Indonesia National Cyber Security Strategy
2
OUTLINE
 The Strategic Roles of Indonesia ICT
 Indonesia ICT Numbers and Facts
 Three Dimensions of Cyber Threat
 Cases of Cyber Warfare/Attack
 Is Indonesia Under Attack???
 Obstacles and Challenges of Indonesia National Cyber
Security
 Six Priorities Strategy of Indonesia National Cyber Security
 Conclusion
3
THE STRATEGIC ROLES OF ICT FOR INDONESIA
ICT is an important
infrastructure for citizens
ICT is a trigger for economic
growth and productivity
ICT is a strategic sector and
Government valuable assets
4
INDONESIA IS THE 4TH LARGEST MOBILE SUBSCRIBERS
986 Juta
893 Juta
290 Juta
249 Juta 244 Juta 236 Juta
China India USA Indo Brazil Rusia
Jumlah Pelanggan Telepon Seluler Dunia - 2011
1st
2nd
3rd 4th 5th 6th
China India USA Indonesia Brazil Russia
With 249 million
subscribers in
2011, Indonesia is the
4th largest mobile
market in the world.
sources: cia.gov (last updated April 2013)
5
INDONESIA IS THE 8TH LARGEST INTERNET USERS
538 Juta
245 Juta
137 Juta
101 Juta
88 Juta
67 Juta 67 Juta
55 Juta 52 Juta 52 Juta
China USA India Japan Brazil Rusia Germany Indonesia UK France
Jumlah Pengguna Internet Dunia - 2011
1st
2nd
3rd
8th
4th
9th
5th 6th 7th 10th
China IndiaUSA IndonesiaBrazil RussiaJapan Germany UK France
sources: internetworldstats.com (last updated April 2013)
In 2011, the number of internet users in Indonesia is around 55 million.
Internet users in Indonesia also are highly social and active. Indonesia is the
3rd largest facebook users and the 5th largest twitter users in the world.
6
THREE DIMENSIONS OF CYBER THREAT/ATTACK
Cyber
threat/attack can
be divided into
three dimensions.
These threats
potentially
destroying the
economy and
destabilize the
country's security.
Social/
Cultural
Attack
Sources: Indonesia National ICT Council, DETIKNAS 2013
7
CASES OF CYBER WARFARE/ATTACK
STUXNET
Wikileaks
Estonia Cyber Attack 2007
Russia-Georgia
Cyber warfare 2008
And many
more...
8
IS INDONESIA UNDER ATTACK???
Over the last three
years, Indonesia was attacked
3,9 millions in cyber space.
(Sources: Minister of ICT, April
3rd, 2013).
During January-October
2012, The most attacked
website is Government
websites/domain: go.id
(Sources: ID-SIRTII, 2012).
Sources: ID-SIRTII
Sources: Detikinet, 2013
OBSTACLES AND CHALLENGES OF INDONESIA
NATIONAL CYBER SECURITY
Vision of Cyber
Security not
Intregated
Quantity and Quality of
Information Security Human
Resources are Limited
ICT Critical Infrastructure
Protection Mechanisms and
Standards not exist
Cyber Law and
Policy not
Completed
Governance and Organization
of National Cyber Security not
Synergized
Weakness of
Coordination and
Cooperation between
Agency
Application, Data and
Infrastructure of
Information Security not
Integrated
Lack of
Awareness in
Information
Security
Obstacles and
Challenges
of
National Cyber
Security
Sources: Indonesia National ICT Council, DETIKNAS 2013
101010
Indonesia National Cyber Security
Conceptual Framework (INCS)
10
Sources: Indonesia National ICT Council, Detiknas 2012
Availability
Integrity
Confidentiality
Sharedresponsibilities
OrganizationStructures
CapacityBuilding
InternationalCooperation
TechnicalandProcedural
Legal
Risk Management
Leadership
Partnership
Security Strategic Level
Security Operational Level
Security Tactical Level
Direct
Execute
Control
11
SIX PRIORITY STRATEGIES OF INDONESIA NATIONAL
CYBER SECURITY
Strengthe-
ning Policies
and
Regulations
Establishment
of Governance
and
Organization
Critical
Infrastructur
e Protection
Implementat
ion of System
and
Technology
Capacity
Building for
Human
Resources
International
Collaboration
and
Cooperation
Security and Sovereignty in Indonesia Cyber Space
Sources: Indonesia National ICT Council, DETIKNAS 2013
PRIORITY I: STRENGTHENING POLICIES AND REGULATIONS
POLICIES & REGULATIONS RELATED TO INFORMATION
SECURITY IN INDONESIA
Telecommunication Act No. 36/1999
Information Transaction Electronic Act No. 11/2008
Implementation Of Telecommunications Government Regulation No. 52/2000
Organizational structure of information security Ministerial Regulation PM
17/PER/M.KOMINFO
IP-based network security Ministerial Regulation No.
