FORENSIK JARINGAN UNTUK INVESTIGASI KEJAHATAN CYBER PADA STUDI KASUS PEMBOBOLAN DATA KOMINFO OLEH BJORKA
DOI:
https://doi.org/10.69714/g2pay047Keywords:
cyber crime, cyber security, Cyber attack prevention, BjorkaAbstract
The study is to investigate the phenomenon of cybercrime, specifically focusing on the Bjorka data breach at Kominfo. Cybercrime has grown to be a serious threat to Indonesia's cyber security, including data theft, hacking, and malware attacks. This study approach employs qualitative descriptive techniques via a methodical examination of documents, including journal articles from both domestic and foreign publications. Based on analysis, it was found that Bjorka committed data breaches to protest government policies and highlight security weaknesses. The study also explores measures to prevent cybercrime, such as the use of security technology, user training, and the implementation of strict security policies. Encryption tools like Veracrypt should be used to protect sensitive data from theft. The research results are expected to raise awareness and collaborative efforts among governments, associated organizations, and communities to address the threat of cybercrime as well as strengthen national cyber defences
References
M. Z. Rizaldi, R. D. Putra, dan A. Ul Hosnah, “Analisis Kasus Cybercrime Dengan Studi Kasus Hacker Bjorka Terhadap Pembocoran Data,” JUSTITIA J. Ilmu Huk. dan Hum., vol. 6, no. 2, hal. 619, 2023, doi: 10.31604/justitia.v6i2.619-627.
F. Y. N. Sufi, D. K. Putri, dan D. Suhartini, “Analisis Ancaman Cybercrime dan Peran Sistem Biometrik : Systematic Literature Review,” Pros. Senapan, vol. 3, no. 1, hal. 19–29, 2023.
BSSN, “Lanskap Keamanan Siber Indonesia,” no. 70, 2024.
C. Hidayatullah, “Jenis dan Dampak Cyber Crime,” Pros. SAINTEK Sains dan Teknol., vol. 2, no. 1, hal. 216–221, 2023, [Daring]. Tersedia pada: https://www.jurnal.pelitabangsa.ac.id/index.php/SAINTEK/article/view/2159
Setyaji, A. G., Kurniawan, D., & Siswanto, E. (2023). KONTROL BERBASIS SYNCHRONVERTER DAN MODEL PREDIKTIF UNTUK MULTI-PORT AUTONOMOUS RECONFIGURABLE SOLAR PLANTS. Informatika: Jurnal Teknik Informatika dan Multimedia, 3(1), 59-80.
Asry, D. W., Siswanto, E., Kurniawan, D., & Huda, H. I. (2023). Deteksi Malware Statis Menggunakan Deep Neural Networks Pada Portable Executable. Teknik: Jurnal Ilmu Teknik dan Informatika, 3(1), 19-34.
Yulhendri, Y., Simorangkir, H., Faridho, F., & Kurniawan, D. (2022). Implementasi Digital Dashboard Untuk Mengontrol Wilayah Rt/Rw. Jurnal Informatika Dan Tekonologi Komputer (JITEK), 2(1), 43-54.