SlideShare a Scribd company logo
1 of 34
Verifikasi dan Validasi
Keamanan Informasi
Agung Sediyono, Ir.,MT, Ph.D
Verification & Validation
the process of checking that a product,
service, or system meets specifications and
that it fulfills its intended purpose. These are
critical components of a quality management
system such as ISO 9000. Sometimes
preceded with "Independent" (or IV&V) to
ensure the validation is performed by a
disinterested third party.
Verification
Quality control process that is used to
 evaluate whether or not a product, service,
 or system complies with regulations,
 specifications, or conditions imposed at the
 start of a development phase. Verification
 can be in development, scale-up, or
 production. This is often an internal process
Validation
Quality assurance process of
establishing evidence that provides a
high degree of assurance that a product,
service, or system accomplishes its
intended requirements. This often
involves acceptance of fitness for
purpose with end users and other
product stakeholders
Evaluation
a) analysis and checking of process(es) and procedure(s);
b) checking that process(es) and procedure(s) are being applied;
c) analysis of the correspondence between TOE design
representations;
d) analysis of the TOE design representation against the
requirements;
e) verification of proofs;
f) analysis of guidance documents;
g) analysis of functional tests developed and the results provided;
h) independent functional testing;
i) analysis for vulnerabilities (including flaw hypothesis);
j) penetration testing.
CC Paradigm               System Acquisition      Observations Regarding
                          Paradigm                Commonality Among CC
                                                  and Acquisition
                                                  Paradigms

Protection Profile (PP)   Request for Proposals   Provides customer
                                                  desires, needs, and
                                                  requirements: "What is
                                                  wanted"
Security Target (ST)      Proposals               Indicates how the above
                                                  will be satisfied by
                                                  suppliers: "What will be
                                                  provided"

Target of Evaluation      Delivered System        Is the supplier's physical
(TOE)                                             manifestation of above