16/PER/M.KOMINFO/10/2010
CA Supervisory Board ad hoc team Ministerial Decree No.
197/KEP/M.KOMINFO/05/2010
Information security coordination team Ministerial Decree No.
33/KEP/M.KOMINFO/04/2010
Web server security Ministry Letter
Wifi Security Ministry Letter
Guidelines for the use of ISO 27001 Ministry Letter
National Act:2
Government Regulation:1
Ministerial Regulation:2
Ministerial Decree:2
Ministerial Letter:3
14
POLICIES & REGULATIONS RELATED TO INFORMATION
SECURITY IN INDONESIA (2)
Criminal cases related to cyber crime in Indonesia could also
be punished with:
– Criminal Procedural Law Codex (UU KUHAP),
– Pornography Act (UU Antipornografi No. 44/2008),
– Copyright Act (UU Hak Cipta No. 19/2002),
– Consumer Protection Act (UU Perlindungan Konsumen No.
8/1999).
15
POLICIES & REGULATIONS FRAMEWORK
Scope of Cyber Security Laws:
– e-Commerce;
– Trademark/Domain;
– Privasi dan keamanan di internet
(Privacy and Security on the
internet);
– Hak cipta (Copyright);
– Pencemaran nama baik
(Defamation);
– Pengaturan isi (Content Regulation);
– Penyelesaian Perselisihan (Dispel
Settlement).
– Infrastruktur TIK Kritis Nasional (ICT
Critical Infrastructure)
Substantive Law
Procedural Law
PrescribeJurisdiction
Prosecutorial Authority
Enforcement Responsibility
InternationalLawEnforcement
Cooperation
Sources: Indonesia National ICT Council, Detiknas 2012
PRIORITY II: ESTABLISHMENT OF GOVERNANCE AND
ORGANIZATION
17
THE CONCEPT OF NCS ORGANIZATION STRUCTURE
The Concept of
Indonesia NCS
organization structure
consists of multi-
organization.
INCS organization
contains of
skilled, proficient, and
experienced
employees with
prosperous
information security
knowledge inside their
parts of specialization.
Sources: Indonesia National ICT Council, DETIKNAS 2013
18
COMPARISON OF CYBER SECURITY ORGANIZATION
Level Australia UK Indonesia
Strategic Cyber Security Policy and Coordination Committee
(Lead Agency: The Attorney-General’s Department)
Function: interdepartmental committee that
coordinates the development of cyber security policy
for the
Australian Government.
Office of Cyber Security (OCS)
function: to provide strategic leadership for
and coherence across Government;
Undefined
Tactical Cyber Security Operations Centre (CSOC) (Under
Directorate: Defense Signals
Directorate)
Function: provides the Australian Government with
all-source cyber
situational awareness and an enhanced ability to
facilitate operational responses to cyber security
events of national importance.
Cyber Security Operations Centre (CSOC)
Function: actively monitor the health of cyber
space and co-ordinate incident response; to
enable better understanding of attacks against
UK networks and users; to provide better
advice and information about the risks to
business and the
public.
Undefined
Operational CERT
Australia
GovCertUK ID-SIRTII
GovCert
ID-Cert
19
INDONESIA NATIONAL CYBER SECURITY ORGANIZATION
STRUCTURE FRAMEWORK
Sources: Indonesia National ICT Council, DETIKNAS 2013
20
ORGANIZATION MAPPING RECOMENDATION
Protect cyberspace environment
Homeland Security
Preventive and capacity building
Intelligence
KEMKOMINFO BIN LEMSANEG KEMDIKBUD
Protect militer cyberspace
environment
Defense
KEMHAN TNI
Investigation and Prosecution of
criminal in cyberspace
Law Enforcement
POLRI
KEMENKOPOLHUKAM
Coordination
Coordinator
Coordinator-Incident Response Team
KEJAKSAAN
Gov-Cert ID-ACAD-CSIRT ID CERT ......
