Cyber-6 Cyberspace. Cyberthreat.Cyberattack. Cybersecurity. Cybercrime. Cyberlaw. Prof. Dr. Ir.   Richardus Eko Indrajit  MSc, MBA, MA/Msi, MPhil, ACPM, CWM, ICWM, CEH Website:  http://eko-indrajit.info  Email:  [email_address]   Chairman of ID-SIRTII and APTIKOM
Knowledge Domain
Cyber Space
Cyberspace. A reality community between PHYSICAL WORLD and ABSTRACTION WORLD 1.4 billion of real human population (internet users) Trillion US$ of potential commerce value Billion business transactions per hour in 24/7 mode Internet is a VALUABLE thing indeed. Risk is embedded within.
Information Roles Why information? It consists of important data and facts (news, reports, statistics, transaction, logs, etc.) It can create perception to the public (market, politics, image, marketing, etc.) It represents valuable assets (money, documents, password, secret code, etc.) It is a raw material of knowledge (strategy, plan, intelligence, etc.)  05/25/11 The Brief Profile of ID-SIRTII
What is Internet ? A giant network of networks where people exchange information through various different digital-based ways: 05/25/11 The Brief Profile of ID-SIRTII  “…  what is the value of internet ???” Email Mailing List Website Chatting Newsgroup Blogging E-commerce E-marketing E-government
Cyber Threat
Cyberthreat. The trend has increased in an exponential rate mode Motives are vary from recreational to criminal purposes Can caused significant economic losses and political suffers Difficult to mitigate web defacement  information leakage  phishing  intrusion  Dos/DDoS SMTP relay  virus infection  hoax  malware distribution  botnet  open proxy root access  theft  sql injection  trojan horse  worms  password cracking spamming  malicious software  spoofing  blended attack Threats are there to stay. Can’t do so much about it.
International Issues What Does FBI Say About Companies: 91% have detected employee abuse 70% indicate the Internet as a frequent attack point 64% have suffered financial losses 40% have detected attacks from outside 36% have reported security incidents Source: FBI Computer Crime and Security Survey 2001 05/25/11 The Brief Profile of ID-SIRTII
Underground Economy 05/25/11 The Brief Profile of ID-SIRTII
Growing Vulnerabilities 05/25/11 The Brief Profile of ID-SIRTII  * Gartner “CIO Alert: Follow Gartner’s Guidelines for Updating Security on Internet Servers, Reduce Risks.” J. Pescatore, February 2003 ** As of  2004, CERT/CC no longer tracks Security Incident statistics. “ Through 2008, 90 percent of successful hacker attacks will exploit well-known software vulnerabilities.”  - Gartner*
Potential Threats Unstructured Threats Insiders Recreational Hackers Institutional Hackers Structured Threats Organized Crime Industrial Espionage Hacktivists National Security Threats Terrorists Intelligence Agencies  Information Warriors 05/25/11 The Brief Profile of ID-SIRTII
Cyber Attack
Cyberattack. Too many attacks have been performed within the cyberspace. Most are triggered by the cases in the real world. The eternal wars and battles have been in towns lately. Estonia notorious case has opened the eyes of all people in the world. Attack can occur anytime and anyplace without notice.
 
 
 
 
 
