Documente Academic
Documente Profesional
Documente Cultură
The Strategic Roles of Indonesia ICT Indonesia ICT Numbers and Facts Three Dimensions of Cyber Threat Cases of Cyber Warfare/Attack Is Indonesia Under Attack??? Obstacles and Challenges of Indonesia National Cyber Security Six Priorities Strategy of Indonesia National Cyber Security Conclusion
2
1st
986 Juta
2nd
893 Juta
With 249 million subscribers in 2011, Indonesia is the 4th largest mobile market in the world.
3rd
290 Juta
4th
249 Juta
5th
244 Juta
6th
236 Juta
China
India
USA
Indo
Brazil
Rusia
China
India
USA
Indonesia
Brazil
Russia
1st
538 Juta
In 2011, the number of internet users in Indonesia is around 55 million. Internet users in Indonesia also are highly social and active. Indonesia is the 3rd largest facebook users and the 5th largest twitter users in the world.
2nd
245 Juta
3rd
137 Juta
4th
101 Juta
5th
88 Juta
6th
67 Juta
7th
67 Juta
8th
55 Juta
9th
52 Juta
10th
52 Juta
China
USA
India
Japan
Brazil
Rusia
Germany
Indonesia
UK
France
China
USA
India
Japan
Brazil
Russia
Germany
Indonesia
UK
France
Wikileaks
And many more...
7
Sources: ID-SIRTII
Partnership
Legal
Direct
10
10
10
11
IP-based network security Ministerial Regulation No. 16/PER/M.KOMINFO/10/2010 CA Supervisory Board ad hoc team Ministerial Decree No. 197/KEP/M.KOMINFO/05/2010 Information security coordination team Ministerial Decree No. 33/KEP/M.KOMINFO/04/2010 Web server security Ministry Letter
Wifi Security Ministry Letter Guidelines for the use of ISO 27001 Ministry Letter
14
17
Cyber Security Operations Centre (CSOC) Function: actively monitor the health of cyber space and co-ordinate incident response; to enable better understanding of attacks against UK networks and users; to provide better advice and information about the risks to business and the public. GovCertUK
Undefined
18
19
KEMENKOPOLHUKAM
Homeland Security
Protect cyberspace environment
Intelligence
Preventive and capacity building
Defense
Protect militer cyberspace environment
Law Enforcement
Investigation and Prosecution of criminal in cyberspace
KEMKOMINFO
BIN
LEMSANEG KEMDIKBUD
KEMHAN
TNI
POLRI
KEJAKSAAN
Gov-Cert
ID-ACAD-CSIRT
ID CERT
...... 20
Noob/Script Kiddy
may result in the loss of some tangible assets or resources may noticeably affect an organizations mission, reputation, or interest.
23
LAYERS OF CYBER
Data Application
Host
Internal Network External Network
Implementation of cyber security technologies and processes performed at each layers. Cyber security at every layer is called defense in depth. Defense in Depth strategy is to achieve the main objectives of security, namely Availability, Integrity, Confidentiality (AIC Triad).
Proxy
Logging Stateful Packet Inspection Auditing Penetration Testing Vulnerability Analysis
IDS IPS Logging Auditing Penetration Testing Vulnerability Analysis Authentication Antivirus IDS IPS Password Hashing Logging Auditing Penetration Testing Vulnerability Analysis SSO Content Filtering Data Validation Auditing Penetration Testing Vulnerability Analysis Encryption Access Controls Backup Penetration Testing
Vulnerability Analysis
External Network
Network Perimeter
Internal Network
Host
Application
Data
28
Awareness
31
35
CONCLUSIONS
Securing Indonesia Cyberspace is essential to create conducive and sustainability environment. Indonesia Cyberspace has to be secured and sovereigned. Indonesia needs a national cyber security strategy in order to focus on the development cyber security program. National Cyber Security is a very complex problem, collaboration and cooperation with all stakeholders are needed. Organization of Indonesia National Cyber Security (I-NCS) need to be established.
36
Thank You
www.detiknas.org info@detiknas.org 2013
37