Sources:IndonesiaNationalICTCouncil,DETIKNAS2013
PRIORITY III: CRITICAL INFRASTRUCTURE PROTECTION
DEFINITION OF NATIONAL ICT CRITICAL INFRASTRUCTURES
ICT Critical National Infrastructures are assets, services, objects in
the form of phyical or logical that involving the livelihood of many
people, national interests and/or revenue of country that are
strategic, in case of threats and attacks cause more loss of
lives, destabilizing political, social, cultural and national economy
as well as the sovereignty of the nation. (DETIKNAS, 2013)
Criteria of the National Critical ICT Infrastructure must fulfill
one, some or all of the following characteristics:
– Threats and attacks resulted in disaster/many lost lives.
– Threats and attacks result in chaos in the national society.
– Threats and attacks cause disruption of governmental operation.
– Threats and attacks resulting in the loss of reputation, income and
state sovereignty.
23
IMPACT LEVEL OF CYBER ATTACK
Money,
Espionage,
Skills for Employment,
Fame,
Entertainment,
Hacktivism,
Terrorism and War
APT/Nation State
Insider
Terrorism
Criminals
Hacker Groups
Hacker
Noob/Script Kiddy
Actor(s)Motivation
Low
Medium
High
Impact Level
• may result in the highly costly loss of major tangible assets or
resources;
• may significantly violate, harm, or impede an organization’s
mission, reputation, or interest;
• may result in human death or serious injury.
• may result in the costly loss of tangible assets or resources;
• may violate, harm, or impede an organization’s
mission, reputation, or interest;
• may result in human injury.
• may result in the loss of some tangible assets or resources
• may noticeably affect an organization’s
mission, reputation, or interest.
Sources: Indonesia National ICT Council, DETIKNAS 2013
24
CRITICAL INFRASTRUCTURE SECTORS
Sector Lead Agency
Energi dan Sumberdaya Mineral Kementerian ESDM
ICT Kementerian Kominfo
Transportasi Kementerian Perhubungan
Kesehatan Kementerian Kesehatan
Pemerintahan Sekretariat Negara/Sekretariat
Kabinet
Keuangan dan Bank Kementerian Keuangan
Agrikultur Kementerian Pertanian
Pertahanan dan Industri Strategis Kementerian Pertahanan,
Kementerian BUMN
Administrasi dan Pelayanan Publik Kementerian Dalam Negeri,
Kementerian Hukum & HAM
Penegak Hukum POLRI, Kejaksaan RI, KPK
Sosial, Budaya dan Agama Kementerian Agama dan
Kementerian Sosial
Sources:IndonesiaNationalICTCouncil,DETIKNAS2013
PRIORITY IV: IMPLEMENTATION OF SYSTEM AND
TECHNOLOGY
LAYERS OF CYBER
 Implementation of
cyber security
technologies and
processes
performed at each
layers.
 Cyber ​​security at
every layer is called
defense in depth.
 Defense in Depth
strategy is to achieve
the main objectives
of security, namely
Availability, Integrity,
Confidentiality (AIC
Triad).
Data
Application
Host
Internal Network
External Network
IMPLEMENTATION OF DEFENSE IN DEPTH INFORMATION
SECURITY
External
Network
DMZ
Penetration
Testing
VPN
Logging
Auditing
Vulnerability
Analysis
Network
Perimeter
Firewalls
Penetration
Testing
Proxy
Logging
Auditing
Vulnerability
Analysis
Stateful Packet
Inspection
Internal
Network
IDS
Penetration
Testing
IPS
Logging
Auditing
Vulnerability
Analysis
Host
Authentication
Password Hashing
Antivirus
IDS
IPS
Logging
Auditing
Penetration
Testing
Vulnerability
Analysis
Application
SSO
Content Filtering
Auditing
Penetration
Testing
Data Validation
Vulnerability
Analysis
Data
Encryption
Access Controls
Penetration
Testing
Backup
Vulnerability
Analysis
Sources: Jason Andress, 2011 (modified)
28
NEXT GOVERNMENT TECHNOLOGY IMPLEMENTATION
RELATED TO NATIONAL CYBER SECURITY
Goverment Secure
Network
Government Public
Key Infrastructure
Government
Integrated Data
Center
PRIORITY V: CAPACITY BUILDING FOR HUMAN RESOURCES
BUILDING INTEGRATED AND SUISTAINED HUMAN
RESOURCES DEVELOPMENT PROGRAM
Sources: Indonesia National ICT Council, DETIKNAS 2013
CAPACITY BUILDING: AWARENESS
31
Awareness
One-way
communic
ation
Two-way
interactive
communic
ation
CAPACITY BUILDING: AWARENESS - ONE-WAY
COMMUNICATION
One-way
communication
(text, multimedia)
Film, Music, Poster, dll
Wide range, tends to
bore, relatively cheap
cost and affordable
Methods Object Effectively
CAPACITY BUILDING: AWARENESS - TWO-WAY
INTERACTIVE COMMUNICATION
Two-way interactive
communication
(hypermedia)
FGD, Interactive
Workshops, Video
Games, e-learning.