Attacks Sophistication 05/25/11 The Brief Profile of ID-SIRTII  High Low 1980 1985 1990 1995 2005 Intruder Knowledge Attack Sophistication Cross site scripting password guessing self-replicating code password cracking exploiting known vulnerabilities disabling audits back doors hijacking  sessions sweepers sniffers packet spoofing GUI automated probes/scans denial of service www attacks Tools “ stealth” / advanced scanning techniques burglaries network mgmt. diagnostics distributed attack tools Staged Auto Coordinated
Vulnerabilities Exploit Cycle 05/25/11 The Brief Profile of ID-SIRTII  Advanced Intruders Discover New Vulnerability Crude Exploit Tools Distributed Novice Intruders Use Crude Exploit Tools Automated Scanning/Exploit Tools Developed Widespread Use  of Automated  Scanning/Exploit  Tools Intruders Begin  Using New Types  of Exploits Highest Exposure Time # Of Incidents
Cyber Security
Cybersecurity. Lead by ITU for international domain, while some standards are introduced by different institution (ISO, ITGI, ISACA, etc.) “ Your security is my security” – individual behavior counts while various collaborations are needed Education, value, and ethics  are the best defense approaches.
Risk Management Aspect 05/25/11 The Brief Profile of ID-SIRTII  Risk Vulnerabilities Threats Controls Security  Requirements Asset  Values Assets Protect against Exploit Reduce Increase Indicate Increase Expose Have Decrease Met by Impact on Organisation
Strategies for Protection 05/25/11 The Brief Profile of ID-SIRTII  Protecting Information Protecting Infrastructure Protecting Interactions
Mandatory Requirements “ Critical infrastructures are those physical and cyber-based systems essential to the minimum operations of the economy and government.  These systems are so vital, that their incapacity or destruction would have a debilitating impact on the defense or economic security of the nation.” Agriculture & Food, Banking & Finance, Chemical, Defense Industrial Base, Drinking Water and Wastewater Treatment Systems, Emergency Services, Energy, Information Technology, Postal & Shipping, Public Health & Healthcare, Telecommunications, Transportation Systems 05/25/11 The Brief Profile of ID-SIRTII
Information Security Disciplines Physical security Procedural security Personnel security Compromising emanations security Operating system security Communications security    a failure in any of these areas can undermine the security of a system  05/25/11 The Brief Profile of ID-SIRTII
Best Practice Standard 05/25/11 The Brief Profile of ID-SIRTII  BS7799/ISO17799 Access Controls Asset  Classification Controls Information  Security Policy Security  Organisation Personnel Security Physical Security Communication & Operations  Mgmt System  Development &  Maint. Bus. Continuity Planning Compliance Information Integrity Confidentiality Availability 1 2 3 4 5 6 7 8 9 10
Cyber Crime
Cybercrime. Globally defined as INTERCEPTION, INTERRUPTION, MODIFICATION, and FABRICATION Virtually involving inter national boundaries and multi resources Intentionally targeting to fulfill special objective(s) Convergence in nature with intelligence efforts.  Crime has intentional objectives. Stay away from the bull’s eye.
The Crime Scenes 05/25/11 The Brief Profile of ID-SIRTII  IT as a Tool IT as a Storage Device IT as a Target
Type of Attacks 05/25/11 The Brief Profile of ID-SIRTII
Malicious Activities 05/25/11 The Brief Profile of ID-SIRTII
Motives of Activities Thrill Seekers  Organized Crime  Terrorist Groups Nation-States 05/25/11 The Brief Profile of ID-SIRTII
Cyber Law Cyberspace. Cyberthreat.Cyberattack. Cybersecurity. Cybercrime. Cyberlaw.
Cyberlaw. Difficult to keep updated as technology trend moves Different stories between the rules and enforcement efforts Require various infrastructure, superstructure, and resources Can be easily “out-tracked” by law practitioners  Cyberlaw is here to protect you. At least playing role in mitigation.
The Crime Scenes 05/25/11 The Brief Profile of ID-SIRTII  IT as a Tool IT as a Storage Device IT as a Target
First Cyber Law in Indonesia. Range of penalty: Rp 600 million - Rp 12 billion (equal to US$ 60,000 to US$ 1,2 million) 6 to 12 years in prison (jail) starting from 25 March 2008 Picture: Indonesia Parliament in Session
Main Challenge. ILLEGAL “…  the distribution of illegal materials within  the internet …” ILLEGAL “…  the existence of source with illegal materials that can be accessed through the internet …”
ID-SIRTII Indonesia Security Incident Response Team on Internet Infrastructure
ID-SIRTII Mission and Objectives. “ To expedite the economic growth of the country through  providing the society with secure internet environment within the nation ” 1. Monitoring internet traffic for incident handling purposes. 2. Managing log files to support law enforcement. 3. Educating public for security awareness. 4. Assisting institutions in managing security. 5. Providing training to constituency and stakeholders. 6. Running laboratory for simulation practices. 7. Establishing external and international collaborations.
