SlideShare a Scribd company logo
1 of 14
Download to read offline
Security in COVID-19 Era
Budi Rahardjo (@rahard)
Presented at 2nd International Confernce on Information and Computer Technology (ICISCT)
2021
2021 BR - ICITCT 2021 1
VLSI/Security/IoT/AI/Big Data
2021 BR - ICITCT 2021 2
• Lecturer at ITB
• Manage .ID domain 1997-2005
• Founder & chairman of ID-CERT
Indonesia Computer Emergency Response Team
• Serial technopreneur –
startup mentors
2021 BR - ICITCT 2021 3
COVID-19 &
Digital
Transformation
2021 BR - ICITCT 2021 4
Security Cases
Issues & Lessons Learned
2021 BR - ICITCT 2021 5
eLearning: from LMS to School Management System
• Learning Management Systems must be in
place
• but, mostly just converting from paper to electronic
format (power point)
• Redesigning in the process: microlearning?
• Online classroom
• Mostly: Zoom, Meet, Teams, Webex, ...
• Don’t know what the students do: ... connecting ...
• Online / AI-based Face Recognition attendance list
• Online exams?
• AI-based cheat detection
• Security? Not considered, yet
2021 BR - ICITCT 2021 6
2021 BR - ICITCT 2021 7
eVoting
• Ikatan Alumni ITB (IA-ITB) has
sucessfuly implemented eVoting
• Lessons learned
• 20000 participated
• internet voting with web-based
applications
• manual face and liveness verification of
voters due to complex requirements and
situation
• non-technical issues are most important
• database destroyed after election for
privacy issues
• Future
• Blockchain based?
• Anonymity vs. Verifiability
2021 BR - ICITCT 2021 8
Privacy and
Healthcare
• Healthcare
• Contact tracing application:
PeduliLindungi.id
• Patients data (X-ray, MRI, ...) needed for
AI for Covid-19 initiatives
• Concerns & Issues
• Privacy? Everybody is collecting
personal data. Many applications
• Rancangan Undang-Undang
Perlindungan Data Pribadi
• Data breached in Indonesia: Tokopedia,
BPJS, ...
2021 BR - ICITCT 2021 9
Tokopedia, etc.
• Started with 9 millions data
• Then 91 millions data
2021 BR - ICITCT 2021 10
CSIRT
• The rising ß(CSIRT)
• Critical information
infrastructure sectors
• Financial
• Government
• Health? Not yet
2021 BR - ICITCT 2021 11
Related topcis
• Fake health/covid-19 test results
• Fake oximeter applications: take fingerprint unsuspected users.
Mostly happened in India, but other countries will follow
• Due to limited supply of oxygene
• Software security?
2021 BR - ICITCT 2021 12
Secure Software Development Life Cycle
2021 BR - ICITCT 2021 13
Concluding Remarks
• We are forced to embrace
new technologies and
move to cyberspace
quickly. Security issues will
follow
• Most research needed are
applied research
• Stay safe, stay healthy ...
stay secure
2021 BR - ICITCT 2021 14

More Related Content

What's hot

2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)ijwscjournal
 
International Journal of Computer Science, Engineering and Information Techn...
International Journal of Computer Science, Engineering and  Information Techn...International Journal of Computer Science, Engineering and  Information Techn...
International Journal of Computer Science, Engineering and Information Techn...ijcseit
 
8 th International Conference on Cybernetics & Informatics (CYBI 2021)
8 th International Conference on Cybernetics & Informatics (CYBI 2021)8 th International Conference on Cybernetics & Informatics (CYBI 2021)
8 th International Conference on Cybernetics & Informatics (CYBI 2021)ijcsity
 
2 nd International Conference on Computing and Information Technology (COIT ...
2 nd International Conference on Computing and Information Technology  (COIT ...2 nd International Conference on Computing and Information Technology  (COIT ...
2 nd International Conference on Computing and Information Technology (COIT ...ijcseit
 
International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)
International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)
International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)ijujournal
 
