PAPARAN KONSEP KEAMANAN ONLINE SINGLE SUBMISSION (OSS) Web Application and Database

Similar documents
ANATOMY OF AN ATTACK!

LBI Public Information. Please consider the impact to the environment before printing this.

Designing and Building a Cybersecurity Program

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

CDSL s - National Academic Depository

Carbon Black PCI Compliance Mapping Checklist

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

Information Technology General Control Review

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Security+ SY0-501 Study Guide Table of Contents

CISA Training.

Next Generation Policy & Compliance

Altius IT Policy Collection

RMS(one) Solutions PROGRESSIVE SECURITY FOR MISSION CRITICAL SOLUTIONS

STANDARD INFORMATION SHARING FORMATS. Will Semple Head of Threat and Vulnerability Management New York Stock Exchange

COURSE BROCHURE CISA TRAINING

Strategy is Key: How to Successfully Defend and Protect. Session # CS1, February 19, 2017 Karl West, CISO, Intermountain Healthcare

No IT Audit Staff? How to Hack an IT Audit. Presenters. Mark Bednarz, Partner-In-Charge, Risk Advisory PKF O Connor Davies, LLP

H2020 WP Cybersecurity PPP topics

Security in Cloud Environments

Advanced Security Tester Course Outline

BRING EXPERT TRAINING TO YOUR WORKPLACE.

CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK

CISA EXAM PREPARATION - Weekend Program

Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On- Premises Tools

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

20398: Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) and On- Premises Tools

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

Interactive Remote Access FERC Remote Access Study Compliance Workshop October 27, Eric Weston Compliance Auditor Cyber Security.

Security Principles for Stratos. Part no. 667/UE/31701/004

E-guide Getting your CISSP Certification

Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools

Internet of Things Toolkit for Small and Medium Businesses

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Security

How do you decide what s best for you?

Secure Systems Administration and Engineering

Planning for and Managing Devices in the Enterprise: Enterprise Management Suite (EMS) & On-Premises Tools

RFC2350 TLP1: WHITE. Έκδοση National CSIRT-CY RFC2350

Symantec Ransomware Protection

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Cyber Security Technologies

NIST Special Publication

ISE North America Leadership Summit and Awards

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Secure Access & SWIFT Customer Security Controls Framework

Must Have Items for Your Cybersecurity or IT Budget in 2018

Altius IT Policy Collection Compliance and Standards Matrix

Comprehensive Mitigation

External Supplier Control Obligations. Cyber Security

Electronic payments in the Netherlands

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

RBI GUIDELINES ON CYBER SECURITY AND RAKSHA APPROACH

Critical Hygiene for Preventing Major Breaches

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

IC32E - Pre-Instructional Survey

Stakeholders Analysis

Altius IT Policy Collection Compliance and Standards Matrix

EMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

American Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment

Practical Guide to Securing the SDLC

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

Defensible Security DefSec 101

Cybersecurity Overview

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

K12 Cybersecurity Roadmap

CYBER SECURITY AIR TRANSPORT IT SUMMIT

No compromises for secure SCADA Communications even over 3rd Party Networks

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

How to Underpin Security Transformation With Complete Visibility of Your Attack Surface

Building a More Secure Cloud Architecture

the SWIFT Customer Security

Addressing NERC-CIP Compliance Challenge for Utilities through IT Service Management. Patrik Ringqvist Principal Solution Consultant

CloudSOC and Security.cloud for Microsoft Office 365

Cyber fraud and its impact on the NHS: How organisations can manage the risk

WORKSHARE SECURITY OVERVIEW

Security Issues and Best Practices for Water Facilities

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Contracting for an IT General Controls Audit

An Integrative Framework for Secure and Resilient Mission Assurance

Critical Information Infrastructure Protection Law

Cyber and Information Security Focused Audit Strategy WNY ISACA May 9, 2017 Shamus McMahon CISA, CISSP

Watson Developer Cloud Security Overview

At Course Completion After completing this course, students will be able to:

Key Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering. Key Threats Internet was just growing Mail was on the verge

The Evolution of : Continuous Advanced Threat Protection

Education Network Security

Congratulations HITCON on your 10 th Anniversary!

