Analisis Peran dan Penanggulangan Kejahatan Siber: Studi Kasus Spearphishing

Authors

  • Marhaeni Sekar Fajar Purwani Bapas Kelas I Yogyakarta

DOI:

https://doi.org/10.61682/restorative.v1i1.5

Keywords:

analysis, case study, cybercrime, roles, spearphishing

Abstract

The understanding of the mechanism, modus operandi, and actors involved in a cybercrime is a crucial early step to design cybercrime countermeasure strategies. This paper discusses a hypothetical case of spearphishing that involves the perpetrators, victims, as well as the unwitting participants of the committed cybercrime. Four approaches in cybercrime countermeasures are afterwards elaborated for the aforementioned hypothetical case. It is concluded that countermeasures based on education are the type of countermeasure most feasible and most crucial to be implemented; however, all types of countermeasures have their limitations and therefore have to continuously evolve and develop along with the increasingly sophisticated cybercrime.

 

Abstrak. Pemahaman mengenai mekanisme, modus operandi, serta pihak-pihak yang terlibat dalam kejahatan siber merupakan langkah awal yang penting untuk merancang strategi penanggulangan tindak kejahatan siber. Karya tulis ini membahas sebuah kasus hipotetis serangan spearphishing yang melibatkan pelaku, korban, beserta pihak-pihak lain yang tanpa disadari juga terlibat dalam kejahatan siber yang dilakukan. Empat jenis pendekatan dalam penanggulangan kejahatan siber dibahas untuk kasus hipotetis tersebut. Disimpulkan bahwa penanggulangan dengan pendekatan edukasi merupakan jenis penanggulangan yang paling memungkinkan dan paling penting untuk dilaksanakan; namun, setiap jenis penanggulangan memiliki keterbatasan dan harus terus dikembangkan seiring dengan juga kejahatan siber yang semakin canggih.

 

Kata kunci: analisis, kejahatan siber, peran, spearphishing, studi kasus

References

Anderson, R., Barton, C., Böhme, R., Clayton, R., Gañán, C., Grasso, T., Levi, M., Moore, T., & Vasek, M. (2019). Measuring the Changing Cost of Cybercrime. The 2019 Workshop on the Economics of Information Security

Brenner, S. W. (2011). Defining cybercrime: A review of federal and state law. Cybercrime: The Investigation, Prosecution, and Defense of a Computer-Related Crime, 15–104.

Caputo, D. D., Pfleeger, S. L., Freeman, J. D., & Johnson, M. E. (2014). Going Spear Phishing: Exploring Embedded Training and Awareness. IEEE Security & Privacy, 12(1), 28–38. https://doi.org/10.1109/MSP.2013.106

Clarke, R. V. (1995). Situational Crime Prevention. Crime and Justice, 19, 91–150. https://doi.org/10.1086/449230

Djanggih, H., & Qamar, N. (2018). Penerapan Teori-Teori Kriminologi dalam Penanggulangan Kejahatan Siber (Cyber Crime). Pandecta: Research Law Journal, 13(1), 10–23. https://doi.org/10.15294/pandecta.v13i1.14020

Furnall, S. (2010). Hackers, viruses, and malicious software. In Handbook of Internet Crime (pp. 173–193). Willan Publishing.

Gandotra, E., Bansal, D., & Sofat, S. (2016). Zero-day malware detection. 2016 Sixth International Symposium on Embedded Computing and System Design (ISED), 171–175. https://doi.org/10.1109/ISED.2016.7977076

Ghazi-Tehrani, A. K., & Pontell, H. N. (2021). Phishing Evolves: Analyzing the Enduring Cybercrime. Victims & Offenders, 16(3), 316–342. https://doi.org/10.1080/15564886.2020.1829224

Hasan, M. F., Al-Ramadan, N. S., & Professor, A. (2021). Cyber-attacks and Cyber Security Readiness: Iraqi Private Banks Case. In Social Science and Humanities Journal (Vol. 05).

Holt, T. J. (2018). Regulating Cybercrime through Law Enforcement and Industry Mechanisms. The ANNALS of the American Academy of Political and Social Science, 679(1), 140–157. https://doi.org/10.1177/0002716218783679

Ilchenko, O., Chumak, V., Kuzmenko, S., Shelukhin, O., & Dobrovinskyi, A. (2019). Fishing as a cybercrime in the Internet banking system: economic and legal aspects. Journal of Legal, Ethical and Regulatory Issues, 22, 1.

Kim, J.-Y., Bu, S.-J., & Cho, S.-B. (2018). Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders. Information Sciences, 460–461, 83–102. https://doi.org/10.1016/j.ins.2018.04.092

Kirlappos, I., & Sasse, M. A. (2012). Security Education against Phishing: A Modest Proposal for a Major Rethink. IEEE Security & Privacy Magazine, 10(2), 24–32. https://doi.org/10.1109/MSP.2011.179

Kirwan, G., & Power, A. (2013). Cybercrime: The Psychology of Online Offenders. Cambridge University Press. https://books.google.co.id/books?id=U35HVJyADlEC

Li, L., Berki, E., Helenius, M., & Ovaska, S. (2014). Towards a contingency approach with whitelist- and blacklist-based anti-phishing applications: what do usability tests indicate? Behaviour & Information Technology, 33(11), 1136–1147. https://doi.org/10.1080/0144929X.2013.875221

Lin, T., Capecci, D. E., Ellis, D. M., Rocha, H. A., Dommaraju, S., Oliveira, D. S., & Ebner, N. C. (2019). Susceptibility to Spear-Phishing Emails. ACM Transactions on Computer-Human Interaction, 26(5), 1–28. https://doi.org/10.1145/3336141

Marshall, A. S. P. (2008). Identity and identity theft. In R. Bryant (Ed.), Investigating Digital Crime (pp. 179–193). Wiley.

Nield, D. (2017, January). 4 Computer Security Threats You Might Not Be Protecting Against. Https://Gizmodo.Com/4-Computer-Security-Threats-You-Might-Not-Be-Protecting-1791226612.

Raghavan, A. R., & Parthiban, L. (2014). The effect of cybercrime on a Bank’s finances. International Journal of Current Research & Academic Review, 2(2), 173–178.

Thomas, K., Huang, D., Wang, D., Bursztein, E., Grier, C., Holt, T. J., Kruegel, C., McCoy, D., Savage, S., & Vigna, G. (2015). Framing dependencies introduced by underground commoditization. Workshop on the Economics of Information Security.

Downloads

Published

10-09-2023

How to Cite

Purwani, M. S. F. (2023). Analisis Peran dan Penanggulangan Kejahatan Siber: Studi Kasus Spearphishing. Restorative : Journal of Indonesian Probation and Parole System, 1(1), 33–45. https://doi.org/10.61682/restorative.v1i1.5

Issue

Section

Articles