3 rd International Conference on Big Data &IoT (BDIoT 2022)
3 rd International Conference on Big Data &IoT (BDIoT 2022)3 rd International Conference on Big Data &IoT (BDIoT 2022)
3 rd International Conference on Big Data &IoT (BDIoT 2022)ijgca
 
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)ijwscjournal
 
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)ijwscjournal
 
2 nd International Conference on Computing and Information Technology (COIT ...
2 nd International Conference on Computing and Information Technology  (COIT ...2 nd International Conference on Computing and Information Technology  (COIT ...
2 nd International Conference on Computing and Information Technology (COIT ...ijcsity
 
8th International Conference on Cybernetics & Informatics (CYBI 2021)
8th International Conference on Cybernetics & Informatics (CYBI 2021)8th International Conference on Cybernetics & Informatics (CYBI 2021)
8th International Conference on Cybernetics & Informatics (CYBI 2021)acijjournal
 
IoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityIoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityDeniseFerniza
 
8 th International Conference on Cybernetics & Informatics (CYBI 2021)
8 th International Conference on Cybernetics & Informatics (CYBI 2021)8 th International Conference on Cybernetics & Informatics (CYBI 2021)
8 th International Conference on Cybernetics & Informatics (CYBI 2021)ijcsity
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
 
IS and IT Auditor Roles in Today's New Economy
IS and IT Auditor Roles in Today's New EconomyIS and IT Auditor Roles in Today's New Economy
IS and IT Auditor Roles in Today's New EconomyGoutama Bachtiar
 
Call for Papers - 11th International Conference on Artificial Intelligence, S...
Call for Papers - 11th International Conference on Artificial Intelligence, S...Call for Papers - 11th International Conference on Artificial Intelligence, S...
Call for Papers - 11th International Conference on Artificial Intelligence, S...ijsc
 
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)ijp2p
 

What's hot (18)

2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
 
International Journal of Computer Science, Engineering and Information Techn...
International Journal of Computer Science, Engineering and  Information Techn...International Journal of Computer Science, Engineering and  Information Techn...
International Journal of Computer Science, Engineering and Information Techn...
 
8 th International Conference on Cybernetics & Informatics (CYBI 2021)
8 th International Conference on Cybernetics & Informatics (CYBI 2021)8 th International Conference on Cybernetics & Informatics (CYBI 2021)
8 th International Conference on Cybernetics & Informatics (CYBI 2021)
 
2 nd International Conference on Computing and Information Technology (COIT ...
2 nd International Conference on Computing and Information Technology  (COIT ...2 nd International Conference on Computing and Information Technology  (COIT ...
2 nd International Conference on Computing and Information Technology (COIT ...
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)
International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)
International Conference on Machine Learning, IOT and Blockchain (MLIOB 2020)
 
3 rd International Conference on Big Data &IoT (BDIoT 2022)
3 rd International Conference on Big Data &IoT (BDIoT 2022)3 rd International Conference on Big Data &IoT (BDIoT 2022)
3 rd International Conference on Big Data &IoT (BDIoT 2022)
 
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
 
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
 
2 nd International Conference on Computing and Information Technology (COIT ...
2 nd International Conference on Computing and Information Technology  (COIT ...2 nd International Conference on Computing and Information Technology  (COIT ...
2 nd International Conference on Computing and Information Technology (COIT ...
 
8th International Conference on Cybernetics & Informatics (CYBI 2021)
8th International Conference on Cybernetics & Informatics (CYBI 2021)8th International Conference on Cybernetics & Informatics (CYBI 2021)
8th International Conference on Cybernetics & Informatics (CYBI 2021)
 
IoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityIoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and security
 
8 th International Conference on Cybernetics & Informatics (CYBI 2021)
8 th International Conference on Cybernetics & Informatics (CYBI 2021)8 th International Conference on Cybernetics & Informatics (CYBI 2021)
8 th International Conference on Cybernetics & Informatics (CYBI 2021)
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
IS and IT Auditor Roles in Today's New Economy
IS and IT Auditor Roles in Today's New EconomyIS and IT Auditor Roles in Today's New Economy
IS and IT Auditor Roles in Today's New Economy
 
Call for Papers - 11th International Conference on Artificial Intelligence, S...
Call for Papers - 11th International Conference on Artificial Intelligence, S...Call for Papers - 11th International Conference on Artificial Intelligence, S...
Call for Papers - 11th International Conference on Artificial Intelligence, S...
 
