SlideShare a Scribd company logo
1 of 26
Download to read offline
ACAD|CSIRT :
Cyber Security of Indonesia
“Threat and Countermeasure”
IGN Mantra, Chairman,
Indonesia Academic CSIRT
Telkom University
Badan Siber dan Sandi
Negara (BSSN)
Bandung, Indonesia
Selasa, 12 November 2019
Data Program
Studi Th.2018
Sumber :
Dirjen Dikti,
Kemendiknas
Jumlah PT = 3.293
JUMLAH PRODI D1-4 + S1+(S2+S3) = 21.154
• Ilmu Komputer,
• Manajemen Informatika,
• Komputer Multimedia/Jaringan,
• Sistem Infomasi,
• Sistem Komputer,
• Teknik Informatika,
• Teknik Komputer dan
• Teknologi Informasi.
• Komputer Akuntansi
Jenjang Pendidikan TIK : D1-D2-D3-D4, S1-S2-S3
Fakultas : FASILKOM, FTIK, FMIPA, FTI, FT dll
Konsentrasi ke bidang Cyber Security < 1%
Fenomena
Cyber Crime,
Kejahatan
Internet
meningkat
Para criminal semakin
pintar
Organisasi tidak
peduli dengan
security
Keamanan informasi
tidak terdistribusi
dengan baik dan
cepat
Kurang Training Kurang Leaderships
Banyak Insider hacker
di dalam organisasi
Legalitas dan
penegakan hukum
masih kurang
Service provider,
consultan dan
contractor belum
comply
Kurang penetrasi para
engineer security di
organisasi
Konektivitas
meningkat pesat
Tools banyak dan
gratis, buku dan
tutorial hacking makin
banyak di Internet
Salah 1 alasan, Internet Berkembang Pesat
Harga Bandwidth dan Handset Murah
Tahun 1998
• 1,200 US$ /
MBps
• Handset 4jt
Tahun 2013
• 1.57 US$ /
MBps
• Handset 500rb
Tahun 2014
• 0.94 US$ /
MBps
• Handset 500rb
Tahun 2015
• 0.63 US$ /
MBps
• Handset 200rb
Tahun 2019
• 0.51 US$ /
MBps
• Handset 300rb
Indonesia di
Global Cyber
Security Index
ITU
Sumber :
https://nasional.kompas.com/read
/2019/05/24/16374011/bssn-raih-
peringkat-ke-41-dalam-global-
cyber-security-index.
Sebelum berdirinya BSSN, GCI Indonesia pada
2017 berada di peringkat ke-70 dari 164
negara dengan skor 0,424.
BSSN mampu melampaui target yang ditetapkan dalam
rencana kerja pemerintah tahun 2019 terkait Global
Cyber Security Index (GCI).
Pada 2018, peringkat pengelolaan keamanan siber
Indonesia menempati posisi ke-41 dari 175
negara.
STATISTICS
Berbagai statistic tentang Cyber Security, People, Process & Technology
3 Key Cyber
Security
Statistics
Utama
1. Cybersecurity
Market Statistics
2. Cybercrime
Statistics
3. Cybercrime Costs
& Damages Statistics
4. Cyber attack
Statistics
5. Cybersecurity Jobs
Statistics
6. Hacking &
Ransomware
Statistics
7. Cybercrime per
Industry Statistics
8. Formjacking &
Cryptojacking
Statistics
ACAD-CSIRT :
Academic
Incident
Statistic
0
0,5
1
1,5
2
2,5
3
3,5
4
4,5
5
Phising
Malware
Spam
Network
Malicious Web
Illegal Access
IPR
Deface
ACAD-CSIRT Incident Types
ACAD-CSIRT
Situational
Security
Incident yang
sering terjadi
Phising
Malware
Spam
Network
Mallicious Web
Illegal Access
IPR
Deface
DDoS
The Triangle : Pemerintah, Bisnis dan
Pendidikan
Pemerintah
BisnisPendidikan
• Cyber Security saling berkaitan dan
beririsan antara 3 sektor tersebut
• Pemerintah sebagai Regulator
• Bisnis sebagai Eksekutor
• Pendidikan sebagai Konseptor dan
tempat para peneliti dan produk
penelitiannya.
National Situational
Updated 2019
• Dukungan Pemerintah via BSSN dan Kominfo
• Seminar dan Workshop Honeynet
• Seminar Keamanan Insfrastruktur Kritis Nasional
• Seminar Keamanan Data Privacy
• Blocking Web Penyebar Hoax (web content filtering)
• Adanya RUU Keamanan Siber
• Beberapa Project tentang cyber security, krisis, iikn dsbnya.
• Dukungan masing-masing Lembaga
