Identify Cyber Intelligence Threats in Indonesia

نویسندگان

چکیده

Currently, the cyber domain has become a new strategy that can cause losses have strategic impact on country. The current condition shows also been used in intelligence operations. lack of human resource support, infrastructure support and financial raises concerns about readiness to deal with threats Indonesia. This research aims analyse identification was conducted using qualitative method case study approach. analysis comprehensively through in-depth issues raised. results this show pattern threat Indonesia focuses deepening aspects contained 9 components so as produce estimates early detection potential / impacts be caused by threats. So it is necessary increase information security awareness for community need quantity quality resources success operations products.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigating Cyber Security Threats:

This report focuses on how federal agencies define success in computer crime investigations and how they can facilitate the development and refinement of a comprehensive law enforcement strategy for addressing cyber threats. Through interviews with experienced computer crime investigators from the Federal Bureau of Investigation, the U.S. Secret Service, and the Air Force Office of Special Inve...

متن کامل

Cyber Threats Foresight Against Iran Based on Attack Vector

Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...

متن کامل

Cyber threats in social networking websites

A social network is a social structure made up of individuals or organizations called nodes, which are connected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sourc...

متن کامل

The Use of Governance to Identify Cyber Threats through Social Media

Identifying which website, Facebook page or Linked-in connection could lead to an engagement with a terrorist group is beyond the capabilities of ordinary people. Differentiation of one website from another in terms of cyber threat is a complex problem in terms of separating those that encourage and sponsor radicalization and those that do not. These claims usually exist without evidence, and a...

متن کامل

Cyber Security Threats Detection Using Ensemble Architecture

This paper describes an ensemble design for cyber security threats detection, which fuses the results from multiple classifiers together to make a final assessment decision. For promoting both speed and accuracy in the detection performance, only some of the features in traffic data are selected for each base classifier. In the kernel of each classifier, we combine Dempster-Shafer theory with k...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Humanities Education and Social Sciences

سال: 2023

ISSN: ['2808-1765']

DOI: https://doi.org/10.55227/ijhess.v3i1.426