Assignment topics
Assignment topicsAssignment topics
Assignment topics
 
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
 

Similar to Security in COVID-19 Era

2nd International Conference on Computing and Information Technology (CITE 2024)
2nd International Conference on Computing and Information Technology (CITE 2024)2nd International Conference on Computing and Information Technology (CITE 2024)
2nd International Conference on Computing and Information Technology (CITE 2024)jmicro
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019Ahmed Banafa
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaDinis Guarda
 
Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptxishwar69
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIPerry Lea
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019Ahmed Banafa
 
CBSE_Std_IX_Into_to_IT-ITeS.pptx
CBSE_Std_IX_Into_to_IT-ITeS.pptxCBSE_Std_IX_Into_to_IT-ITeS.pptx
CBSE_Std_IX_Into_to_IT-ITeS.pptxmrunalshethiya
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
 
GK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).pptGK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).pptPiyushRanjan269184
 
2020 sd college- internet of everyhing
2020 sd college- internet of everyhing2020 sd college- internet of everyhing
2020 sd college- internet of everyhingSurkhab Shelly
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityPro Mrkt
 
Integrating the IIoT with the digital twins for the drugs industry
Integrating the IIoT with the digital twins for the drugs industryIntegrating the IIoT with the digital twins for the drugs industry
Integrating the IIoT with the digital twins for the drugs industryAboul Ella Hassanien
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
 
2nd International Conference on Computing and Information Technology (CITE 2024)
2nd International Conference on Computing and Information Technology (CITE 2024)2nd International Conference on Computing and Information Technology (CITE 2024)
2nd International Conference on Computing and Information Technology (CITE 2024)ijpla
 
Industrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptIndustrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptMuhammadHashamKhanBI
 

Similar to Security in COVID-19 Era (20)

2nd International Conference on Computing and Information Technology (CITE 2024)
2nd International Conference on Computing and Information Technology (CITE 2024)2nd International Conference on Computing and Information Technology (CITE 2024)
2nd International Conference on Computing and Information Technology (CITE 2024)
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis Guarda
 
Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptx
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROI
 
IOT PPT.pptx
IOT PPT.pptxIOT PPT.pptx
IOT PPT.pptx
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
CBSE_Std_IX_Into_to_IT-ITeS.pptx
CBSE_Std_IX_Into_to_IT-ITeS.pptxCBSE_Std_IX_Into_to_IT-ITeS.pptx
CBSE_Std_IX_Into_to_IT-ITeS.pptx
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
GK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).pptGK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).ppt
 
2020 sd college- internet of everyhing
2020 sd college- internet of everyhing2020 sd college- internet of everyhing
2020 sd college- internet of everyhing
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
 
Iot
IotIot
Iot
 
Integrating the IIoT with the digital twins for the drugs industry
Integrating the IIoT with the digital twins for the drugs industryIntegrating the IIoT with the digital twins for the drugs industry
Integrating the IIoT with the digital twins for the drugs industry
 
IoT PPT
IoT PPTIoT PPT
IoT PPT
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
 
2nd International Conference on Computing and Information Technology (CITE 2024)
2nd International Conference on Computing and Information Technology (CITE 2024)2nd International Conference on Computing and Information Technology (CITE 2024)
2nd International Conference on Computing and Information Technology (CITE 2024)
 
Industrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptIndustrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.ppt
 

More from budi rahardjo

How to train Electronics Rockstars
How to train Electronics RockstarsHow to train Electronics Rockstars
How to train Electronics Rockstarsbudi rahardjo
 
Product development 2021
Product development 2021Product development 2021
Product development 2021budi rahardjo
 
Peluang IoT di Indonesia
Peluang IoT di IndonesiaPeluang IoT di Indonesia
Peluang IoT di Indonesiabudi rahardjo
 