• PUSOPKAMSINAS (IDSIRTII) BSSN
• CERT/CSIRT Sektor seperti : Cyber TNI, CERT Bank,
CERT Academic
• PUSTIKNAS
• COC KEMHAN
• Kemenlu, Kemendagri dll.
Serangan Cyber
National 2019
1. Sektor Energi
• PLN mati lampu
2. Sektor TIK
• Hoax Rasisme,
• Wanna Cry & Petya Malware
3. Sektor KEU
• Saldo Bank hilang dan bertambah,
• Kredit Online, Pemanfaatan Data Pribadi
• Data eKTP tercecer
4. Sektor Hukum
• Hoax Server KPU
• Hoax Hacker China
• Hoax Data Pemilu Ganda
5. FRAUD
• Skimming ATM
• Debit/Credit Card
• Phising
• Sinkronisasi Token
Academic
Situational
Updated 2019
Koordinasi informasi incident academy
(higher education) dari IDCERT dan
PUSOPKAMSINAS-BSSN.
Seminar, Training dan Workshop
Penelitian Cyber Security
Ikut serta dalam Project Cyber Security,
Pemerintah dan Swasta
ACAD-CSIRT
Past and
Current
Research-
IGN Mantra
Indonesia Universities Information Security Classification
Indonesia Universities Web Vulnerability Rating
SQL Injections testing on Indonesia Universities Web
Indonesia Universities Tsubame Projects Security Attack Analysis
Model
The Modeling of Information and Web Security on Indonesia
Universities
ISO 27001:2013 Implementation for Indonesia Higher Education
Information Security Framework on Indonesia Higher Education
ACAD-CSIRT : Researcher
MH Suwito (Misni-U Mercu Buana-Kyushu
University-Fukuoka)
• An analysis of IT assessment security
maturity in higher education institution
• Integrity Watermarking and QR-Code
Techniques for ensuring Printed
Document Authenticity Real Time
Distribution
• An Authentication for Ensuring
Genuineness of Printed Document based
on Digital Watermarking and Image
Encryption
• Assessing Information Security on
Academic Educational Institution in
Indonesia
Sy Yuliani (U Widyatama-Universiti Teknikal
Malaysia Melaka)
• Review study of hoax email characteristic
• HOAX-NEWS-CLASSIFICATION-USING-
MACHINE-LEARNING-ALGORITHMS
• Framework for Hoax News Detection and
Analyzer used Rule based Methods
• Hoax News Validation Using Similarity
Algorithms
Amien Harisen (Swiss German University)
• INFORMATION SECURITY STANDARD
WORKFORCE: THE FRAMEWORK DESIGN
WITHIN INDONESIAN CONTEXT
• INFORMATION SECURITY GOVERNANCE IN
INDONESIA STARTUPS CULTURE: THE CHALLENGE
• RANSOMWARE 101: UNDERSTANDING THE
BUSINESS MODEL
PENUTUP
Cyber Security seperti pedang bermata dua
Bad News, masih banyak kejahatan berbasis cyber
Good News, Pemerintah, Swasta dan Akademisi saling mengisi bidang
Cyber Security
Pemerintah sudah memiliki lembaga negara – BSSN dan KOMINFO yang
terus menerus aktif untuk pertahanan dan edukasi Cyber Security
Swasta sudah memperkuat teknologi dan industri Cyber Security
Akademisi sudah memperkuat dengan Pendidikan, Penelitian dan
Pengembangan Cyber Security
Q & A
Terima Kasih
Email. mantra@acad-csirt.or.id
incident@acad-csirt.or.id
Plan your
cybersecurity
business
strategy
The global cybersecurity market will continue to experience
substantial growth.
The new preferred venue of criminals worldwide is the Internet.
Cybercrime costs and damages are higher versus those of natural
calamities.
Every technological innovation tends to open new opportunities for
cybercriminals.
Cybersecurity jobs will grow more.
Ransomware has become the hacking method of choice among
cybercriminals.
Hospitals are the most vulnerable among all types of business to
cybercrime.
Cryptojacking is stifling the growth of bitcoin and other
cryptocurrencies.

