Analisis Potensi Ancaman Asimetris Berdasarkan Kerentanan Keamanan Siber Sektor Industri Energi Baru Terbarukan (EBT)
DOI:
https://doi.org/10.31316/jk.v6i2.3165Abstract
Abstrak
Awal Dekade ini merupakan tonggak awal transisi dari masa industri 4.0 menjadi Society 5.0. Perubahan era ini menyebabkan seluruh lapisan masyarakat harus dapat menyesuaikan diri dengan perkembangan teknologi. Dalam Society 5.0 dimana komponen utamanya adalah manusia yang mampu menciptakan nilai baru melalui perkembangan teknologi dapat meminimalisir adanya kesenjangan pada manusia dan masalah ekonomi dikemudian hari. akan tetapi dengan berkembangnya teknologi menyebabkan dampak pada Perkembangan konflik dan peperangan yang saat ini telah masuk ke babak baru. Ancaman yang dapat timbul beragam, tidak terlihat secara real dan tidak menentu. Ancaman tersebut adalah ancaman siber yang berpotensi menyebabkan kerugian besar bagi suatu negara. Salah satu dampak besar yang dapat terjadi di masa depan adalah serangan siber terhadap objek vital nasional atau infrastruktur kritis negara seperti pembangkit listrik. Pembangkit listrik energi terbarukan memanfaatkan teknologi tinggi yang terhubung ke jaringan distribusi besar yang menyebabkan jika tidak memperkuat pengamanan jaringan maka dapat menimbulkan black out listrik hingga pemadaman secara keseluruhan yang disebabkan oleh pihak yang tidak bertanggung jawab/non-state actors. Oleh sebab itu semua negara harus dapat mempersiapkan pembinaan, membentuk satuan baru dan memperkuat masing-masing pertahanan negara mereka.
Kata Kunci: Keamanan Siber, Ancaman Siber, Sektor Energi Terbarukan, Peperangan Asimetris
Â
Abstract
The beginning of this decade was the initial milestone of the transition from the industrial period 4.0 to Society 5.0. The changes in this era have caused all walks of life to be able to adjust to technological developments. In Society 5.0 where the main component is humans who are able to create new value through technological developments, it can minimize gaps in humans and economic problems in the future. however, with the development of technology, it has an impact on the development of conflicts and wars that have now entered a new chapter. The threats that can arise are diverse, invisible in real terms and erratic. Such threats are cyber threats that have the potential to cause huge losses to a country. One of the major impacts that could occur in the future is cyberattacks against national vital objects or critical infrastructure of the country such as power plants. Renewable energy power plants utilize high technology connected to large distribution networks which causes if it does not strengthen network security, it can cause power blackouts to overall outages caused by irresponsible parties / non-state actors. Therefore, all countries must be able to prepare for development, form new units and strengthen each of their country's defenses.
Keywords: Cybersecurity, Cyber Threats, Renewable Energy Sector, Asymmetric Warfare
References
DAFTAR PUSTAKA
Aghenta, L. O., & Iqbal, T. (2019). Design and implementation of a low-cost, open source IoT-based SCADA system using ESP32 with OLED, ThingsBoard and MQTT protocol. AIMS Electronics and Electrical Engineering, 4(1), 57-86.
Alabady, S. A., Al-Turjman, F., & Din, S. (2020). A novel security model for cooperative virtual networks in the IoT era. International Journal of Parallel Programming, 48(2), 280-295.
Alotaibi, I., Abido, M. A., Khalid, M., & Savkin, A. V. (2020). A comprehensive review of recent advances in smart grids: A sustainable future with renewable energy resources. Energies, 13(23), 6269.
Anggito, A., & Setiawan, J. (2018). Metodologi penelitian kualitatif. CV Jejak (Jejak Publisher).
Bedi, G., Venayagamoorthy, G. K., Singh, R., Brooks, R. R., & Wang, K. C. (2018). Review of Internet of Things (IoT) in electric power and energy systems. IEEE Internet of Things Journal, 5(2), 847-870.
Buchanan, B. (2020). The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics. Harvard University Press.
Brangetto, P., & Aubyn, M. K. S. (2015). Economic aspects of national cyber security strategies. Brangetto P., Aubyn MK-S. Economic Aspects of National Cyber Security Strategies: project report. Annex, 1(9-16), 86.
Calamanti, G. (2021). Security and Climate Change linkage: Analyzing the European discourse until the Defence Roadmap.
Cole, E. (2011). Network security bible. John Wiley & Sons.
Darmalaksana, W. (2020). Metode Penelitian Kualitatif Studi Pustaka dan Studi Lapangan. Pre-Print Digital Library UIN Sunan Gunung Djati Bandung.
Dhar, S., & Bose, I. (2021). Securing IoT devices using zero trust and blockchain. Journal of Organizational Computing and Electronic Commerce, 31(1), 18-34.