Constituents and Stakeholders. Government of Indonesia ID-SIRTII ISPs NAPs IXs Law Enforcement National Security Communities International CSIRTs/CERTs Corporate Users Individual Users Lawyers and Legal Practitioners Polices Prosecutors Judges FIRST and APCERT Country’s CSIRTs/CERTs ICT Related Associationsa and Vendors Other CSIRTs and CERTs sponsor
Coordination Structure. ID-SIRTII (CC) as National CSIRT Sector CERT Internal CERT Vendor CERT Commercial CERT Bank CERT Airport CERT University CERT GOV CERT Military CERT SOE CERT SME CERT Telkom CERT BI CERT Police CERT KPK CERT Lippo CERT KPU CERT Pertamina CERT Hospital CERT UGM CERT Cisco CERT Microsoft CERT Oracle CERT SUN CERT IBM CERT SAP CERT Yahoo CERT Google CERT A CERT B CERT C CERT D CERT E CERT F CERT G CERT H CERT Other CERTs Other CERTs Other CERTs Other CERTs
Major Tasks. INCIDENT HANDLING DOMAIN and ID-SIRTII MAIN TASKS Reactive Services Proactive Services Security Quality Management Services 1. Monitoring traffic Alerts and Warnings Announcements Technology Watch Intrusion Detection Services x 2. Managing log files Artifact Handling x x 3. Educating public x x Awareness Building 4. Assisting institutions Security-Related Information  Dissemnination Vulnerability Handling Intrusion Detection Services Security Audit and Assessment Configuration and Maintenenace of Security Tools, Applications, and Infrastructure Security Consulting 5. Provide training x X Education Training 6. Running laboratory x x Risk Analysis BCP and DRP 7. Establish collaborations Incident Handling x Product Evaluation
Incidents Definition and Samples. web defacement  information leakage  phishing  intrusion  Dos/DDoS SMTP relay  virus infection  hoax  malware distribution  botnet  open proxy root access  theft  sql injection  trojan horse  worms  password cracking spamming  malicious software  spoofing  blended attack “ one or more intrusion events that you suspect are involved in a possible violation of your security policies ” “ an event that has caused or has the potential to cause damage to an organization's business systems, facilities, or personnel” “ any occurrence or series of occurrences having the same origin that results in the discharge or substantial threat ” “ an undesired event that could have resulted in harm to people, damage to property, loss to process, or harm to the environment. ”
Priorities on Handling Incidents. TYPE OF INCIDENT AND ITS PRIORITY Public Safety and National Defense (Very Priority) Economic Welfare (High Priority) Political Matters (Medium Priority) Social and Culture Threats (Low Priority) 1. Interception Many to One  One to Many Many to Many Automated Tool (KM-Based Website) 2. Interruption Many to One One to Many Many to Many Automated Tool (KM-Based Website) 3. Modification Many to One  One to Many Many to Many Automated Tool (KM-Based Website) 4. Fabrication Many to One One to Many Many to Many Automated Tool (KM-Based Website)
Core Chain of Processes. Response and Handle Incidents Report on Incident Handling Management Process and Research Vital Statistics Supporting Activities Core Process Establish External and International Collaborations Run Laboratory for Simulation Practices Provide Training to Constituency and Stakeholders Assist Institutions in Managing Security Educate Public for Security Awareness
Legal Framework. Undang-Undang No.36/1999 regarding National Telecommunication Industry Peraturan Pemerintah No.52/2000 regarding Telecommunication Practices Peraturan Menteri Kominfo No.27/PER/M.KOMINFO/9/2006 regarding Security on IP-Based Telecommunication Network Management Peraturan Menteri No.26/PER/M.KOMINFO/2007 regarding Indonesian Security Incident Response Team on Internet Infrastructure New Cyberlaw on Information and Electronic Transaction
Holistic Framework. SECURE INTERNET INFRASTRUCTURE ENVIRONMENT People Process Technology Log File Management System Traffic Monitoring System Incident Indication Analysis Incident Response. Management Advisory Board Executive Board M ONITOR  -  A NALYSIS  -  Y ELL  -  D ETECT  -  A LERT  -  Y IELD STAKEHOLDERS COLLABORATION AND SUPPORT NATIONAL REGULATION AND GOVERNANCE STRONG INSTITUTIONAL RELATIONSHIPS AND COMMITMENT
Challenges to ID-SIRTII Activities. Prevention “ Securing” internet-based transactions Reducing the possibilities of successful attacks Working together with ISP to inhibit the distribution of illegal materials Reaction Preserving digital evidence for law enforcement purposes Providing technical advisory for further mitigation process Quality Management Increasing public awareness level Ensuring security level in critical infrastructure institutions
Work Philosophy. Why does a car have BRAKES ??? The car have  BRAKES  so that it can go  FAST  … !!! Why should we have regulation? Why should we establish institution? Why should we collaborate with others? Why should we agree upon mechanism? Why should we develop procedures?  Why should we have standard? Why should we protect our safety? Why should we manage risks? Why should we form response team?
Welcome to the New World. Congratulation! Richardus Eko Indrajit  indrajit@post.harvard.edu  Chairman of ID-SIRTII and APTIKOM