More Related Content

What's hot

PRESENTASI CYBERSECURITY REKTOR
PRESENTASI CYBERSECURITY REKTORPRESENTASI CYBERSECURITY REKTOR
PRESENTASI CYBERSECURITY REKTORWalid Umar
 
2020 07-16 aspek security n hukum cctv-ign mantra
2020 07-16 aspek security n hukum cctv-ign mantra2020 07-16 aspek security n hukum cctv-ign mantra
2020 07-16 aspek security n hukum cctv-ign mantraIGN MANTRA
 
2020 06-22 cyber security career competence-iaii-ign mantra
2020 06-22 cyber security career competence-iaii-ign mantra2020 06-22 cyber security career competence-iaii-ign mantra
2020 06-22 cyber security career competence-iaii-ign mantraIGN MANTRA
 
Seminar CYBER DEFENCE UNSOED 21 September 2014
Seminar CYBER DEFENCE UNSOED 21 September 2014Seminar CYBER DEFENCE UNSOED 21 September 2014
Seminar CYBER DEFENCE UNSOED 21 September 2014IGN MANTRA
 
Security Incident Response and Handling, Best Practices, ACAD-CSIRT
Security Incident Response and Handling, Best Practices, ACAD-CSIRTSecurity Incident Response and Handling, Best Practices, ACAD-CSIRT
Security Incident Response and Handling, Best Practices, ACAD-CSIRTIGN MANTRA
 
2020 07-02 cyber crime n data security-ign mantra
2020 07-02 cyber crime n data security-ign mantra2020 07-02 cyber crime n data security-ign mantra
2020 07-02 cyber crime n data security-ign mantraIGN MANTRA
 
Final workshop the futureof_csid_Jakarta_28032016
Final workshop the futureof_csid_Jakarta_28032016Final workshop the futureof_csid_Jakarta_28032016
Final workshop the futureof_csid_Jakarta_28032016Yudhistira Nugraha
 
Mengenal Cyber Scurity
Mengenal Cyber Scurity Mengenal Cyber Scurity
Mengenal Cyber Scurity Selancar Info
 
Keamanan Digital di Era Siber
Keamanan Digital di Era SiberKeamanan Digital di Era Siber
Keamanan Digital di Era SiberThomas Gregory
 
Profesi Penyelidik Kejahaan Cyber dan Keterkaitannya dengan Kasus Cyber Bullying
Profesi Penyelidik Kejahaan Cyber dan Keterkaitannya dengan Kasus Cyber BullyingProfesi Penyelidik Kejahaan Cyber dan Keterkaitannya dengan Kasus Cyber Bullying
Profesi Penyelidik Kejahaan Cyber dan Keterkaitannya dengan Kasus Cyber BullyingPrizka Airianiain
 
Siberpedia | Panduan Pintar Keamanan Siber
Siberpedia | Panduan Pintar Keamanan SiberSiberpedia | Panduan Pintar Keamanan Siber
Siberpedia | Panduan Pintar Keamanan SiberGeri Sugiran Abdul Sukur
 
idigf - hukum - detiknas - zainal hasibuan
idigf - hukum - detiknas - zainal hasibuanidigf - hukum - detiknas - zainal hasibuan
idigf - hukum - detiknas - zainal hasibuanIGF Indonesia
 

What's hot (20)

PRESENTASI CYBERSECURITY REKTOR
PRESENTASI CYBERSECURITY REKTORPRESENTASI CYBERSECURITY REKTOR
PRESENTASI CYBERSECURITY REKTOR
 
2020 07-16 aspek security n hukum cctv-ign mantra
2020 07-16 aspek security n hukum cctv-ign mantra2020 07-16 aspek security n hukum cctv-ign mantra
2020 07-16 aspek security n hukum cctv-ign mantra
 
2020 06-22 cyber security career competence-iaii-ign mantra
2020 06-22 cyber security career competence-iaii-ign mantra2020 06-22 cyber security career competence-iaii-ign mantra
2020 06-22 cyber security career competence-iaii-ign mantra
 
Seminar CYBER DEFENCE UNSOED 21 September 2014
Seminar CYBER DEFENCE UNSOED 21 September 2014Seminar CYBER DEFENCE UNSOED 21 September 2014
Seminar CYBER DEFENCE UNSOED 21 September 2014
 
Security Incident Response and Handling, Best Practices, ACAD-CSIRT
Security Incident Response and Handling, Best Practices, ACAD-CSIRTSecurity Incident Response and Handling, Best Practices, ACAD-CSIRT
Security Incident Response and Handling, Best Practices, ACAD-CSIRT
 
2020 07-02 cyber crime n data security-ign mantra
2020 07-02 cyber crime n data security-ign mantra2020 07-02 cyber crime n data security-ign mantra
2020 07-02 cyber crime n data security-ign mantra
 
Indonesia-BCN
Indonesia-BCNIndonesia-BCN
Indonesia-BCN
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Pindad kepedulian keamanan informasi
Pindad   kepedulian keamanan informasiPindad   kepedulian keamanan informasi
Pindad kepedulian keamanan informasi
 
Final workshop the futureof_csid_Jakarta_28032016
Final workshop the futureof_csid_Jakarta_28032016Final workshop the futureof_csid_Jakarta_28032016
Final workshop the futureof_csid_Jakarta_28032016
 
