INDONESIA S PERSPECTIVE ON CYBER TERRORISM

Similar documents
THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

Thailand Initiatives and Challenges in Cyber Terrorism

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

The APEC Model. Global Partnership through Regional Initiatives

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

Provisional Translation

OAS Cybersecurity Capacity Building Efforts

Cyber Security Technologies

CIRT: Requirements and implementation

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE

Republic of Indonesia. ARF Defense Officials Dialogue Seoul, April 2009

Regional Workshop on Frameworks for Cybersecurity and CIIP Feb 2008 Doha, Qatar

CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore

Critical Information Infrastructure Protection Law

Indonesia Cyber Security Market

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

Donor Countries Security. Date

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

ASEAN s Cyber Confidence Building Measures

Forum. Ningbo, China 25 February

About Issues in Building the National Strategy for Cybersecurity in Vietnam

The UNODC Global Programme on Cybercrime Alexandru Caciuloiu CYBERCRIME COORDINATOR SOUTHEAST ASIA AND THE PACIFIC

The commission communication "towards a general policy on the fight against cyber crime"

2 nd ARF Seminar on Cyber Terrorism PAKISTAN S PERSPECTIVE AND EXPERIENCE WITH REFERENCE TO CERT IN COMBATING CYBER TERRORISM

Laws and Regulations & Data Governance

RFC2350 TLP1: WHITE. Έκδοση National CSIRT-CY RFC2350

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

Directive on Security of Network and Information Systems

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

NIS-Directive and Smart Grids

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

Preempting Cyber Fraud: SWIFT Threat Indicator Sharing Tool. Cyber Security 3.0 Better Together August 18, 2017

Information Security and Cyber Security

Introduction of APCERT APCERT

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

UNODC tackling cybercrime in support of a safe and secure AP-IS

Promoting Global Cybersecurity

Introduction of APCERT

The GenCyber Program. By Chris Ralph

Directive on security of network and information systems (NIS): State of Play

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

Romania - Cyber Security Strategy. 6th IT STAR Workshop on Digital Security

The Global Cybercrime Industry

PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Cyber Security Experts Association of Nigeria (CSEAN) CYBER SECURE NIGERIA 2016 Conference

Security and resilience in Information Society: the European approach

Police Technical Approach to Cyber Threats

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

Customer Security Programme (CSP)

Establishing National Incident Response Capability for Viet Nam - VNCERT activities and challenges

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

Caribbean Cyber Security: Not Only Government s Responsibility

Cyber Security Development. Ghana in Perspective

GLobal Action on CYbercrime (GLACY) Assessing the Threat of Cybercrime in Mauritius

National Cybersecurity preparation to deal with Cyber Attacks

Overview. Objectives. Components. Information and Communication Technologies Sector Development Project. Project

Strategic and operational threat analysis at Europol's EC3

ITU-ACMA Asia Pacific Regulators Roundtable July 2014

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

International Cooperation in Cybercrime Investigations

Protecting Canada s Nuclear Industry THE

PIONEER TRAINING INSTITUTE

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT

Resolution: Advancing the National Preparedness for Cyber Security

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank

Securing Europe's Information Society

Responding to Cybercrime:

Bradford J. Willke. 19 September 2007

Itu regional workshop

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

INTERPOL s Role and Efforts in Combating Cybercrime. Dr. Madan M. Oberoi Director Cyber Innovation and Outreach

Inter-American Port Security Cooperation Plan

National Center for Excellence in Technology for Internal Security (NCETIS)

Action Plan to enhance preparedness against CBRN security risks

Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016

Cyber Security in Europe

A Forensic Accountant in Cyber Security

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

National Cyber Security Strategy 2016

COUNTER- TERRORISM SOLUTIONS Ltd. The Training & Consulting Arm of the International Institute for Counter Terrorism (ICT)

Cyber Security Strategy

California Cybersecurity Integration Center (Cal-CSIC)

Data and Cyber Crisis how to manage a crisis and reduce loss. Melissa Russell Special Counsel February 2016

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Progress of Regional Cooperation in the Field of Disaster Risk Reduction in Asia

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

HPH SCC CYBERSECURITY WORKING GROUP

Australian Government Cyber-security Activities in the Pacific

People Assets Reputation

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Les joies et les peines de la transformation numérique

Global Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Transcription:

INDONESIA S PERSPECTIVE ON CYBER TERRORISM

CYBER TERRORISM No generally acceptable definition Cyber terrorism is one form of terrorism that use computer resources to launch terror attacks on critical infrastructures that could cause widespread destructive impacts such as serious economic, social, political disturbances, chaos, and damages on the targeted area either driven by political objectives or economic motivation. Cyber Terrorism is part of the Cyber Crime Effective measures on addressing the Cyber Crime contributes to counter cyber terrorism Response may be different duet to different experience, level of development including the mastery, use, application and reliance on information technology, level of awareness on 2

