Sunteți pe pagina 1din 34

Why We Need Cyber or

Information Security?
Sesi 1
DigiTalent Scholarship 2018
Dunia di masa depan…
Perlukah keamanan siber atau
keamanan informasi?
Disaat semua tersambung dengan sensor dan internet
Sebelum Melangkah Lebih Jauh
Cyber security comprises technologies, processes
and controls that are designed to protect
systems, networks and data from
cyber attacks.

Cyber Security by itgovernance.co.uk


The protection of available information or
information resources from unauthorized
access, attack, theft, or data damage.

Information Security by comptiaS+


Cyber Security vs Information Security
Things that are vulnerable
Information through ICT

Other things
Digital Information than
Information
information

Analog
Information

Information Security Cyber Security


Potongan

Digital Other things


Analog Information than
Information
information

Information Security ICT Security Cyber Security


Terminology – Digital Security
• Digital security has evolved to be all-encompassing, since it addresses
technology, data or information, physical and environmental security,
privacy and safety.
• Digital security  Mencakup keseluruhan karena mencakup teknologi, data
atau informasi, keamanan fisik dan lingkungan, privasi dan keselamatan.
• Data security means protection of digital data from corruption and
from any destructive forces.
• Keamanan data berarti perlindungan terhadap data digital dari korupsi dan
dari hal-hal yang bersifat merusak.
Terminology – Digital Security
• Information security is the practice of preventing unauthorized
access, use, disclosure, disruption, modification, inspection, recording
or destruction of information regardless of the form the data may
take (e.g., electronic, physical).
• Keamanan informasi merupakan usaha untuk mencegah akses, penggunaan,
pengungkapan, gangguan, modifikasi, inspeksi, pencatatan atau perusakan
atas suatu informasi oleh pihak yang tidak berwenang - baik dalam bentuk
data fisik maupun elektronik.
• Cybersecurity consists of technologies, processes and controls that
are designed to protect from the unauthorised exploitation of
systems, networks and technologies.
• Cybersecurity terdiri dari teknologi, proses dan kontrol yang dirancang untuk
melindungi sistem, jaringan, dan teknologi dari eksploitasi yang tidak sah.
Terminology – Digital Security
• Information technology security includes hosts, networks, and
application security: physical and logical protection.
• Keamanan teknologi informasi mencakup host, jaringan, dan keamanan
aplikasi: baik perlindungan fisik maupun logis.
• Computer security means protection of computer systems from the
theft and damage to their hardware, software or information, as well
as from disruption or misdirection of the services they provide. It
includes mobile, server, desktop and cloud systems.
• Keamanan komputer berarti perlindungan sistem komputer dari pencurian
dan kerusakan pada perangkat keras, perangkat lunak atau informasi, serta
dari gangguan atau Kesalahan layanan. Hal ini meliputi sistem seluler, server,
desktop, dan cloud.
Terminology – Digital Security
• Network security consists of the policies and practices adopted to prevent
and monitor unauthorized network access, misuse, modification, or denial of
any network resources.
• Keamanan jaringan terdiri dari kebijakan dan praktik yang diadopsi untuk mencegah
dan memantau akses jaringan yang tidak sah, penyalahgunaan, modifikasi, atau
penolakan sumber daya jaringan.
• Operational security or procedural security (administration, management and
use) means protecting security objects from the illegal actions of
unauthorized users and from the unwanted actions of the authorized users.
• Keamanan operasional atau keamanan prosedural (administrasi, manajemen, dan
penggunaan) berarti melindungi objek keamanan dari tindakan ilegal pengguna yang
tidak sah dan dari tindakan yang tidak diinginkan dari pengguna yang berwenang/sah.
Terminology – Digital Security
• Physical security is the protection of the IT infrastructure from
physical actions and events that could cause serious loss. It includes
protection from flood, fire, natural disasters, theft, burglary,
vandalism and terrorism.
• Keamanan fisik adalah perlindungan infrastruktur TI dari tindakan fisik dan
peristiwa yang dapat menyebabkan kerugian serius. Ini termasuk
perlindungan dari banjir, kebakaran, bencana alam, pencurian, perampokan,
vandalisme dan terorisme.
• IoT security is the protection of the connected environment (smart
cities, smart buildings, connected cars, …) and it consists of the
security practices, policies and techniques deployed to protect the
interactions between things, people and between people and things.
• Keamanan IoT adalah perlindungan lingkungan yang saling terkoneksi yang
terdiri atas praktik keamanan, kebijakan, dan teknik yang diterapkan untuk
melindungi interaksi antara benda dengan benda, orang dengan orang, dan
antara orang dengan benda
Mana yang lebih penting?
Tentu semuanya penting….
Mari kita lihat contohnya….
Biggest
Information
Security
Breach….
Lalu contoh cyber security
breach?
ZeuS

