Analisis Hubungan Ancaman Siber dan Strategi Pengamanan Siber pada KTT G20 di Bali Tahun 2022

(1) Universitas Pertahanan Republik Indonesia
(2) Universitas Pertahanan Republik Indonesia
(3) Universitas Pertahanan Republik Indonesia

Abstract
Keywords
References
AwanPintarid. (2024). AwanPintar.id | Indonesia Waspada - Laporan Ancaman Digital di Indonesia Semester 1 Tahun 2024.
Check Point Research. (2024, June 16). Check Point Research Reports Highest Increase of Global Cyber Attacks seen in last two years – a 30% Increase in Q2 2024 Global Cyber Attacks. https://blog.checkpoint.com/research/check-point-research-reports-highest-increase-of-global-cyber-attacks-seen-in-last-two-years-a-30-increase-in-q2-2024-global-cyber-attacks/
Crelier, A. (2019). Trend Analysis Cybersecurity at Big Events. www.css.ethz.ch
Harrell, M. N. (2017). Synergistic Security: A Work System Case Study of the Target Breach. Journal of Cybersecurity Education, Research and Practice, 2. https://digitalcommons.kennesaw.edu/jcerpAvailableat:https://digitalcommons.kennesaw.edu/jcerp/vol2017/iss2/4Practice:https://digitalcommons.kennesaw.edu/jcerp/vol2017/iss2/4
IBM Cloud Team. (2024, March 25). Jenis-jenis ancaman siber. https://www.ibm.com/id-id/think/topics/cyberthreats-types
ISACA. (2015). Cybersecurity Fundamentals. www.isaca.org/cyber
IT Governance. (2024, May 2). Global Data Breaches and Cyber Attacks in 2024. https://www.itgovernance.co.uk/blog/global-data-breaches-and-cyber-attacks-in-2024
Marchewka, J. T. (2015). Information Technology Project Management (5th ed.). Wiley.
Mhara, M. A. O. A., Abdulrahman, A. A. A., & Baroud, A. A. S. (2024). Cyber Attacks And Threats: Study Of The Types Of Cyber Attacks: Hacking, Viruses, Targeted Attacks, And Electronic Espionage. Int. J. Electr. Eng. and Sustain., 38–47.
Miles, M. B., Huberman, A. M., & Saldana, J. (2014). Qualitative Data Analysis: A Methods Sourcebook (3rd ed.). Sage.
Nasser, K., & Al-Dosari, K. A. (2020). Identification and Prevention of Expected Cybersecurity Threats During 2022 Fifa World Cup In Qatar. Journal of Poverty, Investment and Development, 5(1), 49–84. www.iprjb.org
NIST. (2018). Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1. https://doi.org/10.6028/NIST.CSWP.04162018
Novi V. (n.d.). Pengertian Strategi serta Jenis, Tujuan, Dan Contohnya. Retrieved August 12, 2024, from https://www.gramedia.com/literasi/pengertian-strategi/
Patrascu, P. (2019). Missions and Actions Specific to Cyberspace Operations. International Conference Knowledge-Based Organization, 25(3), 51–56. https://doi.org/10.2478/kbo-2019-0117
We Are Social. (2023). Digital 2023 Global Overview Report.
We Are Social. (2024). Digital 2024 Global Overview Report.
Article Metrics
Abstract View

DOI: 10.57235/aurelia.v4i1.5497
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 abdul ghofur

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.