Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 2 dokumen yang sesuai dengan query
cover
Syarifudin
"Sejak 2001, Amerika Serikat telah memulai program war on terrorism. Dengan program tersebut, Amerika Serikat berusaha untuk memburu Al Qaeda dan jaringannya. Pada perkembangannya, Amerika Serikat mendapat tantangan baru dengan adanya serangan cyberterrorism. Cyberterrorism hal penting yang harus diantisipasi mengingat Amerika Serikat memiliki ketergantungan tinggi terhadap sistem jaringan dan komputer. Serangan Cyberterrorism kepada Amerika Serikat dilakukan dengan mencuri data penting pemerintah seperti militer dan ekonomi. Dari hasil penelurusan, diketahui bahwa China sebagai aktor di balik serangan tersebut. Dengan menggunakan konsep cyber power dan netwar, penelitian ini dimaksudkan untuk menjelaskan respon Amerika Serikat untuk merespon serangan cyberterrorism tersebut. Berdasarkan landasan teoritik yang digunakan, diketahui bahwa Amerika Serikat menggunakan perpaduan antara hard dan soft power dalam merespon tindakan cyberterrorism dari China tersebut.

USA started war on terrorism program on 2001. USA tried to hunt Al Qaeda and its network using that program. On its development, USA was challenged with cyberterrorism attack. Cyberterrorism is an important issue and must be anticipated due to USA highly dependent on its computer network system. Cyberterrorism is done by stealing important government?s data such as military and economic data. Investigation revealed that China is responsible from such attack. Using cyber power and netwar concept, this research will explain USA?s response to cyber terrorism attack. Based on the theory, USA is known to use combination of hard and soft power to response cyberterrorism attack from China."
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2013
T35672
UI - Tesis Membership  Universitas Indonesia Library
cover
Singer, P. W.
"Summary:
Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into U.S. government computer systems by Chinese hackers -- presumably sponsored by the Chinese government -- is another. Together, they point to a new era in the evolution of human conflict. Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They explain what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves"
Oxford, Chichester: Oxford University Press, 2014
005.8 SIN c
Buku Teks  Universitas Indonesia Library