Evaluated System          Accepted System         Shows that the three
                                                  preceding
                                                  representations are
                                                  sufficiently consistent
Significant of Vulneralability
a) eliminated -- that is, active steps should be taken to
expose, and remove or neutralize, all exercisable
vulnerabilities;
b) minimised -- that is, active steps should be taken to
reduce, to an acceptable residual level, the potential
impact of any exercise of a vulnerability;
c) monitored -- that is, active steps should be taken to
ensure that any attempt to exercise a residual
vulnerability will be detected so that steps can be taken
to limit the damage
Cause of Vulneralability
a) requirements -- that is, an IT product may possess
all the functions and features required of it and still
contain vulnerabilities that render it unsuitable or
ineffective with respect to security;
b) development -- that is, an IT product does not meet
its specifications and/or vulnerabilities have been
introduced as a result of poor development standards or
incorrect design choices;
c) operation -- that is, an IT product has been
constructed correctly to a correct specification but
vulnerabilities have been introduced as a result of
inadequate controls upon the operation
CC: Level Penjaminan Evaluasi
  (EAL)
 EAL1 : Fuctionality Tested
 EAL2 : Structurally Tested
 EAL3 : Methodically tested and checked
 EAL4 : Methodically designed, tested, and
  reviewed
 EAL5 : Semi-formally designed and tested
 EAL6 : Semi-formally verified, designed, and
  tested
 EAL7 : Formally verified, designed, and tested.
Diterapkan sesuai dengan keadaan atau kriteria
yang ditetapkan oleh kebutuhan pemakai.
OWASP Level (Khusus u aplikasi)
Level 1 : Verifikasi Otomatis
 1A: Pemindaian Dinamis
 1B: Pemindaian Kode Sumber
Level 2 : Verifikasi Manual
 2A: Uji Keamanan
 2B: Code Review
Level 3 : Verifikasi Desain
Level 4 : Verifikasi Internal
Class in CC
  Security Audit
  Communication
  Cryptographic
  User Data Protection
  Identification and Authentication
  Security Management
  Privacy
  Protection of TSF
  Resource Utilization
  TOE Access
  Trusted Path/Channel
Class in ASVS
 Security Architecture
 Authentication
 Session Management
 Access Control
 Input Validation
 Coding
 Cryptography
 Error Handling and Logging
 Data Protection
 Communication Security
 HTTP Security
 Security Configuration
 Malicious Finding
 Internal Security
Information Security Testing and
Assesment Methodology (NIST,2008)
  Planning
    Information gathering about TOE, Ancaman, pengendalian akses
     menangani ancaman, pendekatan evaluasi.
    Pembuatan manajemen proyek untuk mencapai tujuan , lingkup,
     kebutuhan, peran dan tanggung jawab tim, batasan, indikator
     sukses, asumsi, sumber daya, timeline dan delivery.
  Execution
    Indentifikasi vulnerability dan melakukan validasi dengan benar.
    Menjalankan metode dan teknik penilaian keamanan.
    Hasil akhir berupa identifikasi vulnerability pada system komputer
     dan proses organisasi.
  Post-Execution
    Analysis dan identifikasi vulnerability untuk menentukan akar
     masalah, penetapan rekomendasi mitigasi, dan pembuatan
     laporan akhir.
Teknik Penilaian
Review
   Teknik pemeriksaan yang digunakan untuk
    mengevaluasi sistem, aplikasi, jaringan, kebijakan,
    prosedur untuk mencari vulnerability
Identifikasi dan Analysis Target
   Identifikasi sistem, port, service, potensi vulnerability
   Bisa dilakukan secara manual atau menggunakan
    alat
Validasi Vunerability Target
   Pembuktian Vulnerability yang ditemukan
   Ex: password cracking, penetration testing, dan
    social engineering
Review
Document
Log
Ruleset
System Configuration
Network Sniffing
File Integrity Checking
Identifikasi
Network Discovery
Network Port dan Services Scanning
Vulnerability Scanning
Wireless Scanning
 Passive Wireless Scanning
 Active Wireless Scanning
 Wireless Device Locating Tracking
Bluetooth Scanning
Validasi
Password Cracking
Penetration Test
Social Engineering
Test Type (OSSTM)
Trifecta
How do current Operation Work?
   Penggunaan metrik untuk menentukan domain
    masalah
How do they work differently from how
 management think they works?
   Akses ke kebijakan dan trust/resiko penilaian
    dimap ke metrik masalah
How do they need to work?
   Kalau ada gap antara metrik dan kebijakan atau
    resiko penilaian
Methodology (OSSTM)
1.  Passively collect data of normal operations to comprehend the target.
2.  Actively test operations by agitating operations beyond the normal
    baseline.
3. Analyze data received directly from the operations tested.
4. Analyze indirect data from resources and operators (i.e. workers,
    programs).
5. Correlate and reconcile intelligence from direct (step 3) and indirect
    (step 4) data test results to determine operational security processes.
6. Determine and reconcile errors.
7. Derive metrics from both normal and agitated operations.
8. Correlate and reconcile intelligence between normal and agitated (steps
    1 and 2) operations todetermine the optimal level of protection and
    control which would best be implemented.
9. Map the optimal state of operations (step 8) to processes (step 5).
10. Create a gap analysis to determine what enhancements are needed for
    processes governingnecessary protection and controls (step 5) to
    achieve the optimal operational state (step 8) from the current one.
6 langkah Analisis Keamanan
1. Build your knowledge of the target from a variety of the most
   contemporary, factual resources while avoiding commercially biased
   and speculative information.
2. Determine the global level of experience for the type of target and the
   amount of information possibly known about it.
3. Determine any bias or ulterior motives in the information sources.
4. Translate jargon from information sources to similar or known words
   for comparison because what may sound new or complicated may just
   be a trick to differentiate something common.
5. Be sure the test equipment has been properly calibrated and the test
   environment verified to assure the results are not contaminated by the
   test itself.
6. Assure that the translation state of tools or test processes has been
   removed as much as possible so that the results do not come from the
   indirect sources in a process or the pre-analysis from some tools.
Keputusan Verifiksi
 Unknown
 Untested Target
 Identified and Verified Limitation
 False Positive and The means to generate
  them
 Failed Security Process and Procedure
 Good Practices
 Compliance
Network Sniffing
 Merekam semua trafik jaringan untuk bahan analisis
 Tools
    TCPDUMP
    WIRESHARK/TSHARK
 Penempatan peralatan menjadi penting karena harus
  betul-betul dapat menyadap komunikasi yang diinginkan
 Harus dipasang setempat, tidak dapat secara remote
 Contoh teknologi NetFlow dapat dilakukan secara
  remote
Network Discovery
 Test Target yang hidup
 Simple test using ‘ping’, fail to detect firewall
  because firewall reject ping request.
Port and Services Scanning
 Try for all possible ports, 1 – 11000 for example
 Test using standart communication to determine TCP or UDP
 TCP test
    Send SYN packet to target
    Target replay by sending ACK packet
    Send SYN ACK to target to start communication
    Connection established.
 UDP Test
    If send UDP packet is not response assumed the port open
    If send UDP packet is response assumed the port is closed or
     open but not UDP services
 Tools: Nmap and Hping
Verifikasi dan Validasi keamanan informasi

