R. E. Indrajit, Marsetio Marsetio, R. Gultom, P. Widodo, R. W. Putro, Pantja Djati, Siswo Hadi, B. Pramono, L. Simbolon
{"title":"印尼国防和军事部门视角下的网络攻击趋势风险映射","authors":"R. E. Indrajit, Marsetio Marsetio, R. Gultom, P. Widodo, R. W. Putro, Pantja Djati, Siswo Hadi, B. Pramono, L. Simbolon","doi":"10.1109/ICIC54025.2021.9633005","DOIUrl":null,"url":null,"abstract":"The European Union Agency for Cybersecurity study shows that there are 15 (fifteen) types of cyber-attacks that will emerge in the next five years. This trend is obtained through an in-depth study of the trend of recent phenomena. The purpose of this study is to try to detect which attacks need attention by the military and state defence sectors in Indonesia. To detect it, a risk analysis method is used in combination with prioritization based on weights. The data was obtained through the involvement of several key experts in the field of cyber defence and security. The results of the study show that eight of the fifteen defined threat trends need special attention by the government and cyber security defence practitioners in Indonesia.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Risk Mapping against Cyber Attack Trend in the Perspective of National Defence and Military Sector in Indonesia\",\"authors\":\"R. E. Indrajit, Marsetio Marsetio, R. Gultom, P. Widodo, R. W. Putro, Pantja Djati, Siswo Hadi, B. Pramono, L. Simbolon\",\"doi\":\"10.1109/ICIC54025.2021.9633005\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The European Union Agency for Cybersecurity study shows that there are 15 (fifteen) types of cyber-attacks that will emerge in the next five years. This trend is obtained through an in-depth study of the trend of recent phenomena. The purpose of this study is to try to detect which attacks need attention by the military and state defence sectors in Indonesia. To detect it, a risk analysis method is used in combination with prioritization based on weights. The data was obtained through the involvement of several key experts in the field of cyber defence and security. The results of the study show that eight of the fifteen defined threat trends need special attention by the government and cyber security defence practitioners in Indonesia.\",\"PeriodicalId\":189541,\"journal\":{\"name\":\"2021 Sixth International Conference on Informatics and Computing (ICIC)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 Sixth International Conference on Informatics and Computing (ICIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIC54025.2021.9633005\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Sixth International Conference on Informatics and Computing (ICIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIC54025.2021.9633005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Risk Mapping against Cyber Attack Trend in the Perspective of National Defence and Military Sector in Indonesia
The European Union Agency for Cybersecurity study shows that there are 15 (fifteen) types of cyber-attacks that will emerge in the next five years. This trend is obtained through an in-depth study of the trend of recent phenomena. The purpose of this study is to try to detect which attacks need attention by the military and state defence sectors in Indonesia. To detect it, a risk analysis method is used in combination with prioritization based on weights. The data was obtained through the involvement of several key experts in the field of cyber defence and security. The results of the study show that eight of the fifteen defined threat trends need special attention by the government and cyber security defence practitioners in Indonesia.