Implementasi Keamanan Cyber Berbasis Nilai Nilai Kebangsaan UUD 1945 di Era Digital Best Practice di Perusahaan Pertamina

Authors

  • Thomas Komansilan Universitas Bhayangkara Jakarta Raya
  • Edy Soesanto Universitas Bhayangkara Jakarta Raya
  • Natasha Salsabillah Universitas Bhayangkara Jakarta Raya

DOI:

https://doi.org/10.61132/saturnus.v2i3.116

Keywords:

1945 Constitution, digital era, cyber security, Pertamina, ITE

Abstract

The advancement of digital technology has brought about significant progress across various sectors, while simultaneously introducing new risks, particularly in the realm of cybersecurity. Cybersecurity has become a critical concern for companies, including energy giants like Pertamina. In the context of Indonesia, adherence to cybersecurity within Pertamina must align with relevant legal frameworks, such as the 1945 Constitution (UUD 1945). This research aims to explore optimal approaches to implementing cybersecurity within Pertamina, with a focus on the legal underpinnings of the 1945 Constitution. Key attention is directed towards Article 27, paragraph (3) of the Constitution, which guarantees universal access to education, including information security training for employees—a crucial element in thwarting cyber threats. Furthermore, Article 28, paragraph (1) of the 1945 Constitution, safeguarding freedom of association, can be interpreted to endorse collaboration between Pertamina and external entities, like cybersecurity institutions and regulatory bodies, to bolster cyber defense capabilities. Integration of cutting-edge security technology is paramount, aligning with the principles outlined in Article 33, paragraph (2) of the 1945 Constitution, emphasizing the preservation of natural resources. This extends to safeguarding Pertamina's data and digital infrastructure through measures like encryption technology, robust network security protocols, and effective intrusion detection systems. By heeding the legal foundations provided by the 1945 Constitution, the implementation of cybersecurity at Pertamina must be comprehensive, encompassing employee education, technological upgrades, and collaborative efforts with external stakeholders. Such measures aim to mitigate cyber risks, safeguard operational interests, and shield sensitive information from evolving threats in today's digital landscape. Additionally, Law Number 11 of 2008 plays a crucial role in governing information technology and electronic transactions in Indonesia. This legislation grants legal validity to electronic documents, signatures, and transactions, while also ensuring information security and user privacy. It imposes criminal penalties for illicit activities in the realm of information technology, fostering a secure environment for electronic transactions and upholding user rights in the digital age.

References

+Jurnal+JUKIM+Tri+Ginanjar+Laksana. (n.d.).

Ar rahman, L. L. (2021). Implikasi Diplomasi Pertahanan terhadap Keamanan Siber dalam Konteks Politik Keamanan. Jurnal Diplomasi Pertahanan, 6(2). https://doi.org/10.33172/jdp.v6i2.654

Budi, E., Wira, D., & Infantono, A. (2021). Strategi Penguatan Cyber Security Guna Mewujudkan Keamanan Nasional di Era Society 5.0. Prosiding Seminar Nasional Sains Teknologi Dan Inovasi Indonesia (SENASTINDO), 3(November), 223–234. https://doi.org/10.54706/senastindo.v3.2021.141

Fachrudin, R., Respaty, E., Adilah, I. S., & ... (2024). Peranan Penting Manajemen Sekuriti di Era Digitalisasi. Nusantara Journal of …, 2(1), 94–102. https://jurnal.intekom.id/index.php/njms/article/view/252

Gulo, A. S., Lasmadi, S., & Nawawi, K. (2021). Cyber Crime dalam Bentuk Phising Berdasarkan Undang-Undang Informasi dan Transaksi Elektronik. PAMPAS: Journal of Criminal Law, 1(2), 68–81. https://doi.org/10.22437/pampas.v1i2.9574

Hukum_Dan_Regulasi_Ict_Terhadap_Cyber_Cr. (n.d.).

Nadjiha, S. (2019). Japs 1. Jurnal Asia Pacific Studies, 4 Number 1(1), 33–45. https://dx.doi.org/10.33541/japs.v4i1.1640

Nainggolan, N. S., & Nasution, I. P. (2023). Pentingnya Keamanan Big Data Dalam Lembaga Pemerintahan Di Era Digital. Jurnal Sains Dan Teknologi (JSIT), 3(2), 253–257. https://doi.org/10.47233/jsit.v3i2.883

Nugraha, R. (2021). Perspektif Hukum Indonesia (Cyberlaw) Penanganan Kasus Cyber di Indonesia. Jurnal Ilmiah Hukum Dirgantara, 11(2), 44–56.

Romadhan, R. C. (2021). Kedudukan Hukum Badan Usaha Milik Negara Sebagai Anak Perusahaan Dalam Perusahaan Holding Induk. Media Iuris, 4(1), 73. https://doi.org/10.20473/mi.v4i1.23669

Safitri, R. (2018). Undang-Undang Informasi dan Transaksi Elektronik Bagi Perguruan Tinggi. SALAM: Jurnal Sosial Dan Budaya Syar-I, 5(3), 197–218. https://doi.org/10.15408/sjsbs.v5i3.10279

Sherina, & Darmawati, D. (2022). Pengaruh Auditor Internal dan Kebijakan Manajeman Terhadap Efektivitas Keamanan Siber. Jurnal Ekonomi Trisakti, 2(2), 515–528. https://www.trijurnal.trisakti.ac.id/index.php/jet

Silalahi, F. D. (2022). Keamanan Cyber (Cyber Security). Penerbit Yayasan Prima Agus Teknik, 1–285. http://penerbit.stekom.ac.id/index.php/yayasanpat/article/view/367

Soesanto, E., & Wijayanti, A. (2023). Cross-border MENGELOLA OBJEK VITAL, PENGAMANAN FILE, DAN PENGAMANAN CYBER TERHADAP MANAJEMEN SEKURITI PADA PT. PERTAMINA (PERSERO). 6(1), 670–679.

(Ar rahman, 2021)(13.+Jurnal+JUKIM+Tri+Ginanjar+Laksana, n.d.)(Gulo et al., 2021)(Fachrudin et al., 2024)(Soesanto & Wijayanti, 2023)(Silalahi, 2022)(Budi et al., 2021)(Nugraha, 2021)(Hukum_Dan_Regulasi_Ict_Terhadap_Cyber_Cr, n.d.)(Nainggolan & Nasution, 2023)(Safitri, 2018)(Romadhan, 2021)(Romadhan, 2021)

Safitri, R. (2018). Artikel yang membahas tentang penerapan Undang-Undang Informasi dan Transaksi Elektronik di lingkungan perguruan tinggi.. SALAM: Jurnal Sosial Dan Budayan Syar-I, 5(3), 197–218. https://doi.org/10.15408/sjsbs.v5i3.10279

(Nadjiha, 2019)

Published

2024-06-03

How to Cite

Thomas Komansilan, Edy Soesanto, & Natasha Salsabillah. (2024). Implementasi Keamanan Cyber Berbasis Nilai Nilai Kebangsaan UUD 1945 di Era Digital Best Practice di Perusahaan Pertamina. Saturnus : Jurnal Teknologi Dan Sistem Informasi, 2(3), 01–15. https://doi.org/10.61132/saturnus.v2i3.116

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.