Analisis Potensi Ancaman Asimetris Berdasarkan Kerentanan Keamanan Siber Sektor Industri Energi Baru Terbarukan (EBT)

Authors

  • Joko Yulianto Universitas Pertahanan Republik Indonesia
  • Suyono Thamrin Universitas Pertahanan Republik Indonesia
  • Yusuf Ali Universitas Pertahanan Republik Indonesia
  • Abdi Manab Idris Universitas Pertahanan Republik Indonesia

DOI:

https://doi.org/10.31316/jk.v6i2.3165

Abstract

Abstrak

Awal Dekade ini merupakan tonggak awal transisi dari masa industri 4.0 menjadi Society 5.0. Perubahan era ini menyebabkan seluruh lapisan masyarakat harus dapat menyesuaikan diri dengan perkembangan teknologi. Dalam Society 5.0 dimana komponen utamanya adalah manusia yang mampu menciptakan nilai baru melalui perkembangan teknologi dapat meminimalisir adanya kesenjangan pada manusia dan masalah ekonomi dikemudian hari. akan tetapi dengan berkembangnya teknologi menyebabkan dampak pada Perkembangan konflik dan peperangan yang saat ini telah masuk ke babak baru. Ancaman yang dapat timbul beragam, tidak terlihat secara real dan tidak menentu. Ancaman tersebut adalah ancaman siber yang berpotensi menyebabkan kerugian besar bagi suatu negara. Salah satu dampak besar yang dapat terjadi di masa depan adalah serangan siber terhadap objek vital nasional atau infrastruktur kritis negara seperti pembangkit listrik. Pembangkit listrik energi terbarukan memanfaatkan teknologi tinggi yang terhubung ke jaringan distribusi besar yang menyebabkan jika tidak memperkuat pengamanan jaringan maka dapat menimbulkan black out listrik hingga pemadaman secara keseluruhan yang disebabkan oleh pihak yang tidak bertanggung jawab/non-state actors. Oleh sebab itu semua negara harus dapat mempersiapkan pembinaan, membentuk satuan baru dan memperkuat masing-masing pertahanan negara mereka.

Kata Kunci: Keamanan Siber, Ancaman Siber, Sektor Energi Terbarukan, Peperangan Asimetris

 

Abstract

The beginning of this decade was the initial milestone of the transition from the industrial period 4.0 to Society 5.0. The changes in this era have caused all walks of life to be able to adjust to technological developments. In Society 5.0 where the main component is humans who are able to create new value through technological developments, it can minimize gaps in humans and economic problems in the future. however, with the development of technology, it has an impact on the development of conflicts and wars that have now entered a new chapter. The threats that can arise are diverse, invisible in real terms and erratic. Such threats are cyber threats that have the potential to cause huge losses to a country. One of the major impacts that could occur in the future is cyberattacks against national vital objects or critical infrastructure of the country such as power plants. Renewable energy power plants utilize high technology connected to large distribution networks which causes if it does not strengthen network security, it can cause power blackouts to overall outages caused by irresponsible parties / non-state actors. Therefore, all countries must be able to prepare for development, form new units and strengthen each of their country's defenses.

Keywords: Cybersecurity, Cyber Threats, Renewable Energy Sector, Asymmetric Warfare

References

DAFTAR PUSTAKA

Aghenta, L. O., & Iqbal, T. (2019). Design and implementation of a low-cost, open source IoT-based SCADA system using ESP32 with OLED, ThingsBoard and MQTT protocol. AIMS Electronics and Electrical Engineering, 4(1), 57-86.

Alabady, S. A., Al-Turjman, F., & Din, S. (2020). A novel security model for cooperative virtual networks in the IoT era. International Journal of Parallel Programming, 48(2), 280-295.

Alotaibi, I., Abido, M. A., Khalid, M., & Savkin, A. V. (2020). A comprehensive review of recent advances in smart grids: A sustainable future with renewable energy resources. Energies, 13(23), 6269.

Anggito, A., & Setiawan, J. (2018). Metodologi penelitian kualitatif. CV Jejak (Jejak Publisher).

Bedi, G., Venayagamoorthy, G. K., Singh, R., Brooks, R. R., & Wang, K. C. (2018). Review of Internet of Things (IoT) in electric power and energy systems. IEEE Internet of Things Journal, 5(2), 847-870.

Buchanan, B. (2020). The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics. Harvard University Press.

Brangetto, P., & Aubyn, M. K. S. (2015). Economic aspects of national cyber security strategies. Brangetto P., Aubyn MK-S. Economic Aspects of National Cyber Security Strategies: project report. Annex, 1(9-16), 86.

Calamanti, G. (2021). Security and Climate Change linkage: Analyzing the European discourse until the Defence Roadmap.

Cole, E. (2011). Network security bible. John Wiley & Sons.

Darmalaksana, W. (2020). Metode Penelitian Kualitatif Studi Pustaka dan Studi Lapangan. Pre-Print Digital Library UIN Sunan Gunung Djati Bandung.