More Related Content

PPT
Top 10 Security Challenges
PDF
Key Findings from the 2015 IBM Cyber Security Intelligence Index
PDF
True Cost of Data Breaches
PDF
Combating cyber crimes chinatu
PDF
Practical approach to combating cyber crimes
PDF
Pivotal Role of HR in Cybersecurity
PPTX
Information Security vs IT - Key Roles & Responsibilities
PDF
Cybersecurity | Risk. Impact. Innovations.
Top 10 Security Challenges
Key Findings from the 2015 IBM Cyber Security Intelligence Index
True Cost of Data Breaches
Combating cyber crimes chinatu
Practical approach to combating cyber crimes
Pivotal Role of HR in Cybersecurity
Information Security vs IT - Key Roles & Responsibilities
Cybersecurity | Risk. Impact. Innovations.

What's hot (17)

PDF
Understanding Identity Management and Security.
PDF
ICION 2016 - Cyber Security Governance
PPT
Compliance Awareness
PPTX
Cyber Security Landscape: Changes, Threats and Challenges
PDF
Top Cyber Security Trends for 2016
PPT
Challenges in implementating cyber security
PPTX
Summer internship - Cybersecurity
PPTX
cybersecurity strategy planning in the banking sector
PPTX
Cyber Crime Threat Landscape - A Focus on the Financial Industry
PPTX
Need for Improved Critical Industrial Infrastructure Protection
PDF
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
PDF
Cyber Security Strategies and Approaches
PDF
Information Security Management Education Program - Concept Document
PDF
Why Executives Underinvest In Cybersecurity
PDF
Information Security It's All About Compliance
PDF
Steganography - Muheeb Ghallab
PDF
Using international standards to improve Asia-Pacific cyber security
Understanding Identity Management and Security.
ICION 2016 - Cyber Security Governance
Compliance Awareness
Cyber Security Landscape: Changes, Threats and Challenges
Top Cyber Security Trends for 2016
Challenges in implementating cyber security
Summer internship - Cybersecurity
cybersecurity strategy planning in the banking sector
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Need for Improved Critical Industrial Infrastructure Protection
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Security Strategies and Approaches
Information Security Management Education Program - Concept Document
Why Executives Underinvest In Cybersecurity
Information Security It's All About Compliance
Steganography - Muheeb Ghallab
Using international standards to improve Asia-Pacific cyber security
Ad

Similar to Cyber Six: Managing Security in Internet (20)

