Cyberaksi 3.0 Empowering Cybersecurity Skill

Authors

  • Arizal Politeknik Siber dan Sandi Negara
  • Amiruddin Politeknik Siber dan Sandi Negara
  • Dimas Febriyan Priambodo Politeknik Siber dan Sandi Negara
  • Jeckson Sidabutar Politeknik Siber dan Sandi Negara
  • Ira Rosianal Hikmah Politeknik Siber dan Sandi Negara
  • Septia Ulfa Sunaringtyas Politeknik Siber dan Sandi Negara
  • Tiyas Yulita politeknik Siber dan Sandi Negara

DOI:

https://doi.org/10.37366/jpp.v2i2.4870

Keywords:

5G, CTF, Webinar, Workshop, Cybersecurity

Abstract

Kesadartahuan terhadap keamanan siber menjadi salah satu hal yang perlu dimiliki oleh masyarakat seiring dengan perkembangan teknologi yang semakin pesat. Salah satunya pemanfaatan teknologi jaringan 5G selain meningkatkan kualitas layanan berbasis internet, juga memberikan ancaman baru yang patut diwaspadai. Program kesadartahuan dilaksanakan untuk meningkatkan pengetahuan dan kepedulian masyarakat terkait pemanfaatan teknologi 5G, berbagai ancaman keamanan siber yang muncul akibat adanya teknologi ini serta rekomendasi aksi yang bisa dilaksakan untuk memitigasi risiko yang muncul. Program pengabdian masyarakat ini disampaikan dalam bentuk webinar dilengkapi dengan workshop Capture The Flag untuk meningkatkan kemampuan peserta mengidentifikasi kerawanan. Dari hasil analisis pretest-posttest sejumlah 544 peserta, dinyatakan bahwa program kesadartahuan Cyberaksi 3.0 dengan tema empowering cybersecurity skill efektif meningkatkan pengetahuan peserta dengan nilai t_((0,025;107))=1,98.

References

A. Granić, “Technology adoption at individual level: toward an integrated overview,” Univers. Access Inf. Soc., vol. 23, no. 2, pp. 843–858, 2024, doi: 10.1007/s10209-023-00974-3.

I. Trinugroho, P. Pamungkas, J. Wiwoho, S. M. Damayanti, and T. Pramono, “Adoption of digital technologies for micro and small business in Indonesia,” Financ. Res. Lett., vol. 45, p. 102156, 2022, doi: https://doi.org/10.1016/j.frl.2021.102156.

I. Elan Maulani and C. Amalia Johansyah, “The Development of 5G Technology and Its Implications For The Industry,” Devot. J. Res. Community Serv., vol. 4, no. 2, pp. 631–635, 2023, doi: 10.36418/devotion.v4i2.416.

S. U. Sunaringtyas et al., Tinjuan Strategis Keamanan Siber Indonesia - Menuju Era Teknologi 5G, 1st ed. Bogor: PoltekSSN Press, 2022.

J. P. Mohan, N. Sugunaraj, and P. Ranganathan, “Cyber Security Threats for 5G Networks,” in 2022 IEEE International Conference on Electro Information Technology (eIT), 2022, pp. 446–454. doi: 10.1109/eIT53891.2022.9813965.

T. Madi, H. A. Alameddine, M. Pourzandi, and A. Boukhtouta, “NFV security survey in 5G networks: A three-dimensional threat taxonomy,” Comput. Networks, vol. 197, p. 108288, 2021, doi: https://doi.org/10.1016/j.comnet.2021.108288.

I. Ahmad, S. Shahabuddin, T. Kumar, J. Okwuibe, A. Gurtov, and M. Ylianttila, “Security for 5G and beyond,” IEEE Commun. Surv. Tutorials, vol. 21, no. 4, pp. 3682–3722, 2019, doi: 10.1109/COMST.2019.2916180.

“Operator Watch Blog: Indonesia consolidating 4G.” https://www.operatorwatch.com/2020/06/indonesia-consolidating-4g.html (accessed Jul. 11, 2024).

F. W. Access, S. Pus-, W. Jarot, and I. Division, “Indonesia ’ s Leap to 5G FWA,” Indonesian Times, Mar. 2024.

“Complete 5G or Jump to the Next Technology?,” Kompas.id. https://www.kompas.id/baca/english/2024/03/12/en-penggelaran-layanan-5g-perlu-dilanjutkan-atau-langsung-loncat-ke-teknologi-selanjutnya (accessed Jul. 11, 2024).

R. Radu and C. Amon, “The governance of 5G infrastructure: Between path dependency and risk-based approaches,” J. Cybersecurity, vol. 7, no. 1, pp. 1–16, 2021, doi: 10.1093/cybsec/tyab017.

J. P. Kleinhans, “5G vs . National Security,” 2019.

F. Goupil, P. Laskov, I. Pekaric, M. Felderer, A. Dürr, and F. Thiesse, “Towards Understanding the Skill Gap in Cybersecurity,” in Proceedings of the 27th ACM Conference on on Innovation and Technology in Computer Science Education Vol. 1, 2022, pp. 477–483. doi: 10.1145/3502718.3524807.

A. M. Alnajim, S. Habib, M. Islam, H. S. AlRawashdeh, and M. Wasim, “Exploring Cybersecurity Education and Training Techniques: A Comprehensive Review of Traditional, Virtual Reality, and Augmented Reality Approaches,” Symmetry (Basel)., vol. 15, no. 12, 2023, doi: 10.3390/sym15122175.

C. E. Hilton, “The importance of pretesting questionnaires: a field research example of cognitive pretesting the Exercise referral Quality of Life Scale (ER-QLS),” Int. J. Soc. Res. Methodol., vol. 20, no. 1, pp. 21–34, Jan. 2017, doi: 10.1080/13645579.2015.1091640.

D. M. K. AFIFY, “Effect of Interactive Video Length Within E-Learning Environments on Cognitive Load, Cognitive Achievement and Retention of Learning,” Turkish Online J. Distance Educ., vol. 21, no. 4, pp. 68–89, 2020.

P. J. Guo, J. Kim, and R. Rubin, “How Video Production Affects Student Engagement: An Empirical Study of MOOC Videos,” SIGCHI Conf. Proc., 2014.

I. Hassan, “Teaching Cybersecurity to Computer Science Students Utilizing Terminal Sessions Recording Software as a Pedagogical Tool,” in 2020 IEEE Frontiers in Education Conference (FIE), 2020, pp. 1–8. doi: 10.1109/FIE44824.2020.9274268.

I. S. Kurniawan and L. T. H. Hutami, “The Mediation of Job Engagement to Rewards and Recognition toward Organizational Citizenship Behavior and Task Performance,” vol. 86, no. Icobame 2018, pp. 48–52, 2019, doi: 10.2991/icobame-18.2019.10.

S. S. Mesepy, “The impact of reward and recognition on employee engagement at PT. Bank Sulutgo, Manado,” J. Berk. Ilm. Efisiensi, vol. 16, no. 01, pp. 289–301, 2016.

Y. Marleyna, D. Devie, and F. Foedjiawati, “Reward System, Employee Engagement, and the Role of Employee Satisfaction as Mediating Variable,” Petra Int. J. Bus. Stud., vol. 5, no. 1, pp. 97–108, 2022, doi: 10.9744/ijbs.5.1.97-108.

S. Boslaugh, Statistics in a Nutshell, 2nd ed. O’Reilly Media, Inc., 2012.

Downloads

Published

2024-07-17

Issue

Section

Articles