Limited range, to be
effective in changing
the culture of
behavior, cost of
expensive
Methods Object Effectively
PRIORITY VI: INTERNATIONAL COLLABORATION AND
COOPERATION
35
MEMBER OF INTERNATIONAL ORGANIZATION
Join, participate, and ratify with international collaboration
and cooperation.
Currently Indonesia become full member of:
– Asia Pacific and APCERT FIRST (Forum for Incident
Response and Security Team) of the world.
– Organisation of the Islamic Conference-CERT (OIC-CERT)
36
CONCLUSIONS
Securing Indonesia Cyberspace is essential to create
conducive and sustainability environment.
Indonesia Cyberspace has to be secured and sovereigned.
Indonesia needs a national cyber security strategy in order to
focus on the development cyber security program.
National Cyber Security is a very complex
problem, collaboration and cooperation with all stakeholders
are needed.
Organization of Indonesia National Cyber Security (I-NCS)
need to be established.
www.detiknas.org
info@detiknas.org
2013
37
Thank You

More Related Content

PDF
Global Cyber Threat Intelligence
PPTX
Cyber crime-in-bangladesh
PDF
Cyber security awareness presentation nepal
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
Security operation center
PPSX
Cyber crime and cyber security
PDF
Cyber Security Governance
PDF
Cek Privasi dan Keamanan Digital di Ponselmu
Global Cyber Threat Intelligence
Cyber crime-in-bangladesh
Cyber security awareness presentation nepal
Cybersecurity Attack Vectors: How to Protect Your Organization
Security operation center
Cyber crime and cyber security
Cyber Security Governance
Cek Privasi dan Keamanan Digital di Ponselmu

What's hot (20)

PPTX
Cyber security threats and trends
PDF
How To Present Cyber Security To Senior Management Complete Deck
PPTX
Social Media Cyber Security Awareness Briefing
PPTX
Employee Awareness in Cyber Security - Kloudlearn
PPSX
Board and Cyber Security
PPTX
Cybersecurity Awareness
PDF
INTERNATIONAL SECURITY MEASURES IN CYBERSPACE
PDF
Introduction to Cybersecurity
PDF
Building an effective Information Security Roadmap
PPTX
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
PDF
Budaya keamanan digital
PPT
PDF
Bulding Soc In Changing Threat Landscapefinal
PPTX
How to Use Open Source Intelligence (OSINT) in Investigations
PPTX
Cyber attacks and IT security management in 2025
PPTX
Cyber security
PDF
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
PPTX
Physical Security In The Workplace
PPTX
NotPetya Presentation
Cyber security threats and trends
How To Present Cyber Security To Senior Management Complete Deck
Social Media Cyber Security Awareness Briefing
Employee Awareness in Cyber Security - Kloudlearn
Board and Cyber Security
Cybersecurity Awareness
INTERNATIONAL SECURITY MEASURES IN CYBERSPACE
Introduction to Cybersecurity
Building an effective Information Security Roadmap
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Budaya keamanan digital
Bulding Soc In Changing Threat Landscapefinal
How to Use Open Source Intelligence (OSINT) in Investigations
Cyber attacks and IT security management in 2025
Cyber security
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Physical Security In The Workplace
NotPetya Presentation
Ad

Similar to Indonesia National Cyber Security Strategy (20)

PPTX
NGN integrated information security v3 DetikNas
PDF
The National Cyber Security Strategy: Success Through Cooperation
PPT
Cyber Six: Managing Security in Internet
PPTX
Cyber security , an Analysis of State Security in Sri Lanka
PDF
Is Cyber-offence the New Cyber-defence?
PDF
PDF
Cyber Security India & Cyber Crime
PDF
cybersecurity- A.Abutaleb
PPTX
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
PDF
Cyber Resilience and Critical Information Infrastructure Singapore Case Studi...
