Ancaman Perang Siber China terhadap Indonesia: Analisis Strategi, Dampak, dan Respons Kebijakan

Keio Ariel(1), Suhirwan Suhirwan(2), Ahmad G Dohamid(3),


(1) Universitas Pertahanan Republik Indonesia
(2) Universitas Pertahanan Republik Indonesia
(3) Universitas Pertahanan Republik Indonesia
Corresponding Author

Abstract


Studi ini mengkaji karakteristik, strategi, dan dampak perang siber Tiongkok terhadap Indonesia, serta respons kebijakan dan tantangan Indonesia dalam keamanan siber. Memanfaatkan pendekatan kualitatif dengan studi kasus dan tinjauan literatur, penelitian ini menganalisis pola serangan siber Tiongkok, target, dan motivasinya. Temuan mengungkapkan bahwa Tiongkok menggunakan teknik canggih seperti Advanced Persistent Threats (APT) dan spear-phishing, yang menargetkan lembaga pemerintah, infrastruktur penting, dan perusahaan strategis di Indonesia. Dampaknya termasuk kerentanan dalam infrastruktur penting, pelanggaran data sensitif, dan gangguan ekonomi. Meskipun Indonesia telah mengambil langkah-langkah untuk meningkatkan pertahanan sibernya melalui kerangka hukum, pengembangan kemampuan, dan kerja sama internasional, kesenjangan yang signifikan tetap ada dalam teknologi, sumber daya manusia, dan koordinasi antar-lembaga. Studi ini menerapkan teori Pertahanan Nasional, Perang Asimetris, Pencegahan Siber, dan Keamanan Siber untuk memberikan pemahaman yang komprehensif tentang dinamika kompleks yang terlibat. Rekomendasi tersebut meliputi peningkatan investasi dalam teknologi dan infrastruktur keamanan siber, pengembangan sumber daya manusia, penguatan kerangka hukum, meningkatkan koordinasi antar pemangku kepentingan,


Keywords


pertahanan nasional, keamanan nasional, peperangan asimetris, pencegahan siber, keamanan siber

References


Arreguin-Toft, I. (2001). How the weak win wars: A theory of asymmetric conflict.

International Security, 26(1), 93-128.

Badan Siber dan Sandi Negara. (2023). Laporan tahunan keamanan siber nasional 2022.

BSSN.

Baldwin, D. A. (1997). The concept of security. Review of International Studies, 23(1), 5- 26.

Ball, D. (2011). China’s Cyber Warfare Capabilities. Security Challenges, 7(2), 81–103. http://www.jstor.org/stable/26461991

Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77-101.

Buzan, B. (1991). People, states and fear: An agenda for international security studies in the post-cold war era (2nd ed.). Harvester Wheatsheaf.

Buzan, B. (2009). People, states & fear: An agenda for international security studies in the post-cold war era. ECPR Press.

Calfee, R. C., & Valencia, R. R. (1991). APA guide to preparing manuscripts for journal publication. Washington, DC: American Psychological Association.

Carr, M. (2016). Public-private partnerships in national cyber-security strategies.

International Affairs, 92(1), 43-62. https://doi.org/10.1111/1468-2346.12504

Cooper, H. (2018). Research synthesis and meta-analysis: A step-by-step approach (5th ed.). SAGE Publications.

Creswell, J. W., & Creswell, J. D. (2018). Research design: Qualitative, quantitative, and mixed methods approaches (5th ed.). SAGE Publications.

Creswell, J. W., & Poth, C. N. (2018). Qualitative Inquiry and Research Design: Choosing Among Five Approaches. SAGE Publications.

Deibert, R. J., & Rohozinski, R. (2010). Risking security: Policies and paradoxes of cyberspace security. International Political Sociology, 4(1), 15-32. https://doi.org/10.1111/j.1749-5687.2009.00088.x.

Deibert, R., & Rohozinski, R. (2010). Risking security: Policies and paradoxes of cyberspace security. International Political Sociology, 4(1), 15-32.

Denzin, N. K. (2017). Qualitative Inquiry and Research Design: Choosing Among Five Approaches. SAGE Publications.

Denzin, N. K., & Lincoln, Y. S. (Eds.). (2018). The SAGE handbook of qualitative research (5th ed.). SAGE Publications.

Fink, A. (2020). Conducting Research Literature Reviews: From the Internet to Paper (5th ed.). SAGE Publications.

Gady, F. S., & Austin, G. (2010). Russia, the United States, and cyber diplomacy: Opening the doors. EastWest Institute.

Handrini Ardiyanti: Cyber security dan Tantangan Pengembangannya di Indonesia, Politica Vol. 5 No. 1 Juni 2014.

Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53(4), 1155-1175.

Hart, C. (2018). Doing a Literature Review: Releasing the Research Imagination. SAGE Publications.

Hjortdal, M. (2011). China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence. Journal of Strategic Security, 4(2), 1–24. http://www.jstor.org/stable/26463924.