PDF
IRJET- Cybersecurity: The Agenda for the Decade
PPTX
Cybersecurity by the numbers
PDF
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
PDF
Cyber Security Challenges and Emerging Trends
PDF
Internet safety and security strategies for building an internet safety wall
PDF
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
PDF
Cyber Security Intelligence
PPTX
Cyber security
PDF
Cyber security general perspective a
PPTX
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
PDF
DNS Cybersecurity in 2012-2015
PDF
Cyber+Security+Fundamentals.pdf.....network security
PDF
20101012 isa larry_clinton
PDF
American Bar Association guidelines on Cyber Security standards
PPTX
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
PDF
Day 1 Enisa Setting Up A Csirt
PDF
internet security and cyber lawUnit1
PPTX
CRI "Lessons From The Front Lines" March 26th Dublin
PPTX
Cyber security by Gaurav Singh
PPTX
Cyber Threat Overview for Euro IT counsel
IRJET- Cybersecurity: The Agenda for the Decade
Cybersecurity by the numbers
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
Cyber Security Challenges and Emerging Trends
Internet safety and security strategies for building an internet safety wall
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
Cyber Security Intelligence
Cyber security
Cyber security general perspective a
Managing High-Volume Cyber Attacks Through Effective Strategies in Indonesia
DNS Cybersecurity in 2012-2015
Cyber+Security+Fundamentals.pdf.....network security
20101012 isa larry_clinton
American Bar Association guidelines on Cyber Security standards
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
Day 1 Enisa Setting Up A Csirt
internet security and cyber lawUnit1
CRI "Lessons From The Front Lines" March 26th Dublin
Cyber security by Gaurav Singh
Cyber Threat Overview for Euro IT counsel
Ad

More from Richardus Indrajit (9)

PPT
E-Learning Concept for University
PPT
Six Seamless Steps for IS Integration
PPT
ICT Governance
PPT
Digital Invention
PPT
ICT Roles in Media Print Industry
PPTX
ICT for Tourism
PPT
Cyber City Concept
PPT
ICT Product Innovation
PPTX
10 Aksioma Internet Sehat dan Aman
E-Learning Concept for University
Six Seamless Steps for IS Integration
ICT Governance
Digital Invention
ICT Roles in Media Print Industry
ICT for Tourism
Cyber City Concept
ICT Product Innovation
10 Aksioma Internet Sehat dan Aman

Recently uploaded (20)

PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Statistics on Ai - sourced from AIPRM.pdf
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
DOCX
search engine optimization ppt fir known well about this
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Consumable AI The What, Why & How for Small Teams.pdf
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Flame analysis and combustion estimation using large language and vision assi...
NewMind AI Weekly Chronicles – August ’25 Week IV
Statistics on Ai - sourced from AIPRM.pdf
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
Build Your First AI Agent with UiPath.pptx
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Rapid Prototyping: A lecture on prototyping techniques for interface design
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
search engine optimization ppt fir known well about this
Basics of Cloud Computing - Cloud Ecosystem
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Improvisation in detection of pomegranate leaf disease using transfer learni...
Lung cancer patients survival prediction using outlier detection and optimize...
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf

Cyber Six: Managing Security in Internet

  • 1. Cyber-6 Cyberspace. Cyberthreat.Cyberattack. Cybersecurity. Cybercrime. Cyberlaw. Prof. Dr. Ir. Richardus Eko Indrajit MSc, MBA, MA/Msi, MPhil, ACPM, CWM, ICWM, CEH Website: http://eko-indrajit.info Email: [email_address] Chairman of ID-SIRTII and APTIKOM
  • 4. Cyberspace. A reality community between PHYSICAL WORLD and ABSTRACTION WORLD 1.4 billion of real human population (internet users) Trillion US$ of potential commerce value Billion business transactions per hour in 24/7 mode Internet is a VALUABLE thing indeed. Risk is embedded within.
  • 5. Information Roles Why information? It consists of important data and facts (news, reports, statistics, transaction, logs, etc.) It can create perception to the public (market, politics, image, marketing, etc.) It represents valuable assets (money, documents, password, secret code, etc.) It is a raw material of knowledge (strategy, plan, intelligence, etc.) 05/25/11 The Brief Profile of ID-SIRTII
  • 6. What is Internet ? A giant network of networks where people exchange information through various different digital-based ways: 05/25/11 The Brief Profile of ID-SIRTII “… what is the value of internet ???” Email Mailing List Website Chatting Newsgroup Blogging E-commerce E-marketing E-government
  • 8. Cyberthreat. The trend has increased in an exponential rate mode Motives are vary from recreational to criminal purposes Can caused significant economic losses and political suffers Difficult to mitigate web defacement information leakage phishing intrusion Dos/DDoS SMTP relay virus infection hoax malware distribution botnet open proxy root access theft sql injection trojan horse worms password cracking spamming malicious software spoofing blended attack Threats are there to stay. Can’t do so much about it.
  • 9. International Issues What Does FBI Say About Companies: 91% have detected employee abuse 70% indicate the Internet as a frequent attack point 64% have suffered financial losses 40% have detected attacks from outside 36% have reported security incidents Source: FBI Computer Crime and Security Survey 2001 05/25/11 The Brief Profile of ID-SIRTII
  • 10. Underground Economy 05/25/11 The Brief Profile of ID-SIRTII
  • 11. Growing Vulnerabilities 05/25/11 The Brief Profile of ID-SIRTII * Gartner “CIO Alert: Follow Gartner’s Guidelines for Updating Security on Internet Servers, Reduce Risks.” J. Pescatore, February 2003 ** As of 2004, CERT/CC no longer tracks Security Incident statistics. “ Through 2008, 90 percent of successful hacker attacks will exploit well-known software vulnerabilities.” - Gartner*
  • 12. Potential Threats Unstructured Threats Insiders Recreational Hackers Institutional Hackers Structured Threats Organized Crime Industrial Espionage Hacktivists National Security Threats Terrorists Intelligence Agencies Information Warriors 05/25/11 The Brief Profile of ID-SIRTII
  • 14. Cyberattack. Too many attacks have been performed within the cyberspace. Most are triggered by the cases in the real world. The eternal wars and battles have been in towns lately. Estonia notorious case has opened the eyes of all people in the world. Attack can occur anytime and anyplace without notice.
  • 15.  
  • 16.  
  • 17.  
  • 18.  
  • 19.  
  • 20. Attacks Sophistication 05/25/11 The Brief Profile of ID-SIRTII High Low 1980 1985 1990 1995 2005 Intruder Knowledge Attack Sophistication Cross site scripting password guessing self-replicating code password cracking exploiting known vulnerabilities disabling audits back doors hijacking sessions sweepers sniffers packet spoofing GUI automated probes/scans denial of service www attacks Tools “ stealth” / advanced scanning techniques burglaries network mgmt. diagnostics distributed attack tools Staged Auto Coordinated
  • 21. Vulnerabilities Exploit Cycle 05/25/11 The Brief Profile of ID-SIRTII Advanced Intruders Discover New Vulnerability Crude Exploit Tools Distributed Novice Intruders Use Crude Exploit Tools Automated Scanning/Exploit Tools Developed Widespread Use of Automated Scanning/Exploit Tools Intruders Begin Using New Types of Exploits Highest Exposure Time # Of Incidents
  • 23. Cybersecurity. Lead by ITU for international domain, while some standards are introduced by different institution (ISO, ITGI, ISACA, etc.) “ Your security is my security” – individual behavior counts while various collaborations are needed Education, value, and ethics are the best defense approaches.
