RL-Internet protection and safety
Transcript of RL-Internet protection and safety
![Page 1: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/1.jpg)
INTERNET PROTECTION & SAFETY
Rudi LumantoID-SIRTII/CC
APJII Open Policy Meeting 30/5/2016 - Swiss Belhotel , Batam
1
![Page 2: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/2.jpg)
CONTENTS
• About ID-SIRTII/CC
• Understanding Threat Landscape
• Protecting National Network
2 Rudi Lumanto - APJII-OPM May 2016
![Page 3: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/3.jpg)
ABOUT ID-SIRTII/CC
www.idsirtii.or.id3 Rudi Lumanto - APJII-OPM May 2016
![Page 4: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/4.jpg)
ABOUT ID-SIRTII/CC
4 Rudi Lumanto - APJII-OPM May 2016
![Page 5: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/5.jpg)
ID-SIRTII/CC PROFILE
RnD
Chair
DataCenterand
Applica1on
Monitoringand
Opera1on
ExternalCollabora1on
Educa1onand
Socializa1on
5 Rudi Lumanto - APJII-OPM May 2016
![Page 6: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/6.jpg)
CYBER SIX OF INTERNET
A"ack
Vulnerability
Threat
Cyberspace
Cyberthreat
Cybera.ackCyberSecurity
CyberCrime
CyberLaw
Cyberespionage
CyberDefence
CyberWar
SosmedOpini
SosmedSecurity
SosmedWar
Cyber Six Principle
6 Rudi Lumanto - APJII-OPM May 2016
![Page 7: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/7.jpg)
Threat❖ Anything that can disrupt the operation, functioning, integrity or
availability of information system
❖ Stand alone threats
❖ Threat arise without any connection to other system, ex: virus, password cracker
❖ Human threat
❖ Connection/Network threats
❖ Threat arise because of connection to other system
7 Rudi Lumanto - APJII-OPM May 2016
![Page 8: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/8.jpg)
Malware threats
40 thousands to 140 thousands of infected machines in just two month (7-9/2013)
Top Countries infected worldwide (2015-1-6)
8 Rudi Lumanto - APJII-OPM May 2016
![Page 9: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/9.jpg)
Threat EvolutionAttack Sophistication vs Intruder Technical Knowledge
9 Rudi Lumanto - APJII-OPM May 2016
![Page 10: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/10.jpg)
Seven year old
11minutestohackwifi
10 Rudi Lumanto - APJII-OPM May 2016
![Page 11: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/11.jpg)
University student❖ Harvard University student who
emailed a bomb threat around campus
❖ he was using anonymous web browser Tor to hide his identity
❖ he also reportedly used a service called Guerrilla Mail that creates temporary and anonymous email addresses for free.
11 Rudi Lumanto - APJII-OPM May 2016
![Page 12: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/12.jpg)
Threat location
12 Rudi Lumanto - APJII-OPM May 2016
![Page 13: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/13.jpg)
from threat to attack
13 Rudi Lumanto - APJII-OPM May 2016
![Page 14: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/14.jpg)
From threat to attack
HANYA MASALAH WAKTU
ANCAMAN SERANGANLubang Penghubung
Vulnerabilities14 Rudi Lumanto - APJII-OPM May 2016
![Page 15: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/15.jpg)
Vulnerability❖ Weakness in the design, configuration or implementation and
management of a computer system that renders it susceptible to a threat
❖ ISO 27005 definition
❖ A weakness of an asset or group of assets that can be exploited by one or more threats
❖ IETF RFC 2828 definition
❖ A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy
15 Rudi Lumanto - APJII-OPM May 2016
![Page 16: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/16.jpg)
Vulnerability❖ What is the current threat environment?
❖ Organizations are realizing that traditional vulnerability-based risk management strategies are failing due to the massive number of zero-day vulnerabilities in an ever evolving and expanding technology industry.
❖ CVE and OSVDB presented their vulnerability statistics
❖ percentage (5%) of vulnerabilities in any piece of software. They only know about a very small .This means that we are running systems with 95% zero-day vulnerabilities.
16 Rudi Lumanto - APJII-OPM May 2016
![Page 17: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/17.jpg)
Total protection ?
