Analisis Kontekstual pada Strategi Keamanan Siber Mesir 2017-2021 dalam Upaya Pengamanan Siber Nasional

Dian Islami

Abstract


This study aims to understand and analyze Egypt's cybersecurity strategy in 2017-2021 related to the level of security and the role of each aspect of the cybersecurity strategy in the Egyptian state. This research was conducted because Egypt and Indonesia have several similarities, such as countries with a Muslim majority and fellow members in the Islamic Cooperation Organization, the Non-Aligned Movement, the G-20 developing countries, and the group of 8 developing countries. Qualitative methods are used to analyze the application of the concept of sovereignty theory which is exclusive or transfer, as well as aspects of cybersecurity which include infrastructure, application, and core (ideology). Meanwhile, quantitative methods are used to present the results of data analysis on Egyptian cybersecurity data relations and strategies with MAXQDA2020 and Gephi 0.9.2 applications. Based on the results of the analysis, the authors conclude that the context of Egypt's cybersecurity strategy has a tendency towards collaboration between state actors and non-state-actors based on aspects of national cybersecurity, cybersecurity awareness, cyberspace threats, international rules, laws and regulations, cyber crisis nation-wide. , cybercrime, and cyberinfrastructure. This aspect can be used in the formulation of Indonesia's national cybersecurity strategy policy in the coming year.

Keywords


Keamanan siber; Mesir; relasi data

Full Text:

PDF

References


Adesina, O. S. (2017). Foreign policy in an era of digital diplomacy. Cogent Social Sciences, 1-13.

Bjola, C., & Pamment, J. (2018). Countering online propaganda and extremism: The dark side of digital diplomacy. Routledge.

BSSN. (2018, April 9). Dampingi Oman, Indonesia Terpilih Menjadi OIC-CERT Deputy Chair 2018-2020. Diambil kembali dari Gov-CSIRT Indonesia: https://govcsirt.bssn.go.id/dampingi-oman-indonesia-terpilih-menjadi-oic-cert-deputy-chair-2018-2020/

CERT, O. (2021, April 9). Organisation of Islamic Cooperation - Computer Emergency Response Team. Diambil kembali dari Digwatch: https://dig.watch/actors/organisation-islamic-cooperation-computer-emergency-response-team

ESCC. (2018). National Cybersecurity Strategy 2017-2021. Cairo: ESCC.

Hanson, F. (2012, April 9). Baked in and Wired: eDiplomacy @ State. Diambil kembali dari In Foreign Policy at Brookings.: https://www.brookings.edu/research/baked-in-and-wired-ediplomacy-state/

Pardini, D. J. (2017). Cyber Security Governance And Management For Smart Grids in Brazilian Energy Utilities. Journal of Information Systems and Technology Management – Jistem USP, 385-400.

Pratama, F. Y. (2018). Simulasi Jejaring Jalan Kota Pontianak dengan Betweeness Centrality dan Degree Centrality. Tanjungpura: Universitas Tanjung Pura.

Siagian, L. (2018). Peran Keamanan Siber Dalam Mengatasi Konten Negatif Guna Mewujudkan Ketahanan Informasi Nasional. Jurnal Peperangan Asimetris.

Teoh, C. S., & Mahmood, A. K. (2017). National Cyber Security Strategies for Digital Economy. JATIT LLS, 6510-6522.

Yeli, H. (2017). A Three Perspective Theory of Cyber Sovereignty. PRISM, 109-115.




DOI: https://doi.org/10.30743/mukadimah.v5i1.3502

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

 

MUKADIMAH: Jurnal Pendidikan, Sejarah, dan Ilmu-ilmu Sosial

Program Studi Pendidikan Sejarah, FKIP - Universitas Islam Sumatera Utara
Kampus Induk UISU Jl. Sisingamangaraja XII Teladan, Medan

Creative Commons License