Islami, Maulia J. (2017). Tantangan Dalam Implementasi Strategi Keamanan Siber Nasional Indonesia Ditinjau dari Penilaian Global Cybersecurity Index. Jurnal Masyarakat Telematika dan Informasi, Vol. 8, No. 2 (Oktober-Desember 2017). Jakarta Pusat, Indonesia: Kemenkominfo

Kementerian Komunikasi dan Informatika. (2022). Strategi keamanan siber nasional Indonesia 2020-2024. Kominfo.

Kolton, Michael. “Interpreting China’s Pursuit of Cyber Sovereignty and Its Views on Cyber Deterrence.” The Cyber Defense Review 2, no. 1 (2017): 119–54. http://www.jstor.org/stable/26267405.

Libicki, M. C. (2009). Cyberdeterrence and cyberwar. RAND Corporation. Libicki, M. C. (2016). Cyberspace in Peace and War. Naval Institute Press.

Lindsay, J. R., Cheung, T. M., & Reveron, D. S. (Eds.). (2015). China and cybersecurity: Espionage, strategy, and politics in the digital domain. Oxford University Press.

Mack, A. (1975). Why big nations lose small wars: The politics of asymmetric conflict.

World Politics, 27(2), 175-200. https://doi.org/10.2307/2009880

Marshall, C., & Rossman, G. B. (2016). Designing Qualitative Research (6th ed.). SAGE Publications.

Merriam, S. B. (2019). Qualitative Research and Case Study Applications in Education.

Jossey-Bass Publishers.

Miles, M. B., Huberman, A. M., & Saldana, J. (2014). Qualitative data analysis: A methods sourcebook (3rd ed.). SAGE Publications.

Nugraha, Leonardus K. dan Putri, Dinita A. (2016). Mapping the Cyber Policy Landscape: Indonesia. London, England: Global Partners Digital

Nye, J. S. (2017). Deterrence and dissuasion in cyberspace. International Security, 41(3), 44-71. https://doi.org/10.1162/ISEC_a_00266

Patton, M. Q. (2015). Qualitative research & evaluation methods (4th ed.). SAGE Publications.

Petticrew, M., & Roberts, H. (2006). Systematic reviews in the social sciences: A practical guide. Blackwell Publishing.

Putra, I. E., & Firdaus, A. (2021). Analisis ancaman siber terhadap keamanan nasional Indonesia. Jurnal Keamanan Nasional, 7(1), 25-42. https://doi.org/10.31599/jkn.v7i1.519

Putra, I. E., Darwis, & Janitra, P. A. (2020). Tantangan Keamanan Siber Indonesia di Era Digitalisasi: Analisis SWOT Keamanan Siber Indonesia. Jurnal Teknologi Informasi dan Ilmu Komputer, 7(6), 1241-1250.

Rid, T. (2012). Cyber war will not take place. Journal of Strategic Studies, 35(1), 5-32. https://doi.org/10.1080/01402390.2011.608939

Rid, T. (2017). Cyber War Will Not Take Place. Oxford University Press.

Rizal, M., & Yani, Y. M. (2016). Cybersecurity Policy and Its Implementation in Indonesia. Journal of ASEAN Studies, 4(1), 61-78.

Sari, R. F. (2019). Cybersecurity: Challenges and opportunities for Indonesia. Journal of Physics: Conference Series, 1361(1), 012017.

Segal, A. (2016). The hacked world order: How nations fight, trade, maneuver, and manipulate in the digital age. PublicAffairs.

Setiadi, F., Sucahyo, Y. G., & Hasibuan, Z. A. (2012). An overview of the development Indonesia national cyber security. International Journal of Information Technology & Computer Science, 6, 106-114.

Silverman, D. (2016). Qualitative research (4th ed.). SAGE Publications.

Snyder, H. (2019). Literature review as a research methodology: An overview and guidelines. Journal of Business Research, 104, 333-339.

Stake, R. E. (2005). Qualitative case studies. In N. K. Denzin & Y. S. Lincoln (Eds.), The SAGE handbook of qualitative research (3rd ed., pp. 443-466). SAGE Publications.

Stake, R. E. (2020). The Art of Case Study Research. SAGE Publications.

Valeriano, B., & Maness, R. C. (2015). Cyber war versus cyber realities: Cyber conflict in the international system. Oxford University Press.

Walt, S. M. (2018). The Origins of Alliances. Cornell University Press. Waltz, K. N. (2019). Theory of International Politics. Waveland Press.

Wang, D., & Mark, G. (2015). Internet censorship in China: Examining user awareness and attitudes. ACM Transactions on Computer-Human Interaction, 22(6), 1-22. https://doi.org/10.1145/2818997

Yin, R. K. (2018). Case study research and applications: Design and methods (6th ed.).

SAGE Publications.

https://www.unav.edu/web/global-affairs/chinese-cyber-warfare-in-the-indo-pacific


Full Text: PDF

Article Metrics

Abstract View : 39 times
PDF Download : 40 times

DOI: 10.57235/aurelia.v4i2.5428

Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Keio Ariel, Suhirwan Suhirwan, Ahmad G Dohamid

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.