  • 24. Risk Management Aspect 05/25/11 The Brief Profile of ID-SIRTII Risk Vulnerabilities Threats Controls Security Requirements Asset Values Assets Protect against Exploit Reduce Increase Indicate Increase Expose Have Decrease Met by Impact on Organisation
  • 25. Strategies for Protection 05/25/11 The Brief Profile of ID-SIRTII Protecting Information Protecting Infrastructure Protecting Interactions
  • 26. Mandatory Requirements “ Critical infrastructures are those physical and cyber-based systems essential to the minimum operations of the economy and government. These systems are so vital, that their incapacity or destruction would have a debilitating impact on the defense or economic security of the nation.” Agriculture & Food, Banking & Finance, Chemical, Defense Industrial Base, Drinking Water and Wastewater Treatment Systems, Emergency Services, Energy, Information Technology, Postal & Shipping, Public Health & Healthcare, Telecommunications, Transportation Systems 05/25/11 The Brief Profile of ID-SIRTII
  • 27. Information Security Disciplines Physical security Procedural security Personnel security Compromising emanations security Operating system security Communications security  a failure in any of these areas can undermine the security of a system 05/25/11 The Brief Profile of ID-SIRTII
  • 28. Best Practice Standard 05/25/11 The Brief Profile of ID-SIRTII BS7799/ISO17799 Access Controls Asset Classification Controls Information Security Policy Security Organisation Personnel Security Physical Security Communication & Operations Mgmt System Development & Maint. Bus. Continuity Planning Compliance Information Integrity Confidentiality Availability 1 2 3 4 5 6 7 8 9 10
  • 30. Cybercrime. Globally defined as INTERCEPTION, INTERRUPTION, MODIFICATION, and FABRICATION Virtually involving inter national boundaries and multi resources Intentionally targeting to fulfill special objective(s) Convergence in nature with intelligence efforts. Crime has intentional objectives. Stay away from the bull’s eye.
  • 31. The Crime Scenes 05/25/11 The Brief Profile of ID-SIRTII IT as a Tool IT as a Storage Device IT as a Target
  • 32. Type of Attacks 05/25/11 The Brief Profile of ID-SIRTII
  • 33. Malicious Activities 05/25/11 The Brief Profile of ID-SIRTII
  • 34. Motives of Activities Thrill Seekers Organized Crime Terrorist Groups Nation-States 05/25/11 The Brief Profile of ID-SIRTII
  • 35. Cyber Law Cyberspace. Cyberthreat.Cyberattack. Cybersecurity. Cybercrime. Cyberlaw.
  • 36. Cyberlaw. Difficult to keep updated as technology trend moves Different stories between the rules and enforcement efforts Require various infrastructure, superstructure, and resources Can be easily “out-tracked” by law practitioners Cyberlaw is here to protect you. At least playing role in mitigation.
  • 37. The Crime Scenes 05/25/11 The Brief Profile of ID-SIRTII IT as a Tool IT as a Storage Device IT as a Target
  • 38. First Cyber Law in Indonesia. Range of penalty: Rp 600 million - Rp 12 billion (equal to US$ 60,000 to US$ 1,2 million) 6 to 12 years in prison (jail) starting from 25 March 2008 Picture: Indonesia Parliament in Session
  • 39. Main Challenge. ILLEGAL “… the distribution of illegal materials within the internet …” ILLEGAL “… the existence of source with illegal materials that can be accessed through the internet …”
  • 40. ID-SIRTII Indonesia Security Incident Response Team on Internet Infrastructure
  • 41. ID-SIRTII Mission and Objectives. “ To expedite the economic growth of the country through providing the society with secure internet environment within the nation ” 1. Monitoring internet traffic for incident handling purposes. 2. Managing log files to support law enforcement. 3. Educating public for security awareness. 4. Assisting institutions in managing security. 5. Providing training to constituency and stakeholders. 6. Running laboratory for simulation practices. 7. Establishing external and international collaborations.
  • 42. Constituents and Stakeholders. Government of Indonesia ID-SIRTII ISPs NAPs IXs Law Enforcement National Security Communities International CSIRTs/CERTs Corporate Users Individual Users Lawyers and Legal Practitioners Polices Prosecutors Judges FIRST and APCERT Country’s CSIRTs/CERTs ICT Related Associationsa and Vendors Other CSIRTs and CERTs sponsor
  • 43. Coordination Structure. ID-SIRTII (CC) as National CSIRT Sector CERT Internal CERT Vendor CERT Commercial CERT Bank CERT Airport CERT University CERT GOV CERT Military CERT SOE CERT SME CERT Telkom CERT BI CERT Police CERT KPK CERT Lippo CERT KPU CERT Pertamina CERT Hospital CERT UGM CERT Cisco CERT Microsoft CERT Oracle CERT SUN CERT IBM CERT SAP CERT Yahoo CERT Google CERT A CERT B CERT C CERT D CERT E CERT F CERT G CERT H CERT Other CERTs Other CERTs Other CERTs Other CERTs