Theonlytrulysecuresystemisonethatispoweredoff,castinablockofconcreteandsealedinalead-linedroomwitharmedguards-andeventhenIhavemydoubts(EugeneH.Spafford)
17 Rudi Lumanto - APJII-OPM May 2016
![Page 18: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/18.jpg)
Indonesia 2015
18 Rudi Lumanto - APJII-OPM May 2016
![Page 19: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/19.jpg)
INTERNET PROTECTIONany countermeasure taken to protect asset from threats and attacks
Assets is anything that have a value in the organization. Ex: data and information, user or people, infrastructure or media (hardware/software)
19Rudi Lumanto - APJII-OPM May 2016
![Page 20: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/20.jpg)
OBJECT OF PROTECTION
20Rudi Lumanto - APJII-OPM May 2016
![Page 21: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/21.jpg)
COUNTERMEASURE
Meningkatkan kesadaran akan ancaman (security mindset)
Memperbaiki perlindungan terhadap aset nasional
Membangun daya resiliensi dan Strateginya
21 Rudi Lumanto - APJII-OPM May 2016
![Page 22: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/22.jpg)
Comprehensive Security Management Process : Plan-Protect-Respond
Risk Management Disaster Recovery
22 Rudi Lumanto - APJII-OPM May 2016
![Page 23: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/23.jpg)
SCOPE OF PROTECTION
Cyber Security
Global Scope Economic value
Cyber Crime
Cyber Defense
Strategic Scope State Sovereignty value
Cyber War
Kemenko polhukam Kemenhan
Kemenkominfo Kepolisian
Both have same function, like brakes in the car cyber space will slow down or go fast.
But different object of protection
23 Rudi Lumanto - APJII-OPM May 2016
![Page 24: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/24.jpg)
PROTECTING ZONE
CapacityBuilding
Policy&LegalFramework
Organiza;onalstructure
Technical&opera;onalmeasures
Interna;onalcoopera;on Building
Safe&SecureCyber
Environment
State sovereignty zone
Economic zone
24Rudi Lumanto - APJII-OPM May 2016
![Page 25: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/25.jpg)
PROTECTING LEVEL
Law/Regula*on
StrategicLevelorganiza*on
Tac*callevelorganiza*on
Opera*onallevelorganiza*on
DomainClassifica*on(Cri*calInfrastructure)
INTE
RN
ATIO
NA
L C
OO
PE
RAT
ION
CA
PAC
ITY
BU
ILD
ING
ME
AS
UR
E A
ND
CO
NTR
OL
Melakukan monitoring, analisa, report : NATIONAL CERT, SECTORAL CERTs, SOC, National Cyber Capacity Building Committee, Security Awareness Promotion Committee etc
Menyusun dan menjalankan strategi, program dan rencana aksi : National Cyber Defense Coordination Team, Cyber Intelligent
Merumuskan kebijakan dan strategi, prioritas dan kordinasi nasional: National Cyber Defense Council, Cyber Security Office etc
25 Rudi Lumanto - APJII-OPM May 2016
![Page 26: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/26.jpg)
Capacity Building through Empowering people
§ APCERTDrillTest§ OICCERTDrillTest§ ACIDDrillTrace
Interna'onalDrillTest:
§ CyberJawara§ CyberSeaGames
Compe''on:
Na'onalDrillTest:§ Id-SIRTII/CCDrillTest§ AmazingTrace
26 Rudi Lumanto - APJII-OPM May 2016
![Page 27: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/27.jpg)
Capacity Building through Empowering people
HostCyberSEAGames2015
ItisASEANcyber-securityteamcompe66on.ItpitsteamsfromalloverASEANMemberStates(AMS)tocompeteinaseriesCapturetheFlagcompe66ons.
27 Rudi Lumanto - APJII-OPM May 2016
![Page 28: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/28.jpg)
Capacity Building through Empowering people
§ SecurityAssessment§ DataProtec2on§ Monitoring&Incident
Handling§ NetworkForensic§ DataProtec2on§ PerimeterSecurity§ WirelessSecurity§ WorkshopDataCenter
SecuritywithOSSoCware
PublicTrainingTopics:
TrainingPar1cipant:
§ DigitalForensic§ DNSSecurity§ AndroidMalwareAnalyzing§ SecureProgramming§ Server&WebSecurity§ NetworkRou2ngMul2plaHorm
OSPF*
28 Rudi Lumanto - APJII-OPM May 2016
![Page 29: RL-Internet protection and safety](https://reader033.fdocuments.in/reader033/viewer/2022052706/586a10731a28ab88158b53c8/html5/thumbnails/29.jpg)
29Rudi Lumanto - APJII-OPM May 2016