Characteristics 1 2 2 3 4 Relatively less costly Could be carried out by an invidual. Low risks, difficult to trace or localize the suspect No time and place boundaries. Attacks could take place at any time and any where. The magnitude of the impact could be very large 3

CRITICAL INFRA STRUCTURE Electricity, Gas, Water & Fuel. Communication and information, finance, medical services Aviation, railways, seaports. Police services, defense forces and government services 4

IMAM SAMUDRA IS A COMPLETE TERRORIST Website creator, Hacker, Carder, Robber, Bomb creator!!! sangpria@yahoo.co.nz gulajawa333@yahoo.com piring@yahoo.com.tw priaidaman@yahoo.co.nz freddymd@yahoo.com Chating log Imam Chating.txt Card number Imam Card.txtt 5

Cyber Crime 2003-2004 NO MODUS OPERANDI 2003 2004 KET 01 CREDIT CARD FRAUD 145 177 02 STOCK EXCHANGE FRAUD 1 2 03 BANKING FRAUD 3 5 HIT AND RUN 04 PORNOGRAPHY 2 4 05 TERRORISM & THREAT 0 3 EMAIL 06 ARMS SMUGGLING 1 0 07 Harrashment 1 1 Email * GRAND TOTAL 153 192 6

Restructuring established a special division on cyber crime. Enhancing resources (means and facilities). Strengthening Human Resources Basic Training on computer and internet Educational programme on Cyber Crime intellegence Education and Training Center in Megamendung. Workshop/ training and comparative study such as in US, UK, Australia, Czech, Japan, Korea, Hong Kong, Singapore, Malaysia, Bangkok dll Seminars both national and international/regional Strengthening Cooperation with: Related departments/institutions: Dept. Info and com., Post and Tel, Dept Legal and HR., etc. KerjasamadenganKepolisiannegaralain : FBI, Aseanapol, AFP, Scotland yard, NPA, Korea, Hong Kong, New Zealand. Establishment of Id-CERT (Indonesian Computer Emergency Response Team) or Indonesian Security Incident Response Team on Information Infrastructure ID SIIRTI 7

VISION ID-SIRTII Promote favorable environment that is free from threats and disturbances in internet infrastructure internet in Indonesia, and thus enhance the use of internet as a means for strengthening the national competitiveness. MISSION ID-SIRTII Promote and strengthen the security of internet infrastucture networks in Indonesia from threats and disturbances; Promote and facilitate secure and legal internet transactions in Indonesia; Support law enforcement in the field of internet sesurity in Indonesia; Enhance cooperation with strategic partners at the national and international level in countering threats and disturbances of internet infrastructure. 8

Scope OF RESPONSIBILITIES Monitor and early detect on disturbances in internet in Indonesia; Keep internet transaction evidences in Secure Data Center; Support the provision of Digital Forensic and Digital Evident for law enforcement process; Carry out information services (Contact Center) based on report of internet infrastructure security disturbances (24 hours/7 days a week) from society; Provide services such as Lab Simulation, Training, Consultation and awareness building. 9

Organizational Structure DIR GEN POSTEL Steering Committee Expertise Operational Law and regulations Implementors Administration and Finance Coordinator Team Network Monitoring Secure Data Center Digital Forensic contact Center Training, Sosialisation & Lab Simulation 10

TIME TABLE Planning Implementation 1 st Year - 2006 2 nd Year - 2007 3 rd Year - 2008 11

Implementation 1 st Year Network Monitoring Monitor traffic in Internet Exchange point in Jakarta Provide services for addressing disturbances in internet Secure Data Center 10 server shelves (capacity 10 Terabyte), connected to Internet Exchange point and international Digital Forensic Contact Center Sosialisation, Training & Lab Simulation Lokation In house forensic lab 5 days a week (8 working hours a day) E-mail warning alert.. 12

Implementation period 2 nd Year Network Monitoring Secure Data Center Digital Forensic Contact Center Sosialisation, Training & Lab Simulation Monitor traffic of all Internet Exchange Point and ISP in Jakarta connected with Internet Exchange Point Provide services for addressing disturbances in internet network 25 server shelves (capacity 25 terabyte) Redundant link to Internet Exchange Point and international In house forensic lab and mobile forensic lab. contact center, serving 24 hours a day, 7 days a week E-mail warning alert Training on basic network security Lab simulation on the aplication and operational system 13

Implementation Period 3 rd Year Network Monitoring Secure Data Center Monitor traffic of all Internet Exchange Point and all ISP Back up equipment and setting Provide services for addressing disturbances in internet network 50 server shelves (50 terabyte), redundant link to Internet Exchange Point and international, back up equipment (DRC) Digital Forensic Contact Center In house forensic lab and mobile forensic lab contact center, serving 24 hour s a day, 7 days a week Sosialisation, Training & Lab Simulation Lab simulation, application, operational system & network E-mail warning alert Training for basic network security & advance 14

Thank you 15