Mengenal Cyber Scurity
Mengenal Cyber Scurity Mengenal Cyber Scurity
Mengenal Cyber Scurity
 
E gov keamanan informasi 3 okt 2016 - kpk
E gov   keamanan informasi 3 okt 2016 - kpkE gov   keamanan informasi 3 okt 2016 - kpk
E gov keamanan informasi 3 okt 2016 - kpk
 
Ancaman cyber terhadap keamanan nasional cybersecurityy risk and control - ...
Ancaman cyber terhadap keamanan nasional   cybersecurityy risk and control - ...Ancaman cyber terhadap keamanan nasional   cybersecurityy risk and control - ...
Ancaman cyber terhadap keamanan nasional cybersecurityy risk and control - ...
 
Indonesia-CyberWar
Indonesia-CyberWarIndonesia-CyberWar
Indonesia-CyberWar
 
Stimik amik keamanan siber - informasi
Stimik amik   keamanan siber - informasiStimik amik   keamanan siber - informasi
Stimik amik keamanan siber - informasi
 
Keamanan Digital di Era Siber
Keamanan Digital di Era SiberKeamanan Digital di Era Siber
Keamanan Digital di Era Siber
 
Profesi Penyelidik Kejahaan Cyber dan Keterkaitannya dengan Kasus Cyber Bullying
Profesi Penyelidik Kejahaan Cyber dan Keterkaitannya dengan Kasus Cyber BullyingProfesi Penyelidik Kejahaan Cyber dan Keterkaitannya dengan Kasus Cyber Bullying
Profesi Penyelidik Kejahaan Cyber dan Keterkaitannya dengan Kasus Cyber Bullying
 
Siberpedia | Panduan Pintar Keamanan Siber
Siberpedia | Panduan Pintar Keamanan SiberSiberpedia | Panduan Pintar Keamanan Siber
Siberpedia | Panduan Pintar Keamanan Siber
 
Cybersecurity Policy - Director of Information Security
Cybersecurity Policy - Director of Information SecurityCybersecurity Policy - Director of Information Security
Cybersecurity Policy - Director of Information Security
 
idigf - hukum - detiknas - zainal hasibuan
idigf - hukum - detiknas - zainal hasibuanidigf - hukum - detiknas - zainal hasibuan
idigf - hukum - detiknas - zainal hasibuan
 

Similar to CYBER-STRATEGY

“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBERIGN MANTRA
 
Cyber_Security.ppt
Cyber_Security.pptCyber_Security.ppt
Cyber_Security.pptAhmatEnric
 
Cyber_Security.ppt
Cyber_Security.pptCyber_Security.ppt
Cyber_Security.pptOkviNugroho1
 
Seminar UBIDAR Palembang 20 June 2014
Seminar UBIDAR Palembang 20 June 2014Seminar UBIDAR Palembang 20 June 2014
Seminar UBIDAR Palembang 20 June 2014IGN MANTRA
 
Karir dan Kompetensi Keamanan Siber RTIK Bali 28 Agustus 2020
Karir dan Kompetensi Keamanan Siber RTIK Bali 28 Agustus 2020Karir dan Kompetensi Keamanan Siber RTIK Bali 28 Agustus 2020
Karir dan Kompetensi Keamanan Siber RTIK Bali 28 Agustus 2020IGN MANTRA
 
Kerangka Strategis Indonesia National Cybersecurity
Kerangka Strategis Indonesia National CybersecurityKerangka Strategis Indonesia National Cybersecurity
Kerangka Strategis Indonesia National CybersecurityAlbaar Rubhasy
 
Pertemuan 2 - Manajemen Risiko TI.pptx
Pertemuan 2 - Manajemen Risiko TI.pptxPertemuan 2 - Manajemen Risiko TI.pptx
Pertemuan 2 - Manajemen Risiko TI.pptxMutiaSari53
 
Pengantar Kebijakan APTIKA dalam mendukung Tata Kelola Internet Indonesia
Pengantar Kebijakan APTIKA dalam mendukung Tata Kelola Internet IndonesiaPengantar Kebijakan APTIKA dalam mendukung Tata Kelola Internet Indonesia
Pengantar Kebijakan APTIKA dalam mendukung Tata Kelola Internet IndonesiaICT Watch
 
Strategi & Leadership Cyber Security _ Materi Training "DIGITAL VORTEX-BANKI...
Strategi & Leadership Cyber  Security _ Materi Training "DIGITAL VORTEX-BANKI...Strategi & Leadership Cyber  Security _ Materi Training "DIGITAL VORTEX-BANKI...
Strategi & Leadership Cyber Security _ Materi Training "DIGITAL VORTEX-BANKI...Kanaidi ken
 
