FORENSIK JARINGAN UNTUK INVESTIGASI KEJAHATAN CYBER PADA STUDI KASUS PEMBOBOLAN DATA KOMINFO OLEH BJORKA

Authors

  • Aspiani Putri Ashilah Institut Teknologi Bacharuddin Jusuf Habibie Author
  • Rakhmadi Rahman Institut Teknologi Bacharuddin Jusuf Habibie Author

DOI:

https://doi.org/10.69714/g2pay047

Keywords:

cyber crime, cyber security, Cyber attack prevention, Bjorka

Abstract

The study is to investigate the phenomenon of cybercrime, specifically focusing on the Bjorka data breach at Kominfo. Cybercrime has grown to be a serious threat to Indonesia's cyber security, including data theft, hacking, and malware attacks. This study approach employs qualitative descriptive techniques via a methodical examination of documents, including journal articles from both domestic and foreign publications. Based on analysis, it was found that Bjorka committed data breaches to protest government policies and highlight security weaknesses. The study also explores measures to prevent cybercrime, such as the use of security technology, user training, and the implementation of strict security policies. Encryption tools like Veracrypt should be used to protect sensitive data from theft. The research results are expected to raise awareness and collaborative efforts among governments, associated organizations, and communities to address the threat of cybercrime as well as strengthen national cyber defences

References

M. Z. Rizaldi, R. D. Putra, dan A. Ul Hosnah, “Analisis Kasus Cybercrime Dengan Studi Kasus Hacker Bjorka Terhadap Pembocoran Data,” JUSTITIA J. Ilmu Huk. dan Hum., vol. 6, no. 2, hal. 619, 2023, doi: 10.31604/justitia.v6i2.619-627.

F. Y. N. Sufi, D. K. Putri, dan D. Suhartini, “Analisis Ancaman Cybercrime dan Peran Sistem Biometrik : Systematic Literature Review,” Pros. Senapan, vol. 3, no. 1, hal. 19–29, 2023.

BSSN, “Lanskap Keamanan Siber Indonesia,” no. 70, 2024.

C. Hidayatullah, “Jenis dan Dampak Cyber Crime,” Pros. SAINTEK Sains dan Teknol., vol. 2, no. 1, hal. 216–221, 2023, [Daring]. Tersedia pada: https://www.jurnal.pelitabangsa.ac.id/index.php/SAINTEK/article/view/2159

Setyaji, A. G., Kurniawan, D., & Siswanto, E. (2023). KONTROL BERBASIS SYNCHRONVERTER DAN MODEL PREDIKTIF UNTUK MULTI-PORT AUTONOMOUS RECONFIGURABLE SOLAR PLANTS. Informatika: Jurnal Teknik Informatika dan Multimedia, 3(1), 59-80.

Asry, D. W., Siswanto, E., Kurniawan, D., & Huda, H. I. (2023). Deteksi Malware Statis Menggunakan Deep Neural Networks Pada Portable Executable. Teknik: Jurnal Ilmu Teknik dan Informatika, 3(1), 19-34.

Yulhendri, Y., Simorangkir, H., Faridho, F., & Kurniawan, D. (2022). Implementasi Digital Dashboard Untuk Mengontrol Wilayah Rt/Rw. Jurnal Informatika Dan Tekonologi Komputer (JITEK), 2(1), 43-54.

Downloads

Published

2024-07-10

How to Cite

FORENSIK JARINGAN UNTUK INVESTIGASI KEJAHATAN CYBER PADA STUDI KASUS PEMBOBOLAN DATA KOMINFO OLEH BJORKA (Aspiani Putri Ashilah & Rakhmadi Rahman , Trans.). (2024). Jurnal Riset Sistem Informasi, 1(3), 17-26. https://doi.org/10.69714/g2pay047