Dampak Serangan Virtual ISIS Cyber-Caliphate terhadap Amerika Serikat

Authors

  • Bayu Widiyanto Universitas Paramadina

Keywords:

ISIS, Cyber-Caliphate, virtual attacks, cyberterrorism, information technology, United States

Abstract

Currently, there is a considerable debate about whether cyberterrorism poses a serious threat to society, although much has been dramatized in the popular media. Because the term cyberterrorism has been improperly used and overused, a clear understanding of the danger of cyberterrorism must begin with a clear definition. Currently, computer networks are attacked daily because of the security’s inability to keep pace with the growth of connectivity and because of readily available hacking tools and techniques. Because the most critical infrastructure is the network, it is at risk. Although many of the daily invasions are hackers trying to get in just to see if they can, by acts of vandalism or denial-of-service attacks, individuals are gaining access to sensitive information. The real danger of cyberterrorism, however, lies in the computer’s use as both a terrorist tactic and a force multiplier.

References

Jurnal

Awan, Imran. “Debating the Term Cyber-Terrorism: Issues and Problems”. Internet Journal of Criminology (2014), hal. 1-14.

Bogdanoski, Mitko dan Drage Petreski. “Cyber Terrorism: Global Security Threat”. International Scientific Defence, Security and Peace Journal (2014), hal. 59-72.

Saint-Claire, Steve. “Overview and Analysis on Cyber Terrorism”. School of Doctoral Studies (European Union) Journal (2011), hal. 85-98.

Weimann, Gabriel. “Cyberterrorism: The Sum of All Fears?”. Studies in Conflict & Terrorism, Vol. 28, No. 2 (2005), hal. 129-149.

Dokumen Lain

Ottis, Rain dan Peeter Lorents. “Cyberspace: Definition and Implications”. International Conference on Information Warfare and Security, Reading (April 2010), hal. 267.

Weimann, Gabriel. “Cyberterrorism: How Real is the Threat”. United States Institute of Peace: Special Report 119 (Desember 2004).

Internet

Claywell, Charlie R. “What is Social Network Theory”. LoveToKnow, t.thn. http://socialnetworking.lovetoknow.com/What_is_Social_Network_Theory (diakses pada tanggal 17 Juni 2016).

Human Security Report Project. “Human Security Backgrounder”. Human Security Report Project, t.thn. http://www.hsrgroup.org/press-room/human-security-backgrounder.aspx (diakses pada tanggal 17 Juni 2016).

Lohrmann, Dan. “Cyber Terrorism: How Dangerous is the ISIS Cyber Caliphate Threat?”. Government Technology, 18 Mei 2015. http://www.govtech.com/blogs/lohrmann-on-cybersecurity/Cyber-Terrorism-How-Dangerous-is-the-ISIS-Cyber-Caliphate-Threat.html (diakses pada tanggal 19 Juni 2016).

Platov, Vladimir. “ISIS Cyber-Caliphate”. New Eastern Outlook, 10 Februari 2016. http://journal-neo.org/2016/02/10/isis-cyber-caliphate/ (diakses pada tanggal 18 Juni 2016).

Stalinsky, Steven dan R. Sosnow. “Hacking In The Name Of The Islamic State (ISIS)”. The Middle East Media Research Institute, 21 Agustus 2015. http://www.memrijttm.org/hacking-in-the-name-of-the-islamic-state-isis.html (diakses pada tanggal 19 Juni 2016).

The White House Office of the Press Secretary. “FACT SHEET: Executive Order Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities”. The White House, 1 April 2015. https://www.whitehouse.gov/the-press-office/2015/04/01/fact-sheet-executive-order-blocking-property-certain-persons-engaging-si (diakses pada tanggal 19 Juni 2016).

Downloads

Published

01-06-2017

How to Cite

Widiyanto, B. (2017). Dampak Serangan Virtual ISIS Cyber-Caliphate terhadap Amerika Serikat. Jurnal International & Diplomacy Universitas Satya Negara Indonesia, 2(2), 173–184. Retrieved from https://jurnalhiusni.org/index.php/idu/article/view/137

Issue

Section

Articles