  • 44. Major Tasks. INCIDENT HANDLING DOMAIN and ID-SIRTII MAIN TASKS Reactive Services Proactive Services Security Quality Management Services 1. Monitoring traffic Alerts and Warnings Announcements Technology Watch Intrusion Detection Services x 2. Managing log files Artifact Handling x x 3. Educating public x x Awareness Building 4. Assisting institutions Security-Related Information Dissemnination Vulnerability Handling Intrusion Detection Services Security Audit and Assessment Configuration and Maintenenace of Security Tools, Applications, and Infrastructure Security Consulting 5. Provide training x X Education Training 6. Running laboratory x x Risk Analysis BCP and DRP 7. Establish collaborations Incident Handling x Product Evaluation
  • 45. Incidents Definition and Samples. web defacement information leakage phishing intrusion Dos/DDoS SMTP relay virus infection hoax malware distribution botnet open proxy root access theft sql injection trojan horse worms password cracking spamming malicious software spoofing blended attack “ one or more intrusion events that you suspect are involved in a possible violation of your security policies ” “ an event that has caused or has the potential to cause damage to an organization's business systems, facilities, or personnel” “ any occurrence or series of occurrences having the same origin that results in the discharge or substantial threat ” “ an undesired event that could have resulted in harm to people, damage to property, loss to process, or harm to the environment. ”
  • 46. Priorities on Handling Incidents. TYPE OF INCIDENT AND ITS PRIORITY Public Safety and National Defense (Very Priority) Economic Welfare (High Priority) Political Matters (Medium Priority) Social and Culture Threats (Low Priority) 1. Interception Many to One One to Many Many to Many Automated Tool (KM-Based Website) 2. Interruption Many to One One to Many Many to Many Automated Tool (KM-Based Website) 3. Modification Many to One One to Many Many to Many Automated Tool (KM-Based Website) 4. Fabrication Many to One One to Many Many to Many Automated Tool (KM-Based Website)
  • 47. Core Chain of Processes. Response and Handle Incidents Report on Incident Handling Management Process and Research Vital Statistics Supporting Activities Core Process Establish External and International Collaborations Run Laboratory for Simulation Practices Provide Training to Constituency and Stakeholders Assist Institutions in Managing Security Educate Public for Security Awareness
  • 48. Legal Framework. Undang-Undang No.36/1999 regarding National Telecommunication Industry Peraturan Pemerintah No.52/2000 regarding Telecommunication Practices Peraturan Menteri Kominfo No.27/PER/M.KOMINFO/9/2006 regarding Security on IP-Based Telecommunication Network Management Peraturan Menteri No.26/PER/M.KOMINFO/2007 regarding Indonesian Security Incident Response Team on Internet Infrastructure New Cyberlaw on Information and Electronic Transaction
  • 49. Holistic Framework. SECURE INTERNET INFRASTRUCTURE ENVIRONMENT People Process Technology Log File Management System Traffic Monitoring System Incident Indication Analysis Incident Response. Management Advisory Board Executive Board M ONITOR - A NALYSIS - Y ELL - D ETECT - A LERT - Y IELD STAKEHOLDERS COLLABORATION AND SUPPORT NATIONAL REGULATION AND GOVERNANCE STRONG INSTITUTIONAL RELATIONSHIPS AND COMMITMENT
  • 50. Challenges to ID-SIRTII Activities. Prevention “ Securing” internet-based transactions Reducing the possibilities of successful attacks Working together with ISP to inhibit the distribution of illegal materials Reaction Preserving digital evidence for law enforcement purposes Providing technical advisory for further mitigation process Quality Management Increasing public awareness level Ensuring security level in critical infrastructure institutions
  • 51. Work Philosophy. Why does a car have BRAKES ??? The car have BRAKES so that it can go FAST … !!! Why should we have regulation? Why should we establish institution? Why should we collaborate with others? Why should we agree upon mechanism? Why should we develop procedures? Why should we have standard? Why should we protect our safety? Why should we manage risks? Why should we form response team?
  • 52. Welcome to the New World. Congratulation! Richardus Eko Indrajit [email protected] Chairman of ID-SIRTII and APTIKOM