4. Human resources. Human resources are one of
the most important elements in ensuring the
implementation of cyber defense in accordance with
established policies. Cyber defense special
knowledge and skills must be owned and maintained
in accordance with the development of cyber defense
needs. Human resources are realized in the form of
recruitment, coaching and separation programs that
refer to applicable regulations.
When viewed from the population, hundreds of
millions of Indonesians use the internet and the
number continues to grow. The number of cyber-
attacks in Indonesia shows the weakness of this
country's security system. For example, several
government institutions such as the General Election
Commission, the Indonesian Child Protection
Commission, and even the Ministry of Defense have
been victims of hacking targeting government
websites. In the corporate sector, for example, the
telecommunications company Telkomsel, which was
hacked in 2017, and there are many other examples.
What concerns espionage is when the Australian
government allegedly tapped the cellphones of
former President Susilo Bambang Yudhoyono and his
wife, as well as several other senior officials between
2007 and 2009. And what was widely reported was
when a massive cyberattack occurred in 2017 that
infected about 200,000 computers in 150 countries
with attackers demanding ransom. In Indonesia,
about twelve institutions were attacked, including
plantation companies, manufactures, and universities.
Therefore, it is important to map emerging threats in
order to make policy solutions that are right on target.
In 2008, the Information and Electronic
Transactions (ITE) Law was issued, Number 11 of
2008 has been revised in 2016 namely the ITE Law
Number 19 of 2016. This law regulates rules
regarding several violations, such as distributing
illegal content, unauthorized access permission to
computer systems to obtain information, data
protection violations, takeovers or illegal wiretapping
and do not have permission to other computer or
electronic systems. Indeed, if the contents of
electronic systems and electronic transactions are
protected by the ITE Law, on the other hand this Law
does not cover important parts of cyber security, such
as information and network infrastructure, as well as
human resources with expertise in cyber security.
Then in 2019, the government issued a technical
regulation based on the 2016 ITE Law, namely
Government Regulation Number 71 of 2019
concerning the Implementation of Electronic Systems
and Transactions. There are updates regarding the
implementation of cyber security in electronic
systems and transactions. Basically, this regulation
has stronger rules regarding the protection of personal
data and information, as well as web page
authentication to avoid fake or fraudulent web pages.
This emphasizes the importance of the government to
prevent harm to the public interest through the misuse
of information and electronic transactions and what is
important is the need to develop a national cyber
security strategy. The weakness of this lies in the
scope of cybercrimes regulated in the regulation,
which is only related to electronic transactions,
examples of data misuse, unauthorized electronic
signatures, and the spread of viruses and links.
Basically, the existing rules have not responded
well to cyber threats that continue to grow. It is
important to update cyber-related policies. This is
important because cyber threats are now growing
rapidly in all forms, and targeting critical
infrastructure such as the government, therefore it is
very important for the government to immediately
prepare cyber policies to protect the entire nation. The
government must hasten further discussions
regarding the cyber security bill by involving the
private sector or public private dialogue. By
involving the private sector, the government, BSSN
and the private sector can exchange relevant
information and experience, and produce policies that
are appropriate and on target, and are expected to be
implemented properly and, last but not least,
supported by more stakeholders.
5 CONCLUSIONS
Discussing about cybersecurity threats means
discussing information in cyberspace. Information,
data, is a valuable asset that must be protected. Not to
mention the growing development of misleading
information or hoaxes that have been circulating in
the community caused by misuse of information.
Therefore, this paper wants to examine the extent of
Indonesia's cyber security defense capital, the gap
between capital and the facts of the threats that occur,
as well as whether existing regulations are sufficient
to protect Indonesia from cyber threat attacks, or vice
versa. So that cyberspace can be said to be safe from
potential cyber threats and crimes. For this reason,
regulations, ethics, and awareness are needed from
power holders or stakeholders so that cyberspace is
safe and trusted by the public. In addition, this
research is expected to be able to fill in the gaps or
lack of references, as well as being able to provide
benefits for the government and stakeholders so as to