More Related Content

What's hot

A Survey of Software Reliability factor
A Survey of Software Reliability factorA Survey of Software Reliability factor
A Survey of Software Reliability factorIOSR Journals
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & qualityNur Islam
 
Chapter 1 - Introduction and Objectives for Test Automation
Chapter 1 - Introduction and Objectives for Test AutomationChapter 1 - Introduction and Objectives for Test Automation
Chapter 1 - Introduction and Objectives for Test AutomationNeeraj Kumar Singh
 
Chapter 4 - Performance Testing Tasks
Chapter 4 - Performance Testing TasksChapter 4 - Performance Testing Tasks
Chapter 4 - Performance Testing TasksNeeraj Kumar Singh
 
Chapter 1 - Fundamentals of Testing
Chapter 1 - Fundamentals of TestingChapter 1 - Fundamentals of Testing
Chapter 1 - Fundamentals of TestingNeeraj Kumar Singh
 
Software and Hardware Reliability
Software and Hardware ReliabilitySoftware and Hardware Reliability
Software and Hardware ReliabilitySandeep Patalay
 
Information hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted ImagesInformation hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted ImagesIRJET Journal
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
 
AN EFFECTIVE VERIFICATION AND VALIDATION STRATEGY FOR SAFETY-CRITICAL EMBEDDE...
AN EFFECTIVE VERIFICATION AND VALIDATION STRATEGY FOR SAFETY-CRITICAL EMBEDDE...AN EFFECTIVE VERIFICATION AND VALIDATION STRATEGY FOR SAFETY-CRITICAL EMBEDDE...
AN EFFECTIVE VERIFICATION AND VALIDATION STRATEGY FOR SAFETY-CRITICAL EMBEDDE...IJSEA
 

What's hot (13)

A Survey of Software Reliability factor
A Survey of Software Reliability factorA Survey of Software Reliability factor
A Survey of Software Reliability factor
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & quality
 
Chapter 1 - Introduction and Objectives for Test Automation
Chapter 1 - Introduction and Objectives for Test AutomationChapter 1 - Introduction and Objectives for Test Automation
Chapter 1 - Introduction and Objectives for Test Automation
 
Chapter 4 - Performance Testing Tasks
Chapter 4 - Performance Testing TasksChapter 4 - Performance Testing Tasks
Chapter 4 - Performance Testing Tasks
 
Chapter 1 - Fundamentals of Testing
Chapter 1 - Fundamentals of TestingChapter 1 - Fundamentals of Testing
Chapter 1 - Fundamentals of Testing
 
Software and Hardware Reliability
Software and Hardware ReliabilitySoftware and Hardware Reliability
Software and Hardware Reliability
 
An empirical evaluation of
An empirical evaluation ofAn empirical evaluation of
An empirical evaluation of
 
Information hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted ImagesInformation hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted Images
 
Software reliability
Software reliabilitySoftware reliability
Software reliability
 