• Sebuah serangan ke
beberapa bank yang ada di
Indonesia
• Viral di tahun 2015 an
Wannacry
*Encrypting data and demanding
ransom payments*

• Viral di tahun 2018


• Tidak hanya menyerang computer,
namun juga menyerang peralatan
kesehatan
• Wannacry  Ransomware
• Ransomware  Salah satu jenis
malicious Software (Malware)
“Software Jahat”
• Jenis malware yang lain : virus,
worm, trojan, adware, spyware, dll
Tokopedia
Kenapa yang terakhir termasuk
cyber security breach?
Karena keamanan siber tidak
akan terlepas dari prinsip
“People, Process, dan
Technology”
Proses
 Sistem manajemen
 Framework tatakelola
 Kebijakan dan prosedur
 Vendor / pihak ketiga
 Audit

People
 Pelatihan dan Kesadaran Technologies
 Kemampuan dan  Desain sistem
kualifikasi profesional  Penguatan dalam koneksi
 Emergency drill  Pengaturan perangkat lunak
 Otorisasi dan otentikasi  Protocol enkripsi
 Keamanan fisik  Jamming dan spoofing
 Deteksi dan monitoring
Dari prinsip ini kami meramu 36
sesi di Digitalent
Topik Bahasan
Introduction to Cybersecurity
1.Introduction to CyberSecurity
Fundamentals of Networking Protocols and Devices (sesi 2-5)
2. TCP/IP Protocols : IP address (Ipv4 and IPv6), TCP, UDP, ARP, ICMP, DNS, DHCP
3. Switch, VLAN and STP
4. Router and Firewall
5. NAT and ACL
Security Concepts and Principles (sesi 6-7)
Topik dan
Bahasan 6. Cyber Security Architecture dan pengertian/definisi cyber security
7. Basic Security Control
Network security threats (sesi 8-10)
8. Identify Threats
9. Identify common attacks
10. Hands on Labs
Security Assesment (sesi 11-13)
11. Identify vulnerability
12. Assesment vulnerability
13. Penetration test
Analyzing Risks (sesi 14-15)
14. Paparan metode Analisa resiko
15. Paparan kasus dan contoh analisis
Implementing host and software Security (sesi 16-18)
16. Implement security for mobile and non mobile devices
17. Implement security for software/OS security
18. Hands on labs
Topik dan Implementing Network Security (sesi 19-22)
Bahasan 19. Explanation of network security technology and elements
lanjut 20. Hands on Labs
21. Wireless LAN Security
22. Hands on Labs
Implementing Cryptography and Virtual Private Network (VPN) (sesi 23-26)
23. Cryptography
24. Hands on Labs
25. VPN
26. Hands on Labs
Implementing Operational Security (sesi 27-30)
27. Security Framework and guideline
28. Implement Security Strategies
29. Data Security Process, database security and data privacy
30. Implement Physical Security
Managing Identity and Access (sesi 31-32)
Topik dan 31. Identity and Access Management Process and manage account securely
Bahasan 32. Hands on Labs
lanjut Incident Response & Incident Handling (sesi 33-35)
33. Addressing Common Security Issues
34. Respond to Security Incident
35. Investigate Security Incident
Business Continuity (sesi 36)
36. Business continuity and disaster recovery Process
Selamat datang di Kampus
Universitas Indonesia dan
Selamat Berkarya….
So…..
Why We Need Cyber or
Information Security??
nha.nurhayati@gmail.com

S-ar putea să vă placă și