Konsep Cyber Attack, Cyber Crime, Dan Cyber Warfare Dalam Aspek Hukum Internasional
DOI:
https://doi.org/10.30872/risalah.v17i2.705Keywords:
cyber crime, cyber warfare, cyber attackAbstract
The movement of human activities initially carried out conventionally turned into digital. This phenomenon also applies to the flow of information traffic. Information that was previously disseminated conventionally has become digitalized. Once the exchange of information and activities on the Internet is so widespread, it is as if the Internet is a world of its own with no boundaries. As a new dimension like land, sea, air, and space, Cyber space also has many problems related to the misuse of computer and internet technology for purposes that deviate from legal norms to the detriment of other parties. The implications of Cyber attacks have destructive properties such as changing, disrupting, closing access, reducing performance, or damaging computer files, computer networks, or the computer itself when associated with the rights of someone in the use of computer technology. This study uses normative research using a conceptual approach, a comparative approach, and a statutory approach. The results of this study are that the concepts and elements of cyber attack, cyber crime, and cyber warfare have differences. Cyberattack is a method used to carry out attacks using computer technology and the Internet. Cyber crime is a form of crime committed by utilizing computer and internet technology in carrying out crimes. Meanwhile, cyber warfare is a form of cyber operations (cyber operations) in an attack or defense, which is carried out to cause injury or death to people or damage or destruction of the target object or target operation.
References
Benefita, “7+ Kasus Hacking Menggemparkan Indonesia & Penyebabnya!” <https://www.niagahoster.co.id/blog/kasus-hacking-indonesia/> [diakses 27 Desember 2021]
Bryant, Rebecca, “What kind of space is cyberspace,” Minerva-An Internet journal of philosophy, 5.2001 (2001), 131–38
Clark, David, “Characterizing Cyberspace: Past, Present And Future,” MIT CSAIL, Version, 1 (2010), 2016–28
Even, Shmuel, dan Daṿid Siman Ṭov, Cyber Warfare: Concepts and Strategic Trends (JSTOR, 2012)
Hollis, David, “SWJ Books | Small Wars Journal,” 2008 <https://smallwarsjournal.com/index.php/books> [diakses 27 Desember 2021]
Kuehl, Daniel T, “From Cyberspace To Cyberpower : Defining The Problem,” Cyberpower and national security, 1 (2009)
Melzer, N, “Cyberwarfare And International Law. UNIDIR Resources,” UN Institute for, 2011
Sanusi, H M, Cyber Crime (Jakarta: Milestone Publisher, 2011)
Wahid, Abdul, Kejahatan Mayantara (Cyber Crime) (Bandung: Refika Aditama, 2005)
“What Is a Cyber Attack? | Cyber Attack Definition | Unisys” <https://www.unisys.com/glossary/cyber-attack/> [diakses 27 Desember 2021]
“What is a cyber attack? | IBM” <https://www.ibm.com/id-en/topics/cyber-attack> [diakses 27 Desember 2021]
“What Is a Cyberattack? - Most Common Types - Cisco” <https://www.cisco.com/c/en/us/products/security/common-cyberattacks.html> [diakses 27 Desember 2021]
Wilson, Clay, “CRS Report for Congress. Computer attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress,” in Congressional Research Service. The Library of Congress.–2003, October, 2003, XVII, 35