@#$@#$@#$"""@#$@#$"""
@#$@#$@#$"""@#$@#$"""@#$@#$@#$"""@#$@#$"""
@#$@#$@#$"""@#$@#$"""
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Testing Experience Magazine Vol.14 June 2011
Testing Experience Magazine Vol.14 June 2011Testing Experience Magazine Vol.14 June 2011
Testing Experience Magazine Vol.14 June 2011
 
AN EFFECTIVE VERIFICATION AND VALIDATION STRATEGY FOR SAFETY-CRITICAL EMBEDDE...
AN EFFECTIVE VERIFICATION AND VALIDATION STRATEGY FOR SAFETY-CRITICAL EMBEDDE...AN EFFECTIVE VERIFICATION AND VALIDATION STRATEGY FOR SAFETY-CRITICAL EMBEDDE...
AN EFFECTIVE VERIFICATION AND VALIDATION STRATEGY FOR SAFETY-CRITICAL EMBEDDE...
 

Viewers also liked

Viewers also liked (11)

payroll pp
payroll pppayroll pp
payroll pp
 
Insuficiencia cardíaca
Insuficiencia cardíacaInsuficiencia cardíaca
Insuficiencia cardíaca
 
Doświadczenia Koła Naukowego "Homunculus"
Doświadczenia Koła Naukowego "Homunculus"Doświadczenia Koła Naukowego "Homunculus"
Doświadczenia Koła Naukowego "Homunculus"
 
HYRUM WEAVER New Resume
HYRUM WEAVER New ResumeHYRUM WEAVER New Resume
HYRUM WEAVER New Resume
 
resume
resumeresume
resume
 
Hoivatilat_casebook_2016
Hoivatilat_casebook_2016Hoivatilat_casebook_2016
Hoivatilat_casebook_2016
 
Esmeralda Clube Residencial
Esmeralda Clube ResidencialEsmeralda Clube Residencial
Esmeralda Clube Residencial
 
Tamil Nadu Assembly Elections 2016
Tamil Nadu Assembly Elections 2016Tamil Nadu Assembly Elections 2016
Tamil Nadu Assembly Elections 2016
 
Type of e filing efiling process
Type of e filing efiling processType of e filing efiling process
Type of e filing efiling process
 
Fixed Deposit vs Debt Oriented Hybrid Fund
Fixed Deposit vs Debt Oriented Hybrid FundFixed Deposit vs Debt Oriented Hybrid Fund
Fixed Deposit vs Debt Oriented Hybrid Fund
 
Cuadro comparativo
Cuadro comparativo Cuadro comparativo
Cuadro comparativo
 

Similar to Verifikasi dan Validasi keamanan informasi

Software Quality Assurance
Software Quality Assurance Software Quality Assurance
Software Quality Assurance IMAD HASSAN
 
Computerized System Validation.vinay (1).pptx
Computerized  System  Validation.vinay (1).pptxComputerized  System  Validation.vinay (1).pptx
Computerized System Validation.vinay (1).pptxKIET GROUP OF INSITITUTE
 
CHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoCHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoJinElias52
 
Information Technology Security Techniques Evaluation Criteria For It Secrit...
Information Technology  Security Techniques Evaluation Criteria For It Secrit...Information Technology  Security Techniques Evaluation Criteria For It Secrit...
Information Technology Security Techniques Evaluation Criteria For It Secrit...Vishnu Kesarwani
 
Computer system validation
Computer system validation Computer system validation
Computer system validation ShameerAbid
 
V&V Considerations In Implementing IEC61508-3
V&V Considerations In Implementing IEC61508-3V&V Considerations In Implementing IEC61508-3
V&V Considerations In Implementing IEC61508-3Oak Systems
 
SQA Lecture 01 (Introduction) - Testing and SQA
SQA Lecture 01 (Introduction) - Testing and SQASQA Lecture 01 (Introduction) - Testing and SQA
SQA Lecture 01 (Introduction) - Testing and SQAsunena224
 
EVALUATING SOFTWARE QUALITY : A QUANTITATIVE APPROACH
EVALUATING SOFTWAREQUALITY : A QUANTITATIVEAPPROACHEVALUATING SOFTWAREQUALITY : A QUANTITATIVEAPPROACH
EVALUATING SOFTWARE QUALITY : A QUANTITATIVE APPROACHPriyanka Karancy
 
Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...John M. Willis
 
Software engineering
Software engineeringSoftware engineering
Software engineeringGuruAbirami2
 
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROsWebinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROsStatistics & Data Corporation
 
Software_Verification_and_Validation.ppt
Software_Verification_and_Validation.pptSoftware_Verification_and_Validation.ppt
Software_Verification_and_Validation.pptSaba651353
 
Overview of Software QA and What is Software Quality
Overview of Software QA and What is Software QualityOverview of Software QA and What is Software Quality
Overview of Software QA and What is Software QualityUniversity of Dhaka
 
IT8076 – Software Testing Intro
IT8076 – Software Testing IntroIT8076 – Software Testing Intro
IT8076 – Software Testing IntroJohnSamuel280314
 
Project Pluto Will Adopt The Incremental Build Model Essay
Project Pluto Will Adopt The Incremental Build Model EssayProject Pluto Will Adopt The Incremental Build Model Essay
Project Pluto Will Adopt The Incremental Build Model EssayDiane Allen
 

Similar to Verifikasi dan Validasi keamanan informasi (20)

Software Quality Assurance
Software Quality Assurance Software Quality Assurance
Software Quality Assurance
 
Computerized System Validation.vinay (1).pptx
Computerized  System  Validation.vinay (1).pptxComputerized  System  Validation.vinay (1).pptx
Computerized System Validation.vinay (1).pptx
 
CHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoCHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yo
 
Information Technology Security Techniques Evaluation Criteria For It Secrit...
Information Technology  Security Techniques Evaluation Criteria For It Secrit...Information Technology  Security Techniques Evaluation Criteria For It Secrit...
Information Technology Security Techniques Evaluation Criteria For It Secrit...
 
Computer system validation
Computer system validation Computer system validation
Computer system validation
 
Slides chapters 26-27
Slides chapters 26-27Slides chapters 26-27
Slides chapters 26-27
 
V&V Considerations In Implementing IEC61508-3
V&V Considerations In Implementing IEC61508-3V&V Considerations In Implementing IEC61508-3
V&V Considerations In Implementing IEC61508-3
 
SQA Lecture 01 (Introduction) - Testing and SQA
SQA Lecture 01 (Introduction) - Testing and SQASQA Lecture 01 (Introduction) - Testing and SQA
SQA Lecture 01 (Introduction) - Testing and SQA
 
EVALUATING SOFTWARE QUALITY : A QUANTITATIVE APPROACH
EVALUATING SOFTWAREQUALITY : A QUANTITATIVEAPPROACHEVALUATING SOFTWAREQUALITY : A QUANTITATIVEAPPROACH
EVALUATING SOFTWARE QUALITY : A QUANTITATIVE APPROACH
 
Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROsWebinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
 
Software_Verification_and_Validation.ppt
Software_Verification_and_Validation.pptSoftware_Verification_and_Validation.ppt
Software_Verification_and_Validation.ppt
 
Overview of Software QA and What is Software Quality
Overview of Software QA and What is Software QualityOverview of Software QA and What is Software Quality
Overview of Software QA and What is Software Quality
 
System testing
System testingSystem testing
System testing
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 
Software engineering
Software  engineeringSoftware  engineering
Software engineering
 
IT8076 – Software Testing Intro
IT8076 – Software Testing IntroIT8076 – Software Testing Intro
IT8076 – Software Testing Intro
 
Project Pluto Will Adopt The Incremental Build Model Essay
Project Pluto Will Adopt The Incremental Build Model EssayProject Pluto Will Adopt The Incremental Build Model Essay
Project Pluto Will Adopt The Incremental Build Model Essay
 
T0 numtq0nje=
T0 numtq0nje=T0 numtq0nje=
T0 numtq0nje=
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Verifikasi dan Validasi keamanan informasi