Makalah eptik Cybercrime Banu & Ismail
Makalah eptik Cybercrime Banu & Ismail Makalah eptik Cybercrime Banu & Ismail
Makalah eptik Cybercrime Banu & Ismail BanuSeptiaji
 
presentasirektorung-cybersecurity-220123020500.pdf
presentasirektorung-cybersecurity-220123020500.pdfpresentasirektorung-cybersecurity-220123020500.pdf
presentasirektorung-cybersecurity-220123020500.pdfEndahtriyuliani1
 
Makalah eptik Cybercrime Banu & Mail
Makalah eptik Cybercrime Banu & MailMakalah eptik Cybercrime Banu & Mail
Makalah eptik Cybercrime Banu & MailBanuSeptiaji
 
Teknologi Informasi 12 - Teknologi Keamanan Komputer
Teknologi Informasi 12 - Teknologi Keamanan KomputerTeknologi Informasi 12 - Teknologi Keamanan Komputer
Teknologi Informasi 12 - Teknologi Keamanan Komputerbeiharira
 
Development of Computer Technology and Informatics (Perkembangan teknologi ko...
Development of Computer Technology and Informatics (Perkembangan teknologi ko...Development of Computer Technology and Informatics (Perkembangan teknologi ko...
Development of Computer Technology and Informatics (Perkembangan teknologi ko...Setiawan Hadi
 
Kebijakan Cybersecurity Dalam Perspektif Multistakeholder
Kebijakan Cybersecurity Dalam Perspektif MultistakeholderKebijakan Cybersecurity Dalam Perspektif Multistakeholder
Kebijakan Cybersecurity Dalam Perspektif MultistakeholderIGF Indonesia
 
Seri buku literasi digital kebijakan cybersecurity dalam perspektif multistak...
Seri buku literasi digital kebijakan cybersecurity dalam perspektif multistak...Seri buku literasi digital kebijakan cybersecurity dalam perspektif multistak...
Seri buku literasi digital kebijakan cybersecurity dalam perspektif multistak...literasi digital
 
Paper - Hamsah (2019120020) & Nurholis (2019121025).pdf
Paper - Hamsah (2019120020) & Nurholis (2019121025).pdfPaper - Hamsah (2019120020) & Nurholis (2019121025).pdf
Paper - Hamsah (2019120020) & Nurholis (2019121025).pdfHamsah2019
 

Similar to CYBER-STRATEGY (20)

“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
 
Cyber_Security.ppt
Cyber_Security.pptCyber_Security.ppt
Cyber_Security.ppt
 
Cyber_Security.ppt
Cyber_Security.pptCyber_Security.ppt
Cyber_Security.ppt
 
Cyber_Security.ppt
Cyber_Security.pptCyber_Security.ppt
Cyber_Security.ppt
 
Seminar UBIDAR Palembang 20 June 2014
Seminar UBIDAR Palembang 20 June 2014Seminar UBIDAR Palembang 20 June 2014
Seminar UBIDAR Palembang 20 June 2014
 
Karir dan Kompetensi Keamanan Siber RTIK Bali 28 Agustus 2020
Karir dan Kompetensi Keamanan Siber RTIK Bali 28 Agustus 2020Karir dan Kompetensi Keamanan Siber RTIK Bali 28 Agustus 2020
Karir dan Kompetensi Keamanan Siber RTIK Bali 28 Agustus 2020
 
Kerangka Strategis Indonesia National Cybersecurity
Kerangka Strategis Indonesia National CybersecurityKerangka Strategis Indonesia National Cybersecurity
Kerangka Strategis Indonesia National Cybersecurity
 
Pertemuan 2 - Manajemen Risiko TI.pptx
Pertemuan 2 - Manajemen Risiko TI.pptxPertemuan 2 - Manajemen Risiko TI.pptx
Pertemuan 2 - Manajemen Risiko TI.pptx
 
Pengantar Kebijakan APTIKA dalam mendukung Tata Kelola Internet Indonesia
Pengantar Kebijakan APTIKA dalam mendukung Tata Kelola Internet IndonesiaPengantar Kebijakan APTIKA dalam mendukung Tata Kelola Internet Indonesia
Pengantar Kebijakan APTIKA dalam mendukung Tata Kelola Internet Indonesia
 
Strategi & Leadership Cyber Security _ Materi Training "DIGITAL VORTEX-BANKI...
Strategi & Leadership Cyber  Security _ Materi Training "DIGITAL VORTEX-BANKI...Strategi & Leadership Cyber  Security _ Materi Training "DIGITAL VORTEX-BANKI...
Strategi & Leadership Cyber Security _ Materi Training "DIGITAL VORTEX-BANKI...
 