DOCX
RESEARCH PAPER
PDF
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
PDF
Singapore. industry 4.0 and cybersecurity
PPTX
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
PDF
Cyber Security Strategies and Approaches
PDF
Internet safety and security strategies for building an internet safety wall
PDF
Why the Private Sector is Key to Cyber Defence
PDF
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
PPTX
Cyber warfare Threat to Cyber Security by Prashant Mali
PPT
Cyber Wars And Cyber Terrorism
NGN integrated information security v3 DetikNas
The National Cyber Security Strategy: Success Through Cooperation
Cyber Six: Managing Security in Internet
Cyber security , an Analysis of State Security in Sri Lanka
Is Cyber-offence the New Cyber-defence?
Cyber Security India & Cyber Crime
cybersecurity- A.Abutaleb
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
Cyber Resilience and Critical Information Infrastructure Singapore Case Studi...
RESEARCH PAPER
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Singapore. industry 4.0 and cybersecurity
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
Cyber Security Strategies and Approaches
Internet safety and security strategies for building an internet safety wall
Why the Private Sector is Key to Cyber Defence
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber Wars And Cyber Terrorism
Ad

More from Directorate of Information Security | Ditjen Aptika (20)

PDF
Sosialisasi Keamanan Informasi_Sektor Kesehatan
PDF
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
PDF
Sosialisasi Keamanan Informasi_Sektor Tranportasi
PDF
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
PDF
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
PDF
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
PDF
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
PPTX
Fetri Miftach_Uji publik rpm tata kelola
PPTX
Hasyim Gautama_Tata kelola tik 20151118
PDF
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
PDF
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
PPTX
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
PPTX
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
PDF
PDF
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
PPTX
Uji Publik RPM SMPI Fetri Miftah
PPTX
Sosialisasi Keamanan Informasi_Sektor Kesehatan
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
Sosialisasi Keamanan Informasi_Sektor Tranportasi
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
Fetri Miftach_Uji publik rpm tata kelola
Hasyim Gautama_Tata kelola tik 20151118
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
Uji Publik RPM SMPI Fetri Miftah

Recently uploaded (20)

PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
The AI Revolution in Customer Service - 2025
PPTX
Presentation - Principles of Instructional Design.pptx
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
substrate PowerPoint Presentation basic one
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PPTX
MuleSoft-Compete-Deck for midddleware integrations
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
The AI Revolution in Customer Service - 2025
Presentation - Principles of Instructional Design.pptx
Build Real-Time ML Apps with Python, Feast & NoSQL
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
Rapid Prototyping: A lecture on prototyping techniques for interface design
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Lung cancer patients survival prediction using outlier detection and optimize...
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Early detection and classification of bone marrow changes in lumbar vertebrae...
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
LMS bot: enhanced learning management systems for improved student learning e...
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Introduction to MCP and A2A Protocols: Enabling Agent Communication
substrate PowerPoint Presentation basic one
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
MuleSoft-Compete-Deck for midddleware integrations

Indonesia National Cyber Security Strategy

  • 2. 2 OUTLINE  The Strategic Roles of Indonesia ICT  Indonesia ICT Numbers and Facts  Three Dimensions of Cyber Threat  Cases of Cyber Warfare/Attack  Is Indonesia Under Attack???  Obstacles and Challenges of Indonesia National Cyber Security  Six Priorities Strategy of Indonesia National Cyber Security  Conclusion
  • 3. 3 THE STRATEGIC ROLES OF ICT FOR INDONESIA ICT is an important infrastructure for citizens ICT is a trigger for economic growth and productivity ICT is a strategic sector and Government valuable assets
  • 4. 4 INDONESIA IS THE 4TH LARGEST MOBILE SUBSCRIBERS 986 Juta 893 Juta 290 Juta 249 Juta 244 Juta 236 Juta China India USA Indo Brazil Rusia Jumlah Pelanggan Telepon Seluler Dunia - 2011 1st 2nd 3rd 4th 5th 6th China India USA Indonesia Brazil Russia With 249 million subscribers in 2011, Indonesia is the 4th largest mobile market in the world. sources: cia.gov (last updated April 2013)
  • 5. 5 INDONESIA IS THE 8TH LARGEST INTERNET USERS 538 Juta 245 Juta 137 Juta 101 Juta 88 Juta 67 Juta 67 Juta 55 Juta 52 Juta 52 Juta China USA India Japan Brazil Rusia Germany Indonesia UK France Jumlah Pengguna Internet Dunia - 2011 1st 2nd 3rd 8th 4th 9th 5th 6th 7th 10th China IndiaUSA IndonesiaBrazil RussiaJapan Germany UK France sources: internetworldstats.com (last updated April 2013) In 2011, the number of internet users in Indonesia is around 55 million. Internet users in Indonesia also are highly social and active. Indonesia is the 3rd largest facebook users and the 5th largest twitter users in the world.
