Strategi Keamanan Siber Malaysia

Authors

  • Putri Bilqis Oktaviani Fakultas Hubungan Internasional; Universitas Paramadina
  • Anggraeni Silvia Fakultas Hubungan Internasional; Universitas Paramadina

DOI:

https://doi.org/10.31599/jki.v21i1.447

Abstract

This research discusses the analysis of security strategy policies made by the Malaysian government in the protection and development of Malaysian cyberspace. This research will explain in detail the strategy of developing challenges as well as the aspects that support the Malaysian cyber space to be saved by the Malaysian cyber space. This research will further discuss the Malaysian security strategy through the official document of the Malaysian security strategy which will later be analyzed through the MAXQDA and GEPHI applications in order to classify the various categories that support it. This research will use the security concept published by Hao Yeli in Three - Perspective Theory of Cyber ​​Sovereignty to classify ideas and data. This research finds that the security of the Malaysian system needs to be developed from both capacity and capability so that the government needs to work together with various related parties

 

Keywords: Cyber Security, Cybersecurity Challenges, Soveignty

 

Abstrak

 

Penelitian ini membahas tentang analisis kebijakan strategi keamanan siber yang dibuat oleh pemerintah Malaysia dalam perlindungan dan pengembangan keamanan ruang siber Malaysia. Penelitian ini akan menjelaskan secara details strategi, tantangan serta aspek – aspek yang mendukung pengembangan ruang siber Malaysia guna mengamankan ruang siber Malaysia. Penelitian ini akan membahas lebih jauh strategi keamanan Malaysia melalui dokumen resmi strategi keamanan siber Malaysia yang nantinya akan di bedah melalui aplikasi MAXQDA dan GEPHI guna mengklasifikasikan berbagai kategori yang mendukung. Penelitian ini akan menggunakan konsep keamanan yang dipublikasikan oleh Hao Yeli dalam A Three – Perspective Theory of Cyber Sovereignty guna mengkasifikasikan gagasan dan data dengan menggunakan metode penelitian kuantitatif. Penelitian ini menemukan bahwa keamanan siber Malaysia perlu dikembangkan baik dari kapasitas maupun kapabilitas sehingga pemerintah Malasyaia perlu bekerjasama dengan berbagai pihak yang terkait.

 

Kata kunci: Cyber Security, Tantangan Keamanan Cyber, Kedaulatan

Downloads

Download data is not yet available.

Author Biographies

  • Putri Bilqis Oktaviani, Fakultas Hubungan Internasional; Universitas Paramadina

    Fakultas Hubungan Internasional; Universitas Paramadina

  • Anggraeni Silvia , Fakultas Hubungan Internasional; Universitas Paramadina

    Fakultas Hubungan Internasional; Universitas Paramadina

References

MOSTI. (2020, 10 20). National Cyber Security . National Cyber Security . Malaysia, Malaysia, Malaysia: Ministry of Science, Technology And Innovation.
A, G., Suoayah, L., & Ibrahim, J. (2016, December). An Overview of Cyber Security in Malaysia. Kuwait Chapter of Arabian Journal of Business and Management Review, 6 No 4, 1-16.
Tamyez, P. F. (2019). The Challenges and Solutions of Cybersecurity Among Malaysian Companies. In ndustry 4.0 and Hyper-Customized Smart Manufacturing Supply Chains (pp. 103-125). Malaysia: Universitas Malaysia Pahang.
Tamyez, P. F. (2019). The Challanges and Solutions of Cybersecurity Among Malaysian Companies. In P. Fadzline, Industry 4.0 and Hyper-Customized Smart Manufacturing Supply Chains (pp. 103-125). Malaysia, Malaysia, Malaysia: Universitas Malaysia Pahang.
Supayah, G. A., & Ibrahim, J. (2016, December 3). An Overview of Cyber Security in Malaysia. 6 No 4(Cyber Security), Kuwait Chapter, 12-20. Malaysia, Malaysia, Kuala Lumpur: Arabian Journal of Busines and Management Review.
Abdullah, F., Mohamad, N. S., & Yunos, Z. (2018). Safeguarding Malaysia's Cyberspace against Cyber Threats: Contribution by Cyber Security Malaysia. OIC-CERT Journal of Cyber Security, 1.1, 22-31.

Downloads

Published

2021-01-15

How to Cite

Strategi Keamanan Siber Malaysia. (2021). Jurnal Kajian Ilmiah, 21(1), 69-84. https://doi.org/10.31599/jki.v21i1.447