TEORI BAB 9
TEORI BAB 9TEORI BAB 9
TEORI BAB 9
 
Makalah eptik Cybercrime Banu & Ismail
Makalah eptik Cybercrime Banu & Ismail Makalah eptik Cybercrime Banu & Ismail
Makalah eptik Cybercrime Banu & Ismail
 
presentasirektorung-cybersecurity-220123020500.pdf
presentasirektorung-cybersecurity-220123020500.pdfpresentasirektorung-cybersecurity-220123020500.pdf
presentasirektorung-cybersecurity-220123020500.pdf
 
Makalah eptik Cybercrime Banu & Mail
Makalah eptik Cybercrime Banu & MailMakalah eptik Cybercrime Banu & Mail
Makalah eptik Cybercrime Banu & Mail
 
Teknologi Informasi 12 - Teknologi Keamanan Komputer
Teknologi Informasi 12 - Teknologi Keamanan KomputerTeknologi Informasi 12 - Teknologi Keamanan Komputer
Teknologi Informasi 12 - Teknologi Keamanan Komputer
 
Development of Computer Technology and Informatics (Perkembangan teknologi ko...
Development of Computer Technology and Informatics (Perkembangan teknologi ko...Development of Computer Technology and Informatics (Perkembangan teknologi ko...
Development of Computer Technology and Informatics (Perkembangan teknologi ko...
 
Kebijakan Cybersecurity Dalam Perspektif Multistakeholder
Kebijakan Cybersecurity Dalam Perspektif MultistakeholderKebijakan Cybersecurity Dalam Perspektif Multistakeholder
Kebijakan Cybersecurity Dalam Perspektif Multistakeholder
 
Seri buku literasi digital kebijakan cybersecurity dalam perspektif multistak...
Seri buku literasi digital kebijakan cybersecurity dalam perspektif multistak...Seri buku literasi digital kebijakan cybersecurity dalam perspektif multistak...
Seri buku literasi digital kebijakan cybersecurity dalam perspektif multistak...
 
Paper - Hamsah (2019120020) & Nurholis (2019121025).pdf
Paper - Hamsah (2019120020) & Nurholis (2019121025).pdfPaper - Hamsah (2019120020) & Nurholis (2019121025).pdf
Paper - Hamsah (2019120020) & Nurholis (2019121025).pdf
 
Presentasi Cybercrime
Presentasi CybercrimePresentasi Cybercrime
Presentasi Cybercrime
 

More from IGN MANTRA

Ign mantra ppt menulis artikel dan buku ict
Ign mantra ppt menulis artikel dan buku ictIgn mantra ppt menulis artikel dan buku ict
Ign mantra ppt menulis artikel dan buku ictIGN MANTRA
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraIGN MANTRA
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas IndonesiaIGN MANTRA
 
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.IGN MANTRA
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.IGN MANTRA
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.IGN MANTRA
 
SEMINAR Computer & Cyber Security Career in the World, IT UP
SEMINAR Computer & Cyber Security Career in the World, IT UPSEMINAR Computer & Cyber Security Career in the World, IT UP
SEMINAR Computer & Cyber Security Career in the World, IT UPIGN MANTRA
 
10 Tips Career in Cyber Security to Stmik Sumedang
10 Tips Career in Cyber Security to Stmik Sumedang10 Tips Career in Cyber Security to Stmik Sumedang
10 Tips Career in Cyber Security to Stmik SumedangIGN MANTRA
 
Seminar Karir di Computer dan Cyber Security + 10 Tips Meraihnya di STMIK BAN...
Seminar Karir di Computer dan Cyber Security + 10 Tips Meraihnya di STMIK BAN...Seminar Karir di Computer dan Cyber Security + 10 Tips Meraihnya di STMIK BAN...
Seminar Karir di Computer dan Cyber Security + 10 Tips Meraihnya di STMIK BAN...IGN MANTRA
 
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017IGN MANTRA
 
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...IGN MANTRA
 
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...IGN MANTRA
 
Ethics on Social Media, Etika Ber Sosial Media
Ethics on Social Media, Etika Ber Sosial MediaEthics on Social Media, Etika Ber Sosial Media
Ethics on Social Media, Etika Ber Sosial MediaIGN MANTRA
 
Cyber Security Seminar, MEA 2015, IGN Mantra
Cyber Security Seminar, MEA 2015, IGN MantraCyber Security Seminar, MEA 2015, IGN Mantra
Cyber Security Seminar, MEA 2015, IGN MantraIGN MANTRA
 

More from IGN MANTRA (14)