  • 6. 6 THREE DIMENSIONS OF CYBER THREAT/ATTACK Cyber threat/attack can be divided into three dimensions. These threats potentially destroying the economy and destabilize the country's security. Social/ Cultural Attack Sources: Indonesia National ICT Council, DETIKNAS 2013
  • 7. 7 CASES OF CYBER WARFARE/ATTACK STUXNET Wikileaks Estonia Cyber Attack 2007 Russia-Georgia Cyber warfare 2008 And many more...
  • 8. 8 IS INDONESIA UNDER ATTACK??? Over the last three years, Indonesia was attacked 3,9 millions in cyber space. (Sources: Minister of ICT, April 3rd, 2013). During January-October 2012, The most attacked website is Government websites/domain: go.id (Sources: ID-SIRTII, 2012). Sources: ID-SIRTII Sources: Detikinet, 2013
  • 9. OBSTACLES AND CHALLENGES OF INDONESIA NATIONAL CYBER SECURITY Vision of Cyber Security not Intregated Quantity and Quality of Information Security Human Resources are Limited ICT Critical Infrastructure Protection Mechanisms and Standards not exist Cyber Law and Policy not Completed Governance and Organization of National Cyber Security not Synergized Weakness of Coordination and Cooperation between Agency Application, Data and Infrastructure of Information Security not Integrated Lack of Awareness in Information Security Obstacles and Challenges of National Cyber Security Sources: Indonesia National ICT Council, DETIKNAS 2013
  • 10. 101010 Indonesia National Cyber Security Conceptual Framework (INCS) 10 Sources: Indonesia National ICT Council, Detiknas 2012 Availability Integrity Confidentiality Sharedresponsibilities OrganizationStructures CapacityBuilding InternationalCooperation TechnicalandProcedural Legal Risk Management Leadership Partnership Security Strategic Level Security Operational Level Security Tactical Level Direct Execute Control
  • 11. 11 SIX PRIORITY STRATEGIES OF INDONESIA NATIONAL CYBER SECURITY Strengthe- ning Policies and Regulations Establishment of Governance and Organization Critical Infrastructur e Protection Implementat ion of System and Technology Capacity Building for Human Resources International Collaboration and Cooperation Security and Sovereignty in Indonesia Cyber Space Sources: Indonesia National ICT Council, DETIKNAS 2013
  • 12. PRIORITY I: STRENGTHENING POLICIES AND REGULATIONS
  • 13. POLICIES & REGULATIONS RELATED TO INFORMATION SECURITY IN INDONESIA Telecommunication Act No. 36/1999 Information Transaction Electronic Act No. 11/2008 Implementation Of Telecommunications Government Regulation No. 52/2000 Organizational structure of information security Ministerial Regulation PM 17/PER/M.KOMINFO IP-based network security Ministerial Regulation No. 16/PER/M.KOMINFO/10/2010 CA Supervisory Board ad hoc team Ministerial Decree No. 197/KEP/M.KOMINFO/05/2010 Information security coordination team Ministerial Decree No. 33/KEP/M.KOMINFO/04/2010 Web server security Ministry Letter Wifi Security Ministry Letter Guidelines for the use of ISO 27001 Ministry Letter National Act:2 Government Regulation:1 Ministerial Regulation:2 Ministerial Decree:2 Ministerial Letter:3
  • 14. 14 POLICIES & REGULATIONS RELATED TO INFORMATION SECURITY IN INDONESIA (2) Criminal cases related to cyber crime in Indonesia could also be punished with: – Criminal Procedural Law Codex (UU KUHAP), – Pornography Act (UU Antipornografi No. 44/2008), – Copyright Act (UU Hak Cipta No. 19/2002), – Consumer Protection Act (UU Perlindungan Konsumen No. 8/1999).
