Implementasi Keamanan Cyber Berbasis Nilai Nilai Kebangsaan UUD 1945 di Era Digital Best Practice di Perusahaan Pertamina
DOI:
https://doi.org/10.61132/saturnus.v2i3.116Keywords:
1945 Constitution, digital era, cyber security, Pertamina, ITEAbstract
The advancement of digital technology has brought about significant progress across various sectors, while simultaneously introducing new risks, particularly in the realm of cybersecurity. Cybersecurity has become a critical concern for companies, including energy giants like Pertamina. In the context of Indonesia, adherence to cybersecurity within Pertamina must align with relevant legal frameworks, such as the 1945 Constitution (UUD 1945). This research aims to explore optimal approaches to implementing cybersecurity within Pertamina, with a focus on the legal underpinnings of the 1945 Constitution. Key attention is directed towards Article 27, paragraph (3) of the Constitution, which guarantees universal access to education, including information security training for employees—a crucial element in thwarting cyber threats. Furthermore, Article 28, paragraph (1) of the 1945 Constitution, safeguarding freedom of association, can be interpreted to endorse collaboration between Pertamina and external entities, like cybersecurity institutions and regulatory bodies, to bolster cyber defense capabilities. Integration of cutting-edge security technology is paramount, aligning with the principles outlined in Article 33, paragraph (2) of the 1945 Constitution, emphasizing the preservation of natural resources. This extends to safeguarding Pertamina's data and digital infrastructure through measures like encryption technology, robust network security protocols, and effective intrusion detection systems. By heeding the legal foundations provided by the 1945 Constitution, the implementation of cybersecurity at Pertamina must be comprehensive, encompassing employee education, technological upgrades, and collaborative efforts with external stakeholders. Such measures aim to mitigate cyber risks, safeguard operational interests, and shield sensitive information from evolving threats in today's digital landscape. Additionally, Law Number 11 of 2008 plays a crucial role in governing information technology and electronic transactions in Indonesia. This legislation grants legal validity to electronic documents, signatures, and transactions, while also ensuring information security and user privacy. It imposes criminal penalties for illicit activities in the realm of information technology, fostering a secure environment for electronic transactions and upholding user rights in the digital age.
References
+Jurnal+JUKIM+Tri+Ginanjar+Laksana. (n.d.).
Ar rahman, L. L. (2021). Implikasi Diplomasi Pertahanan terhadap Keamanan Siber dalam Konteks Politik Keamanan. Jurnal Diplomasi Pertahanan, 6(2). https://doi.org/10.33172/jdp.v6i2.654
Budi, E., Wira, D., & Infantono, A. (2021). Strategi Penguatan Cyber Security Guna Mewujudkan Keamanan Nasional di Era Society 5.0. Prosiding Seminar Nasional Sains Teknologi Dan Inovasi Indonesia (SENASTINDO), 3(November), 223–234. https://doi.org/10.54706/senastindo.v3.2021.141
Fachrudin, R., Respaty, E., Adilah, I. S., & ... (2024). Peranan Penting Manajemen Sekuriti di Era Digitalisasi. Nusantara Journal of …, 2(1), 94–102. https://jurnal.intekom.id/index.php/njms/article/view/252
Gulo, A. S., Lasmadi, S., & Nawawi, K. (2021). Cyber Crime dalam Bentuk Phising Berdasarkan Undang-Undang Informasi dan Transaksi Elektronik. PAMPAS: Journal of Criminal Law, 1(2), 68–81. https://doi.org/10.22437/pampas.v1i2.9574
Hukum_Dan_Regulasi_Ict_Terhadap_Cyber_Cr. (n.d.).
Nadjiha, S. (2019). Japs 1. Jurnal Asia Pacific Studies, 4 Number 1(1), 33–45. https://dx.doi.org/10.33541/japs.v4i1.1640
Nainggolan, N. S., & Nasution, I. P. (2023). Pentingnya Keamanan Big Data Dalam Lembaga Pemerintahan Di Era Digital. Jurnal Sains Dan Teknologi (JSIT), 3(2), 253–257. https://doi.org/10.47233/jsit.v3i2.883
Nugraha, R. (2021). Perspektif Hukum Indonesia (Cyberlaw) Penanganan Kasus Cyber di Indonesia. Jurnal Ilmiah Hukum Dirgantara, 11(2), 44–56.
Romadhan, R. C. (2021). Kedudukan Hukum Badan Usaha Milik Negara Sebagai Anak Perusahaan Dalam Perusahaan Holding Induk. Media Iuris, 4(1), 73. https://doi.org/10.20473/mi.v4i1.23669
Safitri, R. (2018). Undang-Undang Informasi dan Transaksi Elektronik Bagi Perguruan Tinggi. SALAM: Jurnal Sosial Dan Budaya Syar-I, 5(3), 197–218. https://doi.org/10.15408/sjsbs.v5i3.10279
Sherina, & Darmawati, D. (2022). Pengaruh Auditor Internal dan Kebijakan Manajeman Terhadap Efektivitas Keamanan Siber. Jurnal Ekonomi Trisakti, 2(2), 515–528. https://www.trijurnal.trisakti.ac.id/index.php/jet
Silalahi, F. D. (2022). Keamanan Cyber (Cyber Security). Penerbit Yayasan Prima Agus Teknik, 1–285. http://penerbit.stekom.ac.id/index.php/yayasanpat/article/view/367
Soesanto, E., & Wijayanti, A. (2023). Cross-border MENGELOLA OBJEK VITAL, PENGAMANAN FILE, DAN PENGAMANAN CYBER TERHADAP MANAJEMEN SEKURITI PADA PT. PERTAMINA (PERSERO). 6(1), 670–679.
(Ar rahman, 2021)(13.+Jurnal+JUKIM+Tri+Ginanjar+Laksana, n.d.)(Gulo et al., 2021)(Fachrudin et al., 2024)(Soesanto & Wijayanti, 2023)(Silalahi, 2022)(Budi et al., 2021)(Nugraha, 2021)(Hukum_Dan_Regulasi_Ict_Terhadap_Cyber_Cr, n.d.)(Nainggolan & Nasution, 2023)(Safitri, 2018)(Romadhan, 2021)(Romadhan, 2021)
Safitri, R. (2018). Artikel yang membahas tentang penerapan Undang-Undang Informasi dan Transaksi Elektronik di lingkungan perguruan tinggi.. SALAM: Jurnal Sosial Dan Budayan Syar-I, 5(3), 197–218. https://doi.org/10.15408/sjsbs.v5i3.10279
(Nadjiha, 2019)
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Saturnus : Jurnal Teknologi dan Sistem Informasi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.