IoT: Dari Hobby ke Profesi
IoT: Dari Hobby ke ProfesiIoT: Dari Hobby ke Profesi
IoT: Dari Hobby ke Profesibudi rahardjo
 
The Joy of Programming (short version)
The Joy of Programming (short version)The Joy of Programming (short version)
The Joy of Programming (short version)budi rahardjo
 
Technology-based Startup
Technology-based StartupTechnology-based Startup
Technology-based Startupbudi rahardjo
 
A very short Introduction to Software Security
A very short Introduction to Software SecurityA very short Introduction to Software Security
A very short Introduction to Software Securitybudi rahardjo
 
Topik Penelitian Keamanan Informasi
Topik Penelitian Keamanan InformasiTopik Penelitian Keamanan Informasi
Topik Penelitian Keamanan Informasibudi rahardjo
 
Keaslian Dokumen Digital
Keaslian Dokumen DigitalKeaslian Dokumen Digital
Keaslian Dokumen Digitalbudi rahardjo
 
Strategi Industri Telematika Indonesia
Strategi Industri Telematika IndonesiaStrategi Industri Telematika Indonesia
Strategi Industri Telematika Indonesiabudi rahardjo
 
Klik and Modar: social engineering dengan menggunakan URL Bait
Klik and Modar: social engineering dengan menggunakan URL BaitKlik and Modar: social engineering dengan menggunakan URL Bait
Klik and Modar: social engineering dengan menggunakan URL Baitbudi rahardjo
 
To teach is ... (On Teaching)
To teach is ... (On Teaching)To teach is ... (On Teaching)
To teach is ... (On Teaching)budi rahardjo
 
How to Train Electronics Rockstars
How to Train Electronics RockstarsHow to Train Electronics Rockstars
How to Train Electronics Rockstarsbudi rahardjo
 
Kronologis penganiayaan timmy
Kronologis penganiayaan timmyKronologis penganiayaan timmy
Kronologis penganiayaan timmybudi rahardjo
 
Bdg software uploaded
Bdg software uploadedBdg software uploaded
Bdg software uploadedbudi rahardjo
 
Kesiapan Lulusan Perguruan Tinggi
Kesiapan Lulusan Perguruan TinggiKesiapan Lulusan Perguruan Tinggi
Kesiapan Lulusan Perguruan Tinggibudi rahardjo
 
Pengantar Nama Domain
Pengantar Nama DomainPengantar Nama Domain
Pengantar Nama Domainbudi rahardjo
 

More from budi rahardjo (20)

How to train Electronics Rockstars
How to train Electronics RockstarsHow to train Electronics Rockstars
How to train Electronics Rockstars
 
Product development 2021
Product development 2021Product development 2021
Product development 2021
 
Peluang IoT di Indonesia
Peluang IoT di IndonesiaPeluang IoT di Indonesia
Peluang IoT di Indonesia
 
IoT: Dari Hobby ke Profesi
IoT: Dari Hobby ke ProfesiIoT: Dari Hobby ke Profesi
IoT: Dari Hobby ke Profesi
 
The Joy of Programming (short version)
The Joy of Programming (short version)The Joy of Programming (short version)
The Joy of Programming (short version)
 
Technology-based Startup
Technology-based StartupTechnology-based Startup
Technology-based Startup
 
A very short Introduction to Software Security
A very short Introduction to Software SecurityA very short Introduction to Software Security
A very short Introduction to Software Security
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Dealing with Hoax
Dealing with HoaxDealing with Hoax
Dealing with Hoax
 
Topik Penelitian Keamanan Informasi
Topik Penelitian Keamanan InformasiTopik Penelitian Keamanan Informasi
Topik Penelitian Keamanan Informasi
 
Network Sniffing
Network SniffingNetwork Sniffing
Network Sniffing
 
Keaslian Dokumen Digital
Keaslian Dokumen DigitalKeaslian Dokumen Digital
Keaslian Dokumen Digital
 
Strategi Industri Telematika Indonesia
Strategi Industri Telematika IndonesiaStrategi Industri Telematika Indonesia
Strategi Industri Telematika Indonesia
 
