalam pengujian dan sertifikasi keamanan perangkat telekomunikasi terutama untuk kebutuhan khusus. Sejumlah regulasi yang mengatur secara spesifik bidang standarisasi keamanan perangkat telekomunikasi saat ini masih dalam proses penyusunan oleh instansi-instansi terkait.
*****
In the past years, incidents involving information security breach increase significantly and cause huge damage to industry, government or individual. Due to that, information security needs to be well guaranteed especially when it comes to sensitive and confidential information. One has to be done to cope with that is the availibility of policy on telecommunication devices security standardization to assure validity and confidentiality of all information going through the devices. Both qualitative and quantitative method used in this study to describe implementation of telecommnunication devices security that has been done by both government and ICT industry and also to identify obstacles in implementation of telecommunication device security assurance for both public and special purposes, from technology, institutional, and regulation aspects. This study showed that any regulation related with telecommunication device security standardization for special purposes has not been provided yet. Besides, authorized institution to examine and certify telecommunication devices security especially for specific purposes has not been assigned yet.
Article Details
Authors who publish with this journal agree to the following terms:
- Copyright on any article is retained by the author(s).
- Author grant the journal, right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work’s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
- The article and any associated published material is distributed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License
References
David J. Icove. (1997). Collaring the cybercrook: an investigator’s view. IEEE Spectrum, 31–36.
Dowd, P. W., & McHenry, J. T. (1998). Network Security: It’s Time To Take It Seriously. IEEE Computer, September, 24–28.
Garfinkel, S. (1995). PGP: Pretty Good Privacy. O’Reilly & Associates,Inc.
J.M. Rodriguez Bejarano. (2012). Security in IP satellite networks: COMSEC and TRANSEC integration aspects. In Security in IP satellite networks: COMSEC and TRANSEC integration aspects. The Sixth Advanced Satellite Multimedia Systems Conference.
Juslin, J. (2003). Automatic backdoor analysis with a network intrusion detection system and an integrated service checker. Information Assurance Workshop.
Kiblat.mht. (2015). http://www.kiblat.net/2015/02/25/dan-inggris-retas-ponsel-seluruh-dunia-ini-10-hal-yang-perlu-anda-tahu/.
NargesArastouie, E. S. dan. (2011). Backdoor detection system using artificial neural network and genetic algorithm.
Paryati. (2008). Keamanan Sistem Informasi. Seminar Nasional Informatika 2008.
Rahardjo, B. (1999). Keamanan Sistem Informasi Berbasis Internet. Bandung: PT Insan Komunikasi / Infonesia.
Richardus, Eko, & Indrajit. (2011). MANAJEMEN KEAMANAN INFORMASI DAN INTERNET.
Schrittwieser, S., Fr¨uhwirt, P., Kieseberg, P., Leithner, M., Mulazzani, M., Huber, M., & Weippl, E. (2012). Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications. SBA Research gGmbH.
Stove, A. G. (2004). Low probability of intercept radar strategies. IEEE Proceedings on Radar, Sonar and Navigation, 151(5).
Wamala, F. (2011). ITU National Cyber Security Strategy Guide. ITU.
Wicaksono, N. (2007). AUREN: Sistem Pengamanan Smartphone dengan Penghapusan Informasi Berharga dan Pengiriman Informasi untuk pelacakan otomatis. Bandung.
William Stallings. (1995). Network and Internetwork Security. PrenticeHall.
Woods, S. S. dan C. (2012). Breakthrough silicon scanning discovers backdoor in military chip.