Analysis of Knowledge Management Strategies for Handling Cyber Attacks with the Computer Security Incident Response Team (CSIRT) in the Indonesian Aviation Sector
DOI:
https://doi.org/10.59888/ajosh.v2i6.261Keywords:
Knowledge Management, Cyber Attack, CSIRTAbstract
Cyber attacks are one of the genuine threats that have emerged due to the evolution of a more dynamic and complex global strategic environment. In Indonesia, several cyber attacks target various government infrastructure sectors. The National Cyber and Crypto Agency (BSSN) predicts Indonesia will face approximately 370.02 million cyber attacks in 2022. The majority of cyber attacks target the government administration sector. The National Cyber and Crypto Agency (BSSN) officially formed a Computer Security Incident Response Team (CSIRT) to tackle the rampant cybercrime cases. CSIRT is an organization or team that provides services and support to prevent, handle, and respond to computer security incidents. The current CSIRT does not have a data storage process and forensic preparation. CSIRT will repeat the procedure, and so on. This is a repeating procedure; the attack will occur once, and only a technical problem will arise. Therefore, the research entitled "Analysis of Knowledge Management Strategies for Handling Cyber Attacks with the Computer Security Incident Response Team (CSIRT)" is expected to implement this Knowledge Management Strategy to manage existing knowledge so that it can make it easier for the CSIRT team to handle cyber attacks that occur.
References
Alfikri, M., & Ahmad, I. (2022). Evaluasi Implementasi Kebijakan Pembentukan Tim Tanggap Insiden Siber pada Sektor Pemerintah. Matra Pembaruan: Jurnal Inovasi Kebijakan, 6(1), 1–14. https://doi.org/10.21787/mp.6.1.2022.1-14
Fernandes, A., Oliveira, A., Santos, L., & Rabadã, C. (2021). A Strategy for Implementing an Incident Response Plan. European Conference on Cyber Warfare and Security, 120–XIV.
Firmansyah, M., & Yuswanto, A. (2022). Knowledge management for information security incident handling at the Security Operation Center of Jakarta Provincial Government. Monas: Jurnal Inovasi Aparatur, 4(2), 441–452. https://doi.org/10.54849/monas.v4i2.102
HUTAURUK, O. G. (2023). Penerapan Manajemen Risiko Cyber Security Di Atas Mv. Ever Ocean Untuk Mewujudkan Keamanan Teknologi Informasi Di Era Society 5.0.
Islami, M. J. (2018). Tantangan Dalam Implementasi Strategi Keamanan Siber Nasional Indonesia Ditinjau Dari Penilaian Global Cybersecurity Index. Masyarakat Telematika Dan Informasi: Jurnal Penelitian Teknologi Informasi Dan Komunikasi, 8(2), 137–144.
Kaburuan, E. D. (2022). Efektivitas Strategi Polri Dalam Pemberantasan Kejahatan Siber Melalui Asean Ministerial Meeting On Transnational Crime (AMMTC). Universitas Kristen Indonesia.
Kristiyono, J. (2015). Budaya internet: Perkembangan teknologi informasi dan komunikasi dalam mendukung penggunaan media di masyarakat. Scriptura, 5(1), 23–30.
Mahendra, Y. C., & Pinatih, N. K. D. S. A. (2023). Strategi Penanganan Keamanan Siber (Cyber Security) Di Indonesia. Jurnal Review Pendidikan Dan Pengajaran (JRPP), 6(4), 1941–1949.
Prabaswari, P., Alfikri, M., & Ahmad, I. (n.d.). The Implementation of Policy for the Establishment of A Cyber Incident Response Team to Support Information Security in the Government Sector. Matra Pembaruan, 6(1), 1–14. https://doi.org/10.21787/mp.6.1.2022.1-14
Sari, N. W. (2018). Kejahatan cyber dalam perkembangan teknologi informasi berbasis komputer. Jurnal Surya Kencana Dua, 5(2), 577–593.
Solehudin, M. M., Deni, A., Kuswibowo, C., Erfina, S. P. I., Oktavianty, S. E., Biomi, A. A., Erg, M., Irmawati, S., Sudiyarti, M. S., & Anwar, H. M. (2023). DIGITALISASI MANAJEMEN ORGANISASI. Cendikia Mulia Mandiri.
Published
Issue
Section
License
Copyright (c) 2024 Lingga Dwiaji, Agung Mulyo Widodo, Gerry Firmansyah, Budi Tjahyono
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International. that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.