Klik and Modar: social engineering dengan menggunakan URL Bait
Klik and Modar: social engineering dengan menggunakan URL BaitKlik and Modar: social engineering dengan menggunakan URL Bait
Klik and Modar: social engineering dengan menggunakan URL Bait
 
To teach is ... (On Teaching)
To teach is ... (On Teaching)To teach is ... (On Teaching)
To teach is ... (On Teaching)
 
How to Train Electronics Rockstars
How to Train Electronics RockstarsHow to Train Electronics Rockstars
How to Train Electronics Rockstars
 
Kronologis penganiayaan timmy
Kronologis penganiayaan timmyKronologis penganiayaan timmy
Kronologis penganiayaan timmy
 
Bdg software uploaded
Bdg software uploadedBdg software uploaded
Bdg software uploaded
 
Kesiapan Lulusan Perguruan Tinggi
Kesiapan Lulusan Perguruan TinggiKesiapan Lulusan Perguruan Tinggi
Kesiapan Lulusan Perguruan Tinggi
 
Pengantar Nama Domain
Pengantar Nama DomainPengantar Nama Domain
Pengantar Nama Domain
 

Recently uploaded

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 

Recently uploaded (20)

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 

Security in COVID-19 Era

  • 1. Security in COVID-19 Era Budi Rahardjo (@rahard) Presented at 2nd International Confernce on Information and Computer Technology (ICISCT) 2021 2021 BR - ICITCT 2021 1
  • 2. VLSI/Security/IoT/AI/Big Data 2021 BR - ICITCT 2021 2 • Lecturer at ITB • Manage .ID domain 1997-2005 • Founder & chairman of ID-CERT Indonesia Computer Emergency Response Team • Serial technopreneur – startup mentors
  • 3. 2021 BR - ICITCT 2021 3
  • 5. Security Cases Issues & Lessons Learned 2021 BR - ICITCT 2021 5
  • 6. eLearning: from LMS to School Management System • Learning Management Systems must be in place • but, mostly just converting from paper to electronic format (power point) • Redesigning in the process: microlearning? • Online classroom • Mostly: Zoom, Meet, Teams, Webex, ... • Don’t know what the students do: ... connecting ... • Online / AI-based Face Recognition attendance list • Online exams? • AI-based cheat detection • Security? Not considered, yet 2021 BR - ICITCT 2021 6
  • 7. 2021 BR - ICITCT 2021 7
  • 8. eVoting • Ikatan Alumni ITB (IA-ITB) has sucessfuly implemented eVoting • Lessons learned • 20000 participated • internet voting with web-based applications • manual face and liveness verification of voters due to complex requirements and situation • non-technical issues are most important • database destroyed after election for privacy issues • Future • Blockchain based? • Anonymity vs. Verifiability 2021 BR - ICITCT 2021 8
  • 9. Privacy and Healthcare • Healthcare • Contact tracing application: PeduliLindungi.id • Patients data (X-ray, MRI, ...) needed for AI for Covid-19 initiatives • Concerns & Issues • Privacy? Everybody is collecting personal data. Many applications • Rancangan Undang-Undang Perlindungan Data Pribadi • Data breached in Indonesia: Tokopedia, BPJS, ... 2021 BR - ICITCT 2021 9
  • 10. Tokopedia, etc. • Started with 9 millions data • Then 91 millions data 2021 BR - ICITCT 2021 10
  • 11. CSIRT • The rising ß(CSIRT) • Critical information infrastructure sectors • Financial • Government • Health? Not yet 2021 BR - ICITCT 2021 11
  • 12. Related topcis • Fake health/covid-19 test results • Fake oximeter applications: take fingerprint unsuspected users. Mostly happened in India, but other countries will follow • Due to limited supply of oxygene • Software security? 2021 BR - ICITCT 2021 12
  • 13. Secure Software Development Life Cycle 2021 BR - ICITCT 2021 13
  • 14. Concluding Remarks • We are forced to embrace new technologies and move to cyberspace quickly. Security issues will follow • Most research needed are applied research • Stay safe, stay healthy ... stay secure 2021 BR - ICITCT 2021 14