R. E. Indrajit, Marsetio Marsetio, R. Gultom, P. Widodo, R. W. Putro, Pantja Djati, Siswo Hadi, B. Pramono, L. Simbolon
{"title":"Risk Mapping against Cyber Attack Trend in the Perspective of National Defence and Military Sector in Indonesia","authors":"R. E. Indrajit, Marsetio Marsetio, R. Gultom, P. Widodo, R. W. Putro, Pantja Djati, Siswo Hadi, B. Pramono, L. Simbolon","doi":"10.1109/ICIC54025.2021.9633005","DOIUrl":null,"url":null,"abstract":"The European Union Agency for Cybersecurity study shows that there are 15 (fifteen) types of cyber-attacks that will emerge in the next five years. This trend is obtained through an in-depth study of the trend of recent phenomena. The purpose of this study is to try to detect which attacks need attention by the military and state defence sectors in Indonesia. To detect it, a risk analysis method is used in combination with prioritization based on weights. The data was obtained through the involvement of several key experts in the field of cyber defence and security. The results of the study show that eight of the fifteen defined threat trends need special attention by the government and cyber security defence practitioners in Indonesia.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Sixth International Conference on Informatics and Computing (ICIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIC54025.2021.9633005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The European Union Agency for Cybersecurity study shows that there are 15 (fifteen) types of cyber-attacks that will emerge in the next five years. This trend is obtained through an in-depth study of the trend of recent phenomena. The purpose of this study is to try to detect which attacks need attention by the military and state defence sectors in Indonesia. To detect it, a risk analysis method is used in combination with prioritization based on weights. The data was obtained through the involvement of several key experts in the field of cyber defence and security. The results of the study show that eight of the fifteen defined threat trends need special attention by the government and cyber security defence practitioners in Indonesia.