Ancaman Perang Siber China terhadap Indonesia: Analisis Strategi, Dampak, dan Respons Kebijakan

(1) Universitas Pertahanan Republik Indonesia
(2) Universitas Pertahanan Republik Indonesia
(3) Universitas Pertahanan Republik Indonesia

Abstract
Studi ini mengkaji karakteristik, strategi, dan dampak perang siber Tiongkok terhadap Indonesia, serta respons kebijakan dan tantangan Indonesia dalam keamanan siber. Memanfaatkan pendekatan kualitatif dengan studi kasus dan tinjauan literatur, penelitian ini menganalisis pola serangan siber Tiongkok, target, dan motivasinya. Temuan mengungkapkan bahwa Tiongkok menggunakan teknik canggih seperti Advanced Persistent Threats (APT) dan spear-phishing, yang menargetkan lembaga pemerintah, infrastruktur penting, dan perusahaan strategis di Indonesia. Dampaknya termasuk kerentanan dalam infrastruktur penting, pelanggaran data sensitif, dan gangguan ekonomi. Meskipun Indonesia telah mengambil langkah-langkah untuk meningkatkan pertahanan sibernya melalui kerangka hukum, pengembangan kemampuan, dan kerja sama internasional, kesenjangan yang signifikan tetap ada dalam teknologi, sumber daya manusia, dan koordinasi antar-lembaga. Studi ini menerapkan teori Pertahanan Nasional, Perang Asimetris, Pencegahan Siber, dan Keamanan Siber untuk memberikan pemahaman yang komprehensif tentang dinamika kompleks yang terlibat. Rekomendasi tersebut meliputi peningkatan investasi dalam teknologi dan infrastruktur keamanan siber, pengembangan sumber daya manusia, penguatan kerangka hukum, meningkatkan koordinasi antar pemangku kepentingan,
Keywords
References
Arreguin-Toft, I. (2001). How the weak win wars: A theory of asymmetric conflict.
International Security, 26(1), 93-128.
Badan Siber dan Sandi Negara. (2023). Laporan tahunan keamanan siber nasional 2022.
BSSN.
Baldwin, D. A. (1997). The concept of security. Review of International Studies, 23(1), 5- 26.
Ball, D. (2011). China’s Cyber Warfare Capabilities. Security Challenges, 7(2), 81–103. http://www.jstor.org/stable/26461991
Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77-101.
Buzan, B. (1991). People, states and fear: An agenda for international security studies in the post-cold war era (2nd ed.). Harvester Wheatsheaf.
Buzan, B. (2009). People, states & fear: An agenda for international security studies in the post-cold war era. ECPR Press.
Calfee, R. C., & Valencia, R. R. (1991). APA guide to preparing manuscripts for journal publication. Washington, DC: American Psychological Association.
Carr, M. (2016). Public-private partnerships in national cyber-security strategies.
International Affairs, 92(1), 43-62. https://doi.org/10.1111/1468-2346.12504
Cooper, H. (2018). Research synthesis and meta-analysis: A step-by-step approach (5th ed.). SAGE Publications.
Creswell, J. W., & Creswell, J. D. (2018). Research design: Qualitative, quantitative, and mixed methods approaches (5th ed.). SAGE Publications.
Creswell, J. W., & Poth, C. N. (2018). Qualitative Inquiry and Research Design: Choosing Among Five Approaches. SAGE Publications.
Deibert, R. J., & Rohozinski, R. (2010). Risking security: Policies and paradoxes of cyberspace security. International Political Sociology, 4(1), 15-32. https://doi.org/10.1111/j.1749-5687.2009.00088.x.
Deibert, R., & Rohozinski, R. (2010). Risking security: Policies and paradoxes of cyberspace security. International Political Sociology, 4(1), 15-32.
Denzin, N. K. (2017). Qualitative Inquiry and Research Design: Choosing Among Five Approaches. SAGE Publications.
Denzin, N. K., & Lincoln, Y. S. (Eds.). (2018). The SAGE handbook of qualitative research (5th ed.). SAGE Publications.
Fink, A. (2020). Conducting Research Literature Reviews: From the Internet to Paper (5th ed.). SAGE Publications.
Gady, F. S., & Austin, G. (2010). Russia, the United States, and cyber diplomacy: Opening the doors. EastWest Institute.
Handrini Ardiyanti: Cyber security dan Tantangan Pengembangannya di Indonesia, Politica Vol. 5 No. 1 Juni 2014.
Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53(4), 1155-1175.
Hart, C. (2018). Doing a Literature Review: Releasing the Research Imagination. SAGE Publications.
Hjortdal, M. (2011). China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence. Journal of Strategic Security, 4(2), 1–24. http://www.jstor.org/stable/26463924.