Ign mantra ppt menulis artikel dan buku ict
Ign mantra ppt menulis artikel dan buku ictIgn mantra ppt menulis artikel dan buku ict
Ign mantra ppt menulis artikel dan buku ict
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
 
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
 
SEMINAR Computer & Cyber Security Career in the World, IT UP
SEMINAR Computer & Cyber Security Career in the World, IT UPSEMINAR Computer & Cyber Security Career in the World, IT UP
SEMINAR Computer & Cyber Security Career in the World, IT UP
 
10 Tips Career in Cyber Security to Stmik Sumedang
10 Tips Career in Cyber Security to Stmik Sumedang10 Tips Career in Cyber Security to Stmik Sumedang
10 Tips Career in Cyber Security to Stmik Sumedang
 
Seminar Karir di Computer dan Cyber Security + 10 Tips Meraihnya di STMIK BAN...
Seminar Karir di Computer dan Cyber Security + 10 Tips Meraihnya di STMIK BAN...Seminar Karir di Computer dan Cyber Security + 10 Tips Meraihnya di STMIK BAN...
Seminar Karir di Computer dan Cyber Security + 10 Tips Meraihnya di STMIK BAN...
 
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017
 
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
 
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
Seminar Karir di Keamanan Informasi & Cyber Security, STTB Bandung, 23 Desemb...
 
Ethics on Social Media, Etika Ber Sosial Media
Ethics on Social Media, Etika Ber Sosial MediaEthics on Social Media, Etika Ber Sosial Media
Ethics on Social Media, Etika Ber Sosial Media
 
Cyber Security Seminar, MEA 2015, IGN Mantra
Cyber Security Seminar, MEA 2015, IGN MantraCyber Security Seminar, MEA 2015, IGN Mantra
Cyber Security Seminar, MEA 2015, IGN Mantra
 