  • 15. 15 POLICIES & REGULATIONS FRAMEWORK Scope of Cyber Security Laws: – e-Commerce; – Trademark/Domain; – Privasi dan keamanan di internet (Privacy and Security on the internet); – Hak cipta (Copyright); – Pencemaran nama baik (Defamation); – Pengaturan isi (Content Regulation); – Penyelesaian Perselisihan (Dispel Settlement). – Infrastruktur TIK Kritis Nasional (ICT Critical Infrastructure) Substantive Law Procedural Law PrescribeJurisdiction Prosecutorial Authority Enforcement Responsibility InternationalLawEnforcement Cooperation Sources: Indonesia National ICT Council, Detiknas 2012
  • 16. PRIORITY II: ESTABLISHMENT OF GOVERNANCE AND ORGANIZATION
  • 17. 17 THE CONCEPT OF NCS ORGANIZATION STRUCTURE The Concept of Indonesia NCS organization structure consists of multi- organization. INCS organization contains of skilled, proficient, and experienced employees with prosperous information security knowledge inside their parts of specialization. Sources: Indonesia National ICT Council, DETIKNAS 2013
  • 18. 18 COMPARISON OF CYBER SECURITY ORGANIZATION Level Australia UK Indonesia Strategic Cyber Security Policy and Coordination Committee (Lead Agency: The Attorney-General’s Department) Function: interdepartmental committee that coordinates the development of cyber security policy for the Australian Government. Office of Cyber Security (OCS) function: to provide strategic leadership for and coherence across Government; Undefined Tactical Cyber Security Operations Centre (CSOC) (Under Directorate: Defense Signals Directorate) Function: provides the Australian Government with all-source cyber situational awareness and an enhanced ability to facilitate operational responses to cyber security events of national importance. Cyber Security Operations Centre (CSOC) Function: actively monitor the health of cyber space and co-ordinate incident response; to enable better understanding of attacks against UK networks and users; to provide better advice and information about the risks to business and the public. Undefined Operational CERT Australia GovCertUK ID-SIRTII GovCert ID-Cert
  • 19. 19 INDONESIA NATIONAL CYBER SECURITY ORGANIZATION STRUCTURE FRAMEWORK Sources: Indonesia National ICT Council, DETIKNAS 2013
  • 20. 20 ORGANIZATION MAPPING RECOMENDATION Protect cyberspace environment Homeland Security Preventive and capacity building Intelligence KEMKOMINFO BIN LEMSANEG KEMDIKBUD Protect militer cyberspace environment Defense KEMHAN TNI Investigation and Prosecution of criminal in cyberspace Law Enforcement POLRI KEMENKOPOLHUKAM Coordination Coordinator Coordinator-Incident Response Team KEJAKSAAN Gov-Cert ID-ACAD-CSIRT ID CERT ...... Sources:IndonesiaNationalICTCouncil,DETIKNAS2013
  • 21. PRIORITY III: CRITICAL INFRASTRUCTURE PROTECTION
  • 22. DEFINITION OF NATIONAL ICT CRITICAL INFRASTRUCTURES ICT Critical National Infrastructures are assets, services, objects in the form of phyical or logical that involving the livelihood of many people, national interests and/or revenue of country that are strategic, in case of threats and attacks cause more loss of lives, destabilizing political, social, cultural and national economy as well as the sovereignty of the nation. (DETIKNAS, 2013) Criteria of the National Critical ICT Infrastructure must fulfill one, some or all of the following characteristics: – Threats and attacks resulted in disaster/many lost lives. – Threats and attacks result in chaos in the national society. – Threats and attacks cause disruption of governmental operation. – Threats and attacks resulting in the loss of reputation, income and state sovereignty.
