A Strengthening Asean Cyber Cooperation in Countering Cyber Terrorist Groups Activities on the Internet by Implementing the Six-Ware Cyber Security Framework
Nowadays, the extremism, radicalism and terrorism groups have taken advantages the use of Internet access to support their activities, i.e, member recruitment, propaganda, fundraising, cyberattack actions against their targets, etc. This is one of the issues of cyber security as a negative impact of internet utilization especially by the extremism, radicalism and terrorism groups. They know the benefits of the internet services and social media can be used to facilitate the control of information in their organizational command and control system. In order to tackle this cyber security issue, the internet users in Association of Southeast Asian Nations (ASEAN) member countries should get more understanding as well as protection from their government against the danger of cyber extremism, cyber radicalism or cyber terrorism activities over the Internet. Therefore, this paper tries to explain the need of an ASEAN Cyber Security Framework standard in order to countering cyber terrorism activities via Internet as well as introducing the initial concept of Six-Ware Cyber Security Framework (SWCSF).
Establishing BSSN - National Cyber Agency, https://id.wikipedia.org/wiki/Badan_Siber_dan_Sandi _Negara, accessed august 19th, 2018.
Chen, J., and Duvall, G., “On Operational-Level Cybersecurity Strategy Formation,” Journal of Information Warfare: 13.3: 79-87. SSN 1445-3312 print/ISSN 1445-3347 online, 2014, accessed August 24th, 2018.
Colonel Dr. Rudy Agus Gemilang Gultom,“Cyberspace as Global Domain”, Materials of Cyber Security For Information Leaders Course, The National Defense University (NDU),Washington,DC. USA, March 2015.
Colonel Dr. Rudy Agus Gemilang Gultom, “Cyber Intelligence Overview”, Materials of Cyber Security Policy & Practice Course, The Naval Postgraduate School (NPS), Monterey, California, USA, May 2015.
Dr. Conway, M., “What is cyberterrorism? The story so far”, Journal of Information Warfare, 2(2), pp. 33–42., 2003.
Internet sources, “Cyber Attacks: Technique, Tools, Motivation & Impact”, accessed August 18th, 2018.
Internet, “The Famous Cyber Attacks/ Cyber Warfare in the World”, accessed August 16th, 2018.
Irshaid, F., “How Isis is spreading its message online”, BBC news, available at: http://www.bbc.co.uk/news/world-middle-east-27912569”, Journal of Information Warfare, 2(2), 33–42., 2003, accessed August 2nd, 2018.
Sueddeutsche, “Panama Papers (the Secrets of Dirty Money)”, http://panamapapers.sueddeutsche.de/articles/56febff0a1bb8d3c3495adf4/, accessed July 29th, 2018.
Independent, “Vladimir Putin says Russians accused of hacking US election ‘do not represent' the country)”, https://www.independent.co.uk/news/world/americas/us-politics/vladimir-putin-internetresearch-agency-troll-farm-robert-mueller-indictment-13-russians-a8239386.html, accessed July 27th, 2018.
Independent, “British teenager who 'cyber-terrorised' US intelligence officials gets two years detention”, https://www.independent.co.uk/news/uk/british-teen-hacker-kane-gamble-us-intelligence- officials-jailed-cia-fbi-a8315126.html, accessed July 29th, 2018.
The US White House, Executive Order, “Improving Critical Infrastructure Cybersecurity”, 12 February 2013, https://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure -cybersecurity, accessed August 14th, 2018.
The NIST, Version 1.1, “Framework for Improving Critical Infrastructure Cybersecurity”, https://www.nist.gov/sites/default/files/ documents/2017/12/05 /draft-2_framework-v1-1_without-markup.pdf, accessed July 19th, 2018.
Wikipedia, The National Conference of State Legislatures, “Cyberterrorism”, https://en.wikipedia.org/wiki/Cyberterrorism, accessed July 19th, 2018.
Wikipedia, NATO, “Cyberterrorism”, https://en.wikipedia.org/wiki/ Cyberterrorism, accessed July 19th, 2018.
NIST (National Institute of Standard and Technology), http://www.nist.gov/, accessed August 22nd, 2018.
Plan To Establish National Cyber Agency (BSSN), http://nasional.kompas.com/read/2015/01/06/ 12550571/Presiden.Bahas. Pembentukan.Badan.Cyber.Nasional, accessed July 23rd, 2018.
President Obama’s International Strategy for Cyberspace, “Prosperity, Security, and Openness in a Networked World”, May 2011, https://www.whitehouse.gov/sites/default/files/ rss_viewer/international_ strategy_for_cyberspace.pdf, accessed July 22nd, 2018.
Prof. Kevin P. Newmeyer, “Who Should Lead U.S.Cybersecurity Efforts?”, PRISM Magazine vol. 3, no. 2, The National Defense University (NDU), Washington, DC., USA, March 2015.
Reasons for the Government to form BSSN, http://nasional. kompas.com/read/2015/01/06/15464401/Ini.Alasan.Pemerintah.Ingin.Bentuk.Badan.Cyber.Nasional, accessed August 19th, 2018.
Rudy Agus Gemilang Gultom, “Proposing the new Algorithm and Technique Development for Integrating Web Table Extraction and Building a Mashup,” Journal of Computer science, Science Publication, NY, USA, DOI: 10.3844/jcssp.2011.129.142, http://www.thescipub.com/ issue-jcs/7/2, 25 February 2011. Download PDF version, http://thescipub.com/PDF/jcssp.2011.129.142.pdf, accessed August 19th,2018.
The Government of Indonesia has accelerated the formation of the National Cyber Agency in the year2017), http://nasional.kompas.com/read/2017/01/03/18063511/pemerintah.percepat. pemben- tukan.badan.siber.nasional.pada.2017, accessed July 23rd, 2018.
The United Nations Convention on the Law of the Sea (UNCLOS) in 1982, accessed July 29th, 2018.
The US DoD, “Department of Defense Strategy for Operating in Cyberspace”, http://www.defense. gov/news/d20110714cyber.pdf, accessed August 2nd, 2018.
The Tallinn Manual, "Tallinn Manual on the International Law Applicable to Cyber Warfare", https://ccdcoe.org/tallinn-manual.html, accessed July 22nd, 2018.
Youtube, “YouTube videos of the ISIS’s one billion campaign”, https://www.youtube.com/results?search_query=YouTube+videos+of+the+ISIS%E2%80%99s+one+billion+campaign, accessed July 26th, 2018.
Copyright (c) 2018 INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their manuscripts, and all Open Access articles are distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided that the original work is properly cited.