Claim Missing Document
Check
Articles

Found 2 Documents
Search

9. STRATEGIES, CHALLENGES, AND IMPLEMENTATION OF GENDER EQUALITY IN THE POLICE Erika Merdiana Armono; Syamsunasir; Kerta Widana; Waspada Tedja Bhirawa; Suroso; Dwikatama
Jurnal TNI Angkatan Udara Vol 5 No 1 (2026): Jurnal TNI Angkatan Udara Triwulan Pertama
Publisher : Staf Komunikasi dan Elektronika, TNI Angkatan Udara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62828/jpb.v5i1.194

Abstract

This study aims to analyze the implementation of gender mainstreaming policieswithin the Indonesian National Police (Polri) and identify challenges and gaps in theirimplementation. This study uses a qualitative approach with descriptive analysis methods toevaluate how the Indonesian National Police (Polri) has integrated gender equality principlesinto its operations and human resource policies, including policy documents, internal reports,and interviews with Polri personnel. The results indicate that although the Polri hasdemonstrated its commitment to gender mainstreaming through the issuance of Police ChiefRegulation Number 1 of 2022, its implementation remains suboptimal. Significant disparitiesexist between male and female police officers in recruitment, promotion, and job placement.Female police officers (Polwan) often face certain limitations not experienced by male policeofficers (Polki), such as specific recruitment criteria and a lack of opportunities for openpromotions. Consequently, the majority of female police officers remain confined toadministrative and health roles, with few reaching senior leadership positions.
2. CYBER VULNERABILITY MITIGATION IN WI-FI NETWORKS: INTEGRATION OF PENETRATION TESTING, SOCIAL ENGINEERING, AND SECURITY AWARENESS IN XYZ EDUCATIONAL INSTITUTION Firmansyah; Muhammad Fahrurozi; Rezha Fauzi Ramadhan; Kurniawan; Suroso; Dwikatama
Jurnal TNI Angkatan Udara Vol 5 No 1 (2026): Jurnal TNI Angkatan Udara Triwulan Pertama
Publisher : Staf Komunikasi dan Elektronika, TNI Angkatan Udara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62828/jpb.v5i1.196

Abstract

This study aims to empirically and comprehensively assess security vulnerabilitiesin military Wi-Fi networks at the XYZ defense educational institution, encompassing technicalaspects (penetration testing with Aircrack-ng, WPA2 encryption analysis) and human factors(social engineering, personnel security awareness). A convergent mixed-methods approachwas used to integrate quantitative and qualitative data. Penetration testing conducted at fourstrategic locations revealed that 75 percent of the network could be breached in less than 130minutes due to weak passwords with low entropy (less than 60 bits) and default configurations.Meanwhile, a survey of 50 personnel showed that 80 percent were unable to accurately identifyphishing attacks before training, and 65 percent were vulnerable to pretexting scenarios.Vulnerability analysis using the CIA Triad framework revealed violations of Confidentiality (40percent of traffic could be intercepted within 30m), Integrity (20 percent of the network wasvulnerable to Man-in-the-Middle), and Availability (DoS through deauthentication closed 80percent of active sessions). hese findings indicate that the human factor is the biggestvulnerability (95 percent of global cyber breaches originate from human error or manipulation).Therefore, mitigation recommendations are integrative and multi-layered, encompassingtechnical interventions (migration to WPA3 with SAE, implementation of RADIUS and SnortIDS), behavioral interventions (regular awareness training and monthly phishing simulations),and organizational interventions (establishment of a 24/7 CSOC). This integrated frameworkis estimated to reduce attack success by 70 percent, which is crucial for creating military cyberresilience in accordance with the spirit of Sishankamrata and Permenhan No. 82/2014concerning Cyber Defense.