  • 23. 23 IMPACT LEVEL OF CYBER ATTACK Money, Espionage, Skills for Employment, Fame, Entertainment, Hacktivism, Terrorism and War APT/Nation State Insider Terrorism Criminals Hacker Groups Hacker Noob/Script Kiddy Actor(s)Motivation Low Medium High Impact Level • may result in the highly costly loss of major tangible assets or resources; • may significantly violate, harm, or impede an organization’s mission, reputation, or interest; • may result in human death or serious injury. • may result in the costly loss of tangible assets or resources; • may violate, harm, or impede an organization’s mission, reputation, or interest; • may result in human injury. • may result in the loss of some tangible assets or resources • may noticeably affect an organization’s mission, reputation, or interest. Sources: Indonesia National ICT Council, DETIKNAS 2013
  • 24. 24 CRITICAL INFRASTRUCTURE SECTORS Sector Lead Agency Energi dan Sumberdaya Mineral Kementerian ESDM ICT Kementerian Kominfo Transportasi Kementerian Perhubungan Kesehatan Kementerian Kesehatan Pemerintahan Sekretariat Negara/Sekretariat Kabinet Keuangan dan Bank Kementerian Keuangan Agrikultur Kementerian Pertanian Pertahanan dan Industri Strategis Kementerian Pertahanan, Kementerian BUMN Administrasi dan Pelayanan Publik Kementerian Dalam Negeri, Kementerian Hukum & HAM Penegak Hukum POLRI, Kejaksaan RI, KPK Sosial, Budaya dan Agama Kementerian Agama dan Kementerian Sosial Sources:IndonesiaNationalICTCouncil,DETIKNAS2013
  • 25. PRIORITY IV: IMPLEMENTATION OF SYSTEM AND TECHNOLOGY
  • 26. LAYERS OF CYBER  Implementation of cyber security technologies and processes performed at each layers.  Cyber ​​security at every layer is called defense in depth.  Defense in Depth strategy is to achieve the main objectives of security, namely Availability, Integrity, Confidentiality (AIC Triad). Data Application Host Internal Network External Network
  • 27. IMPLEMENTATION OF DEFENSE IN DEPTH INFORMATION SECURITY External Network DMZ Penetration Testing VPN Logging Auditing Vulnerability Analysis Network Perimeter Firewalls Penetration Testing Proxy Logging Auditing Vulnerability Analysis Stateful Packet Inspection Internal Network IDS Penetration Testing IPS Logging Auditing Vulnerability Analysis Host Authentication Password Hashing Antivirus IDS IPS Logging Auditing Penetration Testing Vulnerability Analysis Application SSO Content Filtering Auditing Penetration Testing Data Validation Vulnerability Analysis Data Encryption Access Controls Penetration Testing Backup Vulnerability Analysis Sources: Jason Andress, 2011 (modified)
  • 28. 28 NEXT GOVERNMENT TECHNOLOGY IMPLEMENTATION RELATED TO NATIONAL CYBER SECURITY Goverment Secure Network Government Public Key Infrastructure Government Integrated Data Center
  • 29. PRIORITY V: CAPACITY BUILDING FOR HUMAN RESOURCES
  • 30. BUILDING INTEGRATED AND SUISTAINED HUMAN RESOURCES DEVELOPMENT PROGRAM Sources: Indonesia National ICT Council, DETIKNAS 2013
  • 32. CAPACITY BUILDING: AWARENESS - ONE-WAY COMMUNICATION One-way communication (text, multimedia) Film, Music, Poster, dll Wide range, tends to bore, relatively cheap cost and affordable Methods Object Effectively
  • 33. CAPACITY BUILDING: AWARENESS - TWO-WAY INTERACTIVE COMMUNICATION Two-way interactive communication (hypermedia) FGD, Interactive Workshops, Video Games, e-learning. Limited range, to be effective in changing the culture of behavior, cost of expensive Methods Object Effectively
  • 34. PRIORITY VI: INTERNATIONAL COLLABORATION AND COOPERATION
  • 35. 35 MEMBER OF INTERNATIONAL ORGANIZATION Join, participate, and ratify with international collaboration and cooperation. Currently Indonesia become full member of: – Asia Pacific and APCERT FIRST (Forum for Incident Response and Security Team) of the world. – Organisation of the Islamic Conference-CERT (OIC-CERT)
  • 36. 36 CONCLUSIONS Securing Indonesia Cyberspace is essential to create conducive and sustainability environment. Indonesia Cyberspace has to be secured and sovereigned. Indonesia needs a national cyber security strategy in order to focus on the development cyber security program. National Cyber Security is a very complex problem, collaboration and cooperation with all stakeholders are needed. Organization of Indonesia National Cyber Security (I-NCS) need to be established.

Editor's Notes

  • #24: Advanced Persistent Threat (APT) is an organized and long-term attack, designedspecifically to access and exfiltrate information from the target systems and impliesa more active role in gathering information than any that we have discussed previously.APT operations are more direct, and may have more in common with the CNAprocess that we will discuss in Chapter 9, closely matching some of the activities, butdiffering somewhat in intent and motivation. In APT, the steps that we might take areattack, escalate, and exfiltrate.