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

Cybersecurity Session IIA Conference 2018

Transcription:

PAPARAN KONSEP KEAMANAN ONLINE SINGLE SUBMISSION (OSS) Web Application and Database Membangun Kebijakan Siber dan Strategi untuk mendorong pertumbuhan Ekonomi Digital

Aris Munandar, S.ST,MP., M.Kom Analis Kebijakan pada Direktorat Proteksi Instansi Pemerintah Pendidikan/Sertifikasi : University Of Aberdeen (1 Tahun) Sekolah Tinggi Sandi Negara (STSN) (4 Tahun) Institut Bangking School (IBS) (2 Tahun) CISA Certification - ISACA BADAN SIBER DAN SANDI NEGARA Jl. Harsono RM No. 70, Ragunan, Pasar Minggu, Jak-Sel, 12550

BADAN BADAN SIBER SIBER DAN DAN SANDI SANDI NEGARA NEGARA Jl. Jl. Harsono Harsono RM RM No. No. 70, 70, Ragunan, Ragunan, Pasar Pasar Minggu, Minggu, Jak-Sel, Jak-Sel, 12550 12550

Then, how is digital opportunity in Indonesia, as well as the cyber security capacity? BADAN BADAN SIBER SIBER DAN DAN SANDI SANDI NEGARA NEGARA Jl. Jl. Harsono Harsono RM RM No. No. 70, 70, Ragunan, Ragunan, Pasar Pasar Minggu, Minggu, Jak-Sel, Jak-Sel, 12550 12550

Cyber Security Cyber Concept and Strategy and Strategy National Cyber Security Policy and Strategy National Threat Intelligence Developt Threat Intelligence Gather Threat Data National Cyber Security Operation Center Monitoring Analyze Cyber Crisis Management Center Incidents Response Center Join Force Coordination Create and Enhance National Cyber Security Situational Awareness Provide Threat Info, IOC n CVE Defend Incidents Report & Monitoring Strenghten National Cyber Security Environment National Cyber Security Sharing System PRIORITY Infrastruktur Informasi Kritis Nasional Cyber Security System Instansi Pemerintah Cyber Security System Publik Cyber Security System & Individual Stakeholders Build and Enhance National Cyber Resilience

Malware Video

Overview single submission BADAN BADAN SIBER SIBER DAN DAN SANDI SANDI NEGARA NEGARA Jl. Jl. Harsono Harsono RM RM No. No. 70, 70, Ragunan, Ragunan, Pasar Pasar Minggu, Minggu, Jak-Sel, Jak-Sel, 12550 12550

single submission Alur Proses Data BADAN SIBER DAN SANDI NEGARA Jl. Harsono RM No. 70, Ragunan, Pasar Minggu, Jak-Sel, 12550

Web Application and DataBase BADAN BADAN SIBER SIBER DAN DAN SANDI SANDI NEGARA NEGARA Jl. Jl. Harsono Harsono RM RM No. No. 70, 70, Ragunan, Ragunan, Pasar Pasar Minggu, Minggu, Jak-Sel, Jak-Sel, 12550 12550

How is Concept Web Application and DataBase Security BADAN SIBER DAN SANDI NEGARA Jl. Harsono RM No. 70, Ragunan, Pasar Minggu, Jak-Sel, 12550

Focus Layer Security Layer Security Infrastructure Security : Server, Data Center, ISP Software/Hardware Network Security : WAF, Firewall, Hardening, Patching, IDS, etc Application Security : Source Code People : Clearance, Awareness and Education Information Security : C I A Kunci Keamanan Informasi Confidentiality : Encryption Integrity : Hash Function Authentication : Sertifikat Elektronik, / Multi-factor authentication Availability : Back Up/Access Control BADAN SIBER DAN SANDI NEGARA Jl. Harsono RM No. 70, Ragunan, Pasar Minggu, Jak-Sel, 12550

1 Infrastructure Security Server, Data Center, ISP Availabily and Reliability BADAN SIBER DAN SANDI NEGARA Jl. Harsono RM No. 70, Ragunan, Pasar Minggu, Jak-Sel, 12550

Ilustrasi SKEMA Server-Website: Web App-Data Base

ILUSTRASI KEAMANAN DAN KERAWANAN Web Application BADAN BADAN SIBER SIBER DAN DAN SANDI SANDI NEGARA NEGARA Jl. Jl. Harsono Harsono RM RM No. No. 70, 70, Ragunan, Ragunan, Pasar Pasar Minggu, Minggu, Jak-Sel, Jak-Sel, 12550 12550

SERVER : Hardening APLIKASI : Sourcecode Audit DATABASE : IP Trusted, Koneksi DataBase, Kontrol Akses Table