Konsep Cyber Attack, Cyber Crime, Dan Cyber Warfare Dalam Aspek Hukum Internasional

Authors

  • Miko Aditiya Suharto Fakultas Hukum Universitas Pembangunan Nasional Veteran Jawa Timur https://orcid.org/0000-0002-9974-969X
  • Maria Novita Apriyani Fakultas Hukum Universitas Pembangunan Nasional Veteran Jawa Timur

DOI:

https://doi.org/10.30872/risalah.v17i2.705

Keywords:

cyber crime, cyber warfare, cyber attack

Abstract

The movement of human activities initially carried out conventionally turned into digital. This phenomenon also applies to the flow of information traffic. Information that was previously disseminated conventionally has become digitalized. Once the exchange of information and activities on the Internet is so widespread, it is as if the Internet is a world of its own with no boundaries. As a new dimension like land, sea, air, and space, Cyber space also has many problems related to the misuse of computer and internet technology for purposes that deviate from legal norms to the detriment of other parties. The implications of Cyber attacks have destructive properties such as changing, disrupting, closing access, reducing performance, or damaging computer files, computer networks, or the computer itself when associated with the rights of someone in the use of computer technology. This study uses normative research using a conceptual approach, a comparative approach, and a statutory approach. The results of this study are that the concepts and elements of cyber attack, cyber crime, and cyber warfare have differences. Cyberattack is a method used to carry out attacks using computer technology and the Internet. Cyber crime is a form of crime committed by utilizing computer and internet technology in carrying out crimes. Meanwhile, cyber warfare is a form of cyber operations (cyber operations) in an attack or defense, which is carried out to cause injury or death to people or damage or destruction of the target object or target operation.

References

Benefita, “7+ Kasus Hacking Menggemparkan Indonesia & Penyebabnya!” <https://www.niagahoster.co.id/blog/kasus-hacking-indonesia/> [diakses 27 Desember 2021]

Bryant, Rebecca, “What kind of space is cyberspace,” Minerva-An Internet journal of philosophy, 5.2001 (2001), 131–38

Clark, David, “Characterizing Cyberspace: Past, Present And Future,” MIT CSAIL, Version, 1 (2010), 2016–28

Even, Shmuel, dan Daṿid Siman Ṭov, Cyber Warfare: Concepts and Strategic Trends (JSTOR, 2012)

Hollis, David, “SWJ Books | Small Wars Journal,” 2008 <https://smallwarsjournal.com/index.php/books> [diakses 27 Desember 2021]

Kuehl, Daniel T, “From Cyberspace To Cyberpower : Defining The Problem,” Cyberpower and national security, 1 (2009)

Melzer, N, “Cyberwarfare And International Law. UNIDIR Resources,” UN Institute for, 2011

Sanusi, H M, Cyber Crime (Jakarta: Milestone Publisher, 2011)

Wahid, Abdul, Kejahatan Mayantara (Cyber Crime) (Bandung: Refika Aditama, 2005)

“What Is a Cyber Attack? | Cyber Attack Definition | Unisys” <https://www.unisys.com/glossary/cyber-attack/> [diakses 27 Desember 2021]

“What is a cyber attack? | IBM” <https://www.ibm.com/id-en/topics/cyber-attack> [diakses 27 Desember 2021]

“What Is a Cyberattack? - Most Common Types - Cisco” <https://www.cisco.com/c/en/us/products/security/common-cyberattacks.html> [diakses 27 Desember 2021]

Wilson, Clay, “CRS Report for Congress. Computer attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress,” in Congressional Research Service. The Library of Congress.–2003, October, 2003, XVII, 35

Downloads

Published

2021-12-30

How to Cite

Konsep Cyber Attack, Cyber Crime, Dan Cyber Warfare Dalam Aspek Hukum Internasional. (2021). Risalah Hukum, 17(2), 98-107. https://doi.org/10.30872/risalah.v17i2.705

Similar Articles

1-10 of 12

You may also start an advanced similarity search for this article.