Dutta, P., Choi, T. M., Somani, S., & Butala, R. (2020). Blockchain technology in supply chain operations: Applications, challenges and research opportunities. Transportation research part e: Logistics and transportation review, 142, 102067.
Fay, M., Hallegatte, S., Vogt-Schilb, A., Rozenberg, J., Narloch, U., & Kerr, T. (2015). Decarbonizing development: Three steps to a zero-carbon future. World Bank Publications.
Gunduz, M. Z., & Das, R. (2020). Cyber-security on smart grid: Threats and potential solutions. Computer networks, 169, 107094.
Hamzah, D. A. (2021). Metode Penelitian Kualitatif Rekontruksi Pemikiran Dasar serta Contoh Penerapan Pada Ilmu Pendidikan, Sosial & Humaniora. CV Literasi Nusantara Abadi.
Henrie, M. (2013). Cyber security risk management in the SCADA critical infrastructure environment. Engineering Management Journal, 25(2), 38-45
Idris, A. M., Sasongko, N. A., & Kuntjoro, Y. D. (2022). “AUKUS Cooperation in the Form of Australian Nuclear Submarine Technology for Stability in Indo-Pacific Regionâ€. International Journal of Research and Innovation in Social Science (IJRISS). 6(2), pp.745-750. DOI: https://dx.doi.org/10.47772/IJRISS.2022.6237
Idris, A. M., Sasongko, N. A., & Kuntjoro, Y. D. (2022). Energy Conversion and Conservation Technology in Facing Net Zero-Emission Conditions and Supporting National Defense. Trends in Renewable Energy, 8(1), 49-66.
IEA. 2021. Renewable 2021 Analysis and Forecast to 2026. International Energy Agency Report and Publication 2021.
Kammen, D. M., & Sunter, D. A. (2016). City-integrated renewable energy for urban sustainability. Science, 352(6288), 922-928.
Kementerian Pertahanan Republik Indonesia. 2017. Kebijakan Pertahanan Negara Tahun 2018. Kementerian Pertahanan Republik Indonesia
Khanna, M. (2021). COVIDâ€19: A cloud with a silver lining for renewable energy?. Applied economic perspectives and policy, 43(1), 73-85.
Markopoulou, D., Papakonstantinou, V., & De Hert, P. (2019). The new EU cybersecurity framework: The NIS Directive, ENISA's role and the General Data Protection Regulation. Computer Law & Security Review, 35(6), 105336.
Overland, I. (2019). The geopolitics of renewable energy: Debunking four emerging myths. Energy Research & Social Science, 49, 36-40.
Peraturan Menteri Pertahanan Republik Indonesia NOMOR 82 TAHUN 2014 tentang Pedoman Pertahanan Siber
PlÄ—ta, T., TvaronaviÄienÄ—, M., Casa, S. D., & Agafonov, K. (2020). Cyber-attacks to critical energy infrastructure and management issues: Overview of selected cases.
Pusat Penerangan Tentara Nasional Indonesia. 2022. Peresmian Military Computer Security Incident Response Team (Mil-CSIRT) TNI. https://tni.mil.id/video-607-peresmian-military-computer-security-incident-response-team-mil-csirt-tni.html
Samarati, P., di Vimercati, S. D. C., Murugesan, S., & Bojanova, I. (2016). Cloud security: Issues and concerns (pp. 1-14). Chichester: Wiley.
Tahaei, M., & Vaniea, K. (2019, June). A survey on developer-centred security. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 129-138). IEEE.
Vakulchuk, R., Overland, I., & Scholten, D. (2020). Renewable energy and geopolitics: A review. Renewable and Sustainable Energy Reviews, 122, 109547.
Walker, A., Desai, J., Saleem, D., & Gunda, T. (2021). Cybersecurity in Photovoltaic Plant Operations (No. NREL/TP-5D00-78755). National Renewable Energy Lab.(NREL), Golden, CO (United States).
Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2012). A survey on smart grid communication infrastructures: Motivations, requirements and challenges. IEEE communications surveys & tutorials, 15(1), 5-20.
Yannakogeorgos, P. (2021). Cyber Competition and Global Stability. In The Future of Global Affairs (pp. 223-246). Palgrave Macmillan, Cham.
Yergin, D. (2006). Ensuring energy security. Foreign affairs, 69-82.
Zaheeruddin, & Manas, M. (2015). Analysis of design of technologies, tariff structures, and regulatory policies for sustainable growth of the smart grid. Energy Technology & Policy, 2(1), 28-38.
Zaman, G., & Cristea, A. (2011). EU structural funds absorption in Romania: obstacles and issues. Romanian Journal of Economics, 32(1), 41.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Joko Yulianto, Suyono Thamrin, Yusuf Ali, Abdi Manab Idris
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
-
The journal allow the authors to hold the copyright without restrictions and allow the authors to retain publishing rights without restrictions.
-
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This work is licensed under a Lisensi Creative Commons Atribusi-BerbagiSerupa 4.0 Internasional.