  • 1. Verifikasi dan Validasi Keamanan Informasi Agung Sediyono, Ir.,MT, Ph.D
  • 2. Verification & Validation the process of checking that a product, service, or system meets specifications and that it fulfills its intended purpose. These are critical components of a quality management system such as ISO 9000. Sometimes preceded with "Independent" (or IV&V) to ensure the validation is performed by a disinterested third party.
  • 3. Verification Quality control process that is used to evaluate whether or not a product, service, or system complies with regulations, specifications, or conditions imposed at the start of a development phase. Verification can be in development, scale-up, or production. This is often an internal process
  • 4. Validation Quality assurance process of establishing evidence that provides a high degree of assurance that a product, service, or system accomplishes its intended requirements. This often involves acceptance of fitness for purpose with end users and other product stakeholders
  • 5. Evaluation a) analysis and checking of process(es) and procedure(s); b) checking that process(es) and procedure(s) are being applied; c) analysis of the correspondence between TOE design representations; d) analysis of the TOE design representation against the requirements; e) verification of proofs; f) analysis of guidance documents; g) analysis of functional tests developed and the results provided; h) independent functional testing; i) analysis for vulnerabilities (including flaw hypothesis); j) penetration testing.
  • 6.
  • 7.
  • 8. CC Paradigm System Acquisition Observations Regarding Paradigm Commonality Among CC and Acquisition Paradigms Protection Profile (PP) Request for Proposals Provides customer desires, needs, and requirements: "What is wanted" Security Target (ST) Proposals Indicates how the above will be satisfied by suppliers: "What will be provided" Target of Evaluation Delivered System Is the supplier's physical (TOE) manifestation of above Evaluated System Accepted System Shows that the three preceding representations are sufficiently consistent
  • 9.
  • 10.
  • 11. Significant of Vulneralability a) eliminated -- that is, active steps should be taken to expose, and remove or neutralize, all exercisable vulnerabilities; b) minimised -- that is, active steps should be taken to reduce, to an acceptable residual level, the potential impact of any exercise of a vulnerability; c) monitored -- that is, active steps should be taken to ensure that any attempt to exercise a residual vulnerability will be detected so that steps can be taken to limit the damage
  • 12. Cause of Vulneralability a) requirements -- that is, an IT product may possess all the functions and features required of it and still contain vulnerabilities that render it unsuitable or ineffective with respect to security; b) development -- that is, an IT product does not meet its specifications and/or vulnerabilities have been introduced as a result of poor development standards or incorrect design choices; c) operation -- that is, an IT product has been constructed correctly to a correct specification but vulnerabilities have been introduced as a result of inadequate controls upon the operation
  • 13. CC: Level Penjaminan Evaluasi (EAL)  EAL1 : Fuctionality Tested  EAL2 : Structurally Tested  EAL3 : Methodically tested and checked  EAL4 : Methodically designed, tested, and reviewed  EAL5 : Semi-formally designed and tested  EAL6 : Semi-formally verified, designed, and tested  EAL7 : Formally verified, designed, and tested. Diterapkan sesuai dengan keadaan atau kriteria yang ditetapkan oleh kebutuhan pemakai.
  • 14. OWASP Level (Khusus u aplikasi) Level 1 : Verifikasi Otomatis 1A: Pemindaian Dinamis 1B: Pemindaian Kode Sumber Level 2 : Verifikasi Manual 2A: Uji Keamanan 2B: Code Review Level 3 : Verifikasi Desain Level 4 : Verifikasi Internal
  • 15. Class in CC  Security Audit  Communication  Cryptographic  User Data Protection  Identification and Authentication  Security Management  Privacy  Protection of TSF  Resource Utilization  TOE Access  Trusted Path/Channel
  • 16. Class in ASVS  Security Architecture  Authentication  Session Management  Access Control  Input Validation  Coding  Cryptography  Error Handling and Logging  Data Protection  Communication Security  HTTP Security  Security Configuration  Malicious Finding  Internal Security
  • 17.
