Main Article Content

Abstract

This study examines the impact of national data theft by hackers in 2024 by identifying weak communication regulations. The study was conducted using a qualitative approach with a case strategy. The study results found the need for strict regulations to protect sensitive data by emphasizing that clear and consistently implemented policies can reduce the risk of data theft. The case studies analyzed showed that weak passwords significantly increased vulnerability to attacks, illustrating the need for better education and implementation of stronger security practices. In conclusion, this study underscores the importance of effective regulations in addressing cyber threats and improving the protection of personal information in today's digital era.

Keywords

cyber communication regulation password cyber attacks national data security

Article Details

How to Cite
Tanjung, M. F., & Febrianisa, F. (2024). Peran Regulasi Komunikasi dalam Mengatasi Pencurian Data Nasional pada 2024. Jurnal Mahasiswa Komunikasi Cantrik, 4(2). https://doi.org/10.20885/cantrik.vol4.iss2.art2

References

  1. Adhikari, S. (2024). Necessity of Big Data Security and its Relation to National Security. Unity Journal, 5(1), 1–14. https://doi.org/10.3126/unityj.v5i1.63137
  2. Adnani, K. (2021). Metodologi Penelitian Komunikasi Kualitatif dan Kuantitatif (Firts). Efudepress. https://eprints.iain-surakarta.ac.id/5064/1/14.
  3. Andhika, I. K. (2024). “ADMIN#1234” Ternyata Password Untuk Akses Server PDN. 06 Juli. https://www.rri.co.id/iptek/806581/admin-1234-ternyata-password-untuk-akses-server-pdn
  4. Bahtiar, N. (2022). Darurat Kebocoran Data : Kebutuhan Regulasi Pemerintah. Development Policy and Management Review (DPMR), 2(1), 1–16. file:///C:/Users/user/Downloads/32144-Article Text-109597-1-10-20240320.pdf
  5. Chaudhary, S., Gkioulos, V., & Katsikas, S. (2022). Developing metrics to assess the effectiveness of cybersecurity awareness program. Journal of Cybersecurity, 8(1), 1–19. https://doi.org/10.1093/cybsec/tyac006
  6. Feintuck, M., & Varney, M. (2006). Media Regulation, Public Interest, and the Law. Edinburgh University Press Ltd.
  7. Li, L., He, W., Xu, L., Ash, I., Mohd Anwar, & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13–14. https://doi.org/https://doi.org/10.1016/j.ijinfomgt.2018.10.017
  8. Mishra, A., Alzoubi, Y. I., Gill, A. Q., & Anwar, M. J. (2022). Cybersecurity Enterprises Policies: A Comparative Study. Sensors, 22(2), 1–35. https://doi.org/10.3390/s22020538
  9. Nugroho, I. H. D., Pebriawan, K., Jati, K. G. T. M., Diptha, I. G. C. A., Listartha, I. M. E., & Saskara, G. A. J. (2023). Analisa Evaluasi Kinerja Software Password Attacker Pada Berkas File Zip. Jurnal Informatika Dan Tekonologi Komputer (JITEK), 3(1), 14–23. https://doi.org/10.55606/jitek.v3i1.899
  10. Rianto, P. (2019). Perbandingan Paradigma Otoritarianisme dan Demokrasi dalam Regulasi Media Massa di Indonesia. JURNAL IPTEKKOM : Jurnal Ilmu Pengetahuan & Teknologi Informasi, 21(2), 123. https://doi.org/10.33164/iptekkom.21.2.2019.123-138
  11. Rianto, P. (2024). Regulasi komunikasi: tantangan di era media baru (Firts). UII Press Yogyakarta.
  12. Sarjito, A. (2024). Data Security and Privacy in the Digital Era : Challenges for Modern Government. JIAN (Jurnal Ilmiah Administrasi Negara), 8(3), 1–13. https://ojs.ejournalunigoro.com/index.php/JIAN