Dhar, S., & Bose, I. (2021). Securing IoT devices using zero trust and blockchain. Journal of Organizational Computing and Electronic Commerce, 31(1), 18-34.

Dutta, P., Choi, T. M., Somani, S., & Butala, R. (2020). Blockchain technology in supply chain operations: Applications, challenges and research opportunities. Transportation research part e: Logistics and transportation review, 142, 102067.

Fay, M., Hallegatte, S., Vogt-Schilb, A., Rozenberg, J., Narloch, U., & Kerr, T. (2015). Decarbonizing development: Three steps to a zero-carbon future. World Bank Publications.

Gunduz, M. Z., & Das, R. (2020). Cyber-security on smart grid: Threats and potential solutions. Computer networks, 169, 107094.

Hamzah, D. A. (2021). Metode Penelitian Kualitatif Rekontruksi Pemikiran Dasar serta Contoh Penerapan Pada Ilmu Pendidikan, Sosial & Humaniora. CV Literasi Nusantara Abadi.

Henrie, M. (2013). Cyber security risk management in the SCADA critical infrastructure environment. Engineering Management Journal, 25(2), 38-45

Idris, A. M., Sasongko, N. A., & Kuntjoro, Y. D. (2022). “AUKUS Cooperation in the Form of Australian Nuclear Submarine Technology for Stability in Indo-Pacific Regionâ€. International Journal of Research and Innovation in Social Science (IJRISS). 6(2), pp.745-750. DOI: https://dx.doi.org/10.47772/IJRISS.2022.6237

Idris, A. M., Sasongko, N. A., & Kuntjoro, Y. D. (2022). Energy Conversion and Conservation Technology in Facing Net Zero-Emission Conditions and Supporting National Defense. Trends in Renewable Energy, 8(1), 49-66.

IEA. 2021. Renewable 2021 Analysis and Forecast to 2026. International Energy Agency Report and Publication 2021.

Kammen, D. M., & Sunter, D. A. (2016). City-integrated renewable energy for urban sustainability. Science, 352(6288), 922-928.

Kementerian Pertahanan Republik Indonesia. 2017. Kebijakan Pertahanan Negara Tahun 2018. Kementerian Pertahanan Republik Indonesia

Khanna, M. (2021). COVIDâ€19: A cloud with a silver lining for renewable energy?. Applied economic perspectives and policy, 43(1), 73-85.

Markopoulou, D., Papakonstantinou, V., & De Hert, P. (2019). The new EU cybersecurity framework: The NIS Directive, ENISA's role and the General Data Protection Regulation. Computer Law & Security Review, 35(6), 105336.

Overland, I. (2019). The geopolitics of renewable energy: Debunking four emerging myths. Energy Research & Social Science, 49, 36-40.

Peraturan Menteri Pertahanan Republik Indonesia NOMOR 82 TAHUN 2014 tentang Pedoman Pertahanan Siber

PlÄ—ta, T., TvaronaviÄienÄ—, M., Casa, S. D., & Agafonov, K. (2020). Cyber-attacks to critical energy infrastructure and management issues: Overview of selected cases.

Pusat Penerangan Tentara Nasional Indonesia. 2022. Peresmian Military Computer Security Incident Response Team (Mil-CSIRT) TNI. https://tni.mil.id/video-607-peresmian-military-computer-security-incident-response-team-mil-csirt-tni.html

Samarati, P., di Vimercati, S. D. C., Murugesan, S., & Bojanova, I. (2016). Cloud security: Issues and concerns (pp. 1-14). Chichester: Wiley.

Tahaei, M., & Vaniea, K. (2019, June). A survey on developer-centred security. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 129-138). IEEE.

Vakulchuk, R., Overland, I., & Scholten, D. (2020). Renewable energy and geopolitics: A review. Renewable and Sustainable Energy Reviews, 122, 109547.

Walker, A., Desai, J., Saleem, D., & Gunda, T. (2021). Cybersecurity in Photovoltaic Plant Operations (No. NREL/TP-5D00-78755). National Renewable Energy Lab.(NREL), Golden, CO (United States).

Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2012). A survey on smart grid communication infrastructures: Motivations, requirements and challenges. IEEE communications surveys & tutorials, 15(1), 5-20.

Yannakogeorgos, P. (2021). Cyber Competition and Global Stability. In The Future of Global Affairs (pp. 223-246). Palgrave Macmillan, Cham.

Yergin, D. (2006). Ensuring energy security. Foreign affairs, 69-82.

Zaheeruddin, & Manas, M. (2015). Analysis of design of technologies, tariff structures, and regulatory policies for sustainable growth of the smart grid. Energy Technology & Policy, 2(1), 28-38.

Zaman, G., & Cristea, A. (2011). EU structural funds absorption in Romania: obstacles and issues. Romanian Journal of Economics, 32(1), 41.

Downloads

Published

2022-07-06