Islami, Maulia J. (2017). Tantangan Dalam Implementasi Strategi Keamanan Siber Nasional Indonesia Ditinjau dari Penilaian Global Cybersecurity Index. Jurnal Masyarakat Telematika dan Informasi, Vol. 8, No. 2 (Oktober-Desember 2017). Jakarta Pusat, Indonesia: Kemenkominfo
Kementerian Komunikasi dan Informatika. (2022). Strategi keamanan siber nasional Indonesia 2020-2024. Kominfo.
Kolton, Michael. “Interpreting China’s Pursuit of Cyber Sovereignty and Its Views on Cyber Deterrence.” The Cyber Defense Review 2, no. 1 (2017): 119–54. http://www.jstor.org/stable/26267405.
Libicki, M. C. (2009). Cyberdeterrence and cyberwar. RAND Corporation. Libicki, M. C. (2016). Cyberspace in Peace and War. Naval Institute Press.
Lindsay, J. R., Cheung, T. M., & Reveron, D. S. (Eds.). (2015). China and cybersecurity: Espionage, strategy, and politics in the digital domain. Oxford University Press.
Mack, A. (1975). Why big nations lose small wars: The politics of asymmetric conflict.
World Politics, 27(2), 175-200. https://doi.org/10.2307/2009880
Marshall, C., & Rossman, G. B. (2016). Designing Qualitative Research (6th ed.). SAGE Publications.
Merriam, S. B. (2019). Qualitative Research and Case Study Applications in Education.
Jossey-Bass Publishers.
Miles, M. B., Huberman, A. M., & Saldana, J. (2014). Qualitative data analysis: A methods sourcebook (3rd ed.). SAGE Publications.
Nugraha, Leonardus K. dan Putri, Dinita A. (2016). Mapping the Cyber Policy Landscape: Indonesia. London, England: Global Partners Digital
Nye, J. S. (2017). Deterrence and dissuasion in cyberspace. International Security, 41(3), 44-71. https://doi.org/10.1162/ISEC_a_00266
Patton, M. Q. (2015). Qualitative research & evaluation methods (4th ed.). SAGE Publications.
Petticrew, M., & Roberts, H. (2006). Systematic reviews in the social sciences: A practical guide. Blackwell Publishing.
Putra, I. E., & Firdaus, A. (2021). Analisis ancaman siber terhadap keamanan nasional Indonesia. Jurnal Keamanan Nasional, 7(1), 25-42. https://doi.org/10.31599/jkn.v7i1.519
Putra, I. E., Darwis, & Janitra, P. A. (2020). Tantangan Keamanan Siber Indonesia di Era Digitalisasi: Analisis SWOT Keamanan Siber Indonesia. Jurnal Teknologi Informasi dan Ilmu Komputer, 7(6), 1241-1250.
Rid, T. (2012). Cyber war will not take place. Journal of Strategic Studies, 35(1), 5-32. https://doi.org/10.1080/01402390.2011.608939
Rid, T. (2017). Cyber War Will Not Take Place. Oxford University Press.
Rizal, M., & Yani, Y. M. (2016). Cybersecurity Policy and Its Implementation in Indonesia. Journal of ASEAN Studies, 4(1), 61-78.
Sari, R. F. (2019). Cybersecurity: Challenges and opportunities for Indonesia. Journal of Physics: Conference Series, 1361(1), 012017.
Segal, A. (2016). The hacked world order: How nations fight, trade, maneuver, and manipulate in the digital age. PublicAffairs.
Setiadi, F., Sucahyo, Y. G., & Hasibuan, Z. A. (2012). An overview of the development Indonesia national cyber security. International Journal of Information Technology & Computer Science, 6, 106-114.
Silverman, D. (2016). Qualitative research (4th ed.). SAGE Publications.
Snyder, H. (2019). Literature review as a research methodology: An overview and guidelines. Journal of Business Research, 104, 333-339.
Stake, R. E. (2005). Qualitative case studies. In N. K. Denzin & Y. S. Lincoln (Eds.), The SAGE handbook of qualitative research (3rd ed., pp. 443-466). SAGE Publications.
Stake, R. E. (2020). The Art of Case Study Research. SAGE Publications.
Valeriano, B., & Maness, R. C. (2015). Cyber war versus cyber realities: Cyber conflict in the international system. Oxford University Press.
Walt, S. M. (2018). The Origins of Alliances. Cornell University Press. Waltz, K. N. (2019). Theory of International Politics. Waveland Press.
Wang, D., & Mark, G. (2015). Internet censorship in China: Examining user awareness and attitudes. ACM Transactions on Computer-Human Interaction, 22(6), 1-22. https://doi.org/10.1145/2818997
Yin, R. K. (2018). Case study research and applications: Design and methods (6th ed.).
SAGE Publications.
https://www.unav.edu/web/global-affairs/chinese-cyber-warfare-in-the-indo-pacific
Article Metrics
Abstract View

DOI: 10.57235/aurelia.v4i2.5428
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Keio Ariel, Suhirwan Suhirwan, Ahmad G Dohamid

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.