  • 18. Information Security Testing and Assesment Methodology (NIST,2008)  Planning  Information gathering about TOE, Ancaman, pengendalian akses menangani ancaman, pendekatan evaluasi.  Pembuatan manajemen proyek untuk mencapai tujuan , lingkup, kebutuhan, peran dan tanggung jawab tim, batasan, indikator sukses, asumsi, sumber daya, timeline dan delivery.  Execution  Indentifikasi vulnerability dan melakukan validasi dengan benar.  Menjalankan metode dan teknik penilaian keamanan.  Hasil akhir berupa identifikasi vulnerability pada system komputer dan proses organisasi.  Post-Execution  Analysis dan identifikasi vulnerability untuk menentukan akar masalah, penetapan rekomendasi mitigasi, dan pembuatan laporan akhir.
  • 19. Teknik Penilaian Review  Teknik pemeriksaan yang digunakan untuk mengevaluasi sistem, aplikasi, jaringan, kebijakan, prosedur untuk mencari vulnerability Identifikasi dan Analysis Target  Identifikasi sistem, port, service, potensi vulnerability  Bisa dilakukan secara manual atau menggunakan alat Validasi Vunerability Target  Pembuktian Vulnerability yang ditemukan  Ex: password cracking, penetration testing, dan social engineering
  • 21. Identifikasi Network Discovery Network Port dan Services Scanning Vulnerability Scanning Wireless Scanning Passive Wireless Scanning Active Wireless Scanning Wireless Device Locating Tracking Bluetooth Scanning
  • 23.
  • 25.
  • 26. Trifecta How do current Operation Work?  Penggunaan metrik untuk menentukan domain masalah How do they work differently from how management think they works?  Akses ke kebijakan dan trust/resiko penilaian dimap ke metrik masalah How do they need to work?  Kalau ada gap antara metrik dan kebijakan atau resiko penilaian
  • 27.
  • 28. Methodology (OSSTM) 1. Passively collect data of normal operations to comprehend the target. 2. Actively test operations by agitating operations beyond the normal baseline. 3. Analyze data received directly from the operations tested. 4. Analyze indirect data from resources and operators (i.e. workers, programs). 5. Correlate and reconcile intelligence from direct (step 3) and indirect (step 4) data test results to determine operational security processes. 6. Determine and reconcile errors. 7. Derive metrics from both normal and agitated operations. 8. Correlate and reconcile intelligence between normal and agitated (steps 1 and 2) operations todetermine the optimal level of protection and control which would best be implemented. 9. Map the optimal state of operations (step 8) to processes (step 5). 10. Create a gap analysis to determine what enhancements are needed for processes governingnecessary protection and controls (step 5) to achieve the optimal operational state (step 8) from the current one.
  • 29. 6 langkah Analisis Keamanan 1. Build your knowledge of the target from a variety of the most contemporary, factual resources while avoiding commercially biased and speculative information. 2. Determine the global level of experience for the type of target and the amount of information possibly known about it. 3. Determine any bias or ulterior motives in the information sources. 4. Translate jargon from information sources to similar or known words for comparison because what may sound new or complicated may just be a trick to differentiate something common. 5. Be sure the test equipment has been properly calibrated and the test environment verified to assure the results are not contaminated by the test itself. 6. Assure that the translation state of tools or test processes has been removed as much as possible so that the results do not come from the indirect sources in a process or the pre-analysis from some tools.
  • 30. Keputusan Verifiksi Unknown Untested Target Identified and Verified Limitation False Positive and The means to generate them Failed Security Process and Procedure Good Practices Compliance
  • 31. Network Sniffing  Merekam semua trafik jaringan untuk bahan analisis  Tools  TCPDUMP  WIRESHARK/TSHARK  Penempatan peralatan menjadi penting karena harus betul-betul dapat menyadap komunikasi yang diinginkan  Harus dipasang setempat, tidak dapat secara remote  Contoh teknologi NetFlow dapat dilakukan secara remote
  • 32. Network Discovery  Test Target yang hidup  Simple test using ‘ping’, fail to detect firewall because firewall reject ping request.
  • 33. Port and Services Scanning  Try for all possible ports, 1 – 11000 for example  Test using standart communication to determine TCP or UDP  TCP test  Send SYN packet to target  Target replay by sending ACK packet  Send SYN ACK to target to start communication  Connection established.  UDP Test  If send UDP packet is not response assumed the port open  If send UDP packet is response assumed the port is closed or open but not UDP services  Tools: Nmap and Hping