CYBER-STRATEGY

  • 1. ACAD|CSIRT : Cyber Security of Indonesia “Threat and Countermeasure” IGN Mantra, Chairman, Indonesia Academic CSIRT Telkom University Badan Siber dan Sandi Negara (BSSN) Bandung, Indonesia Selasa, 12 November 2019
  • 2. Data Program Studi Th.2018 Sumber : Dirjen Dikti, Kemendiknas Jumlah PT = 3.293 JUMLAH PRODI D1-4 + S1+(S2+S3) = 21.154 • Ilmu Komputer, • Manajemen Informatika, • Komputer Multimedia/Jaringan, • Sistem Infomasi, • Sistem Komputer, • Teknik Informatika, • Teknik Komputer dan • Teknologi Informasi. • Komputer Akuntansi Jenjang Pendidikan TIK : D1-D2-D3-D4, S1-S2-S3 Fakultas : FASILKOM, FTIK, FMIPA, FTI, FT dll Konsentrasi ke bidang Cyber Security < 1%
  • 3. Fenomena Cyber Crime, Kejahatan Internet meningkat Para criminal semakin pintar Organisasi tidak peduli dengan security Keamanan informasi tidak terdistribusi dengan baik dan cepat Kurang Training Kurang Leaderships Banyak Insider hacker di dalam organisasi Legalitas dan penegakan hukum masih kurang Service provider, consultan dan contractor belum comply Kurang penetrasi para engineer security di organisasi Konektivitas meningkat pesat Tools banyak dan gratis, buku dan tutorial hacking makin banyak di Internet
  • 4. Salah 1 alasan, Internet Berkembang Pesat Harga Bandwidth dan Handset Murah Tahun 1998 • 1,200 US$ / MBps • Handset 4jt Tahun 2013 • 1.57 US$ / MBps • Handset 500rb Tahun 2014 • 0.94 US$ / MBps • Handset 500rb Tahun 2015 • 0.63 US$ / MBps • Handset 200rb Tahun 2019 • 0.51 US$ / MBps • Handset 300rb
  • 5. Indonesia di Global Cyber Security Index ITU Sumber : https://nasional.kompas.com/read /2019/05/24/16374011/bssn-raih- peringkat-ke-41-dalam-global- cyber-security-index. Sebelum berdirinya BSSN, GCI Indonesia pada 2017 berada di peringkat ke-70 dari 164 negara dengan skor 0,424. BSSN mampu melampaui target yang ditetapkan dalam rencana kerja pemerintah tahun 2019 terkait Global Cyber Security Index (GCI). Pada 2018, peringkat pengelolaan keamanan siber Indonesia menempati posisi ke-41 dari 175 negara.
  • 6. STATISTICS Berbagai statistic tentang Cyber Security, People, Process & Technology
  • 10. 3. Cybercrime Costs & Damages Statistics
  • 18. The Triangle : Pemerintah, Bisnis dan Pendidikan Pemerintah BisnisPendidikan • Cyber Security saling berkaitan dan beririsan antara 3 sektor tersebut • Pemerintah sebagai Regulator • Bisnis sebagai Eksekutor • Pendidikan sebagai Konseptor dan tempat para peneliti dan produk penelitiannya.
  • 19. National Situational Updated 2019 • Dukungan Pemerintah via BSSN dan Kominfo • Seminar dan Workshop Honeynet • Seminar Keamanan Insfrastruktur Kritis Nasional • Seminar Keamanan Data Privacy • Blocking Web Penyebar Hoax (web content filtering) • Adanya RUU Keamanan Siber • Beberapa Project tentang cyber security, krisis, iikn dsbnya. • Dukungan masing-masing Lembaga • PUSOPKAMSINAS (IDSIRTII) BSSN • CERT/CSIRT Sektor seperti : Cyber TNI, CERT Bank, CERT Academic • PUSTIKNAS • COC KEMHAN • Kemenlu, Kemendagri dll.
  • 20. Serangan Cyber National 2019 1. Sektor Energi • PLN mati lampu 2. Sektor TIK • Hoax Rasisme, • Wanna Cry & Petya Malware 3. Sektor KEU • Saldo Bank hilang dan bertambah, • Kredit Online, Pemanfaatan Data Pribadi • Data eKTP tercecer 4. Sektor Hukum • Hoax Server KPU • Hoax Hacker China • Hoax Data Pemilu Ganda 5. FRAUD • Skimming ATM • Debit/Credit Card • Phising • Sinkronisasi Token
  • 21. Academic Situational Updated 2019 Koordinasi informasi incident academy (higher education) dari IDCERT dan PUSOPKAMSINAS-BSSN. Seminar, Training dan Workshop Penelitian Cyber Security Ikut serta dalam Project Cyber Security, Pemerintah dan Swasta
  • 22. ACAD-CSIRT Past and Current Research- IGN Mantra Indonesia Universities Information Security Classification Indonesia Universities Web Vulnerability Rating SQL Injections testing on Indonesia Universities Web Indonesia Universities Tsubame Projects Security Attack Analysis Model The Modeling of Information and Web Security on Indonesia Universities ISO 27001:2013 Implementation for Indonesia Higher Education Information Security Framework on Indonesia Higher Education
  • 23. ACAD-CSIRT : Researcher MH Suwito (Misni-U Mercu Buana-Kyushu University-Fukuoka) • An analysis of IT assessment security maturity in higher education institution • Integrity Watermarking and QR-Code Techniques for ensuring Printed Document Authenticity Real Time Distribution • An Authentication for Ensuring Genuineness of Printed Document based on Digital Watermarking and Image Encryption • Assessing Information Security on Academic Educational Institution in Indonesia Sy Yuliani (U Widyatama-Universiti Teknikal Malaysia Melaka) • Review study of hoax email characteristic • HOAX-NEWS-CLASSIFICATION-USING- MACHINE-LEARNING-ALGORITHMS • Framework for Hoax News Detection and Analyzer used Rule based Methods • Hoax News Validation Using Similarity Algorithms Amien Harisen (Swiss German University) • INFORMATION SECURITY STANDARD WORKFORCE: THE FRAMEWORK DESIGN WITHIN INDONESIAN CONTEXT • INFORMATION SECURITY GOVERNANCE IN INDONESIA STARTUPS CULTURE: THE CHALLENGE • RANSOMWARE 101: UNDERSTANDING THE BUSINESS MODEL
  • 24. PENUTUP Cyber Security seperti pedang bermata dua Bad News, masih banyak kejahatan berbasis cyber Good News, Pemerintah, Swasta dan Akademisi saling mengisi bidang Cyber Security Pemerintah sudah memiliki lembaga negara – BSSN dan KOMINFO yang terus menerus aktif untuk pertahanan dan edukasi Cyber Security Swasta sudah memperkuat teknologi dan industri Cyber Security Akademisi sudah memperkuat dengan Pendidikan, Penelitian dan Pengembangan Cyber Security
  • 25. Q & A Terima Kasih Email. mantra@acad-csirt.or.id incident@acad-csirt.or.id
  • 26. Plan your cybersecurity business strategy The global cybersecurity market will continue to experience substantial growth. The new preferred venue of criminals worldwide is the Internet. Cybercrime costs and damages are higher versus those of natural calamities. Every technological innovation tends to open new opportunities for cybercriminals. Cybersecurity jobs will grow more. Ransomware has become the hacking method of choice among cybercriminals. Hospitals are the most vulnerable among all types of business to cybercrime. Cryptojacking is stifling the growth of bitcoin and other cryptocurrencies.