SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Asymmetric Warfare
Asymmetric Warfare
“There is a war out there, old friend - a World
War... and it’s not about whose got the most
bullets; it’s about who controls the information.”
“Sneakers” (1992)
..dewasa ini perang siber telah menjadi strategi untuk
menimbulkan kerugian yang berdampak strategis terhadap
suatu negara..
Perkembangan teknologi informasi dan komunikasi juga menciptakan
peperangan berbasis jaringan yang mengandalkan keunggulan
informasi, sekaligus mampu melaksanakan perang diranah digital
ataupun ruang siber. Dampak yang ditimbulkan dapat menjadikan
situasi keamanan dunia yang mengkhawatirkan,..
....
Dari aspek pertahanan, ruang siber telah menjadi domain kelima yang
dapat dijadikan sebagai medan peperangan, selain medan perang
darat, laut, udara dan ruang angkasa. Penggunaan sistem, peralatan,
dan platform berbasis internet cenderung semakin meluas yang
berpotensi menjadi kerawanan.
(Buku Putih Pertahanan Indonesia, 2015)
“Cyber”
Cyberspace (Dunia Maya)
Suatu “wadah” global, dimana di dalamnya
merupakan suatu “alam” berisi informasi digital yang
terdiri dari jaringan teknologi dan komunikasi maupun
infrastruktur yang saling terkait, termasuk di dalamnya
internet, jaringan telekomunikasi, sistem komputer,
pengolah data dan pengendalinya.
(Diolah dari berbagai sumber)
What is Cyber Warfare ?...
Cyber Warfare is:
 Non Traditional Warfare (part of Asymmetric Warfare)
 New Asymmetric Warfare method, conducted by
exploitation of IT facilities and capabilities
 Threat all aspects of the global system security,
characteristics, forms, kinds and threat dimention,
developed largely and complicated, covered all of
human life aspects
 Use cyberspace as a media
 Targeting information systems or infrastructures
which are not protected
(Laksma (Purn) Ir.Iwan Kustiyawan,MM, Cyber Threat & Cyber War, IDU, 2015)
What is Cyber Warfare ?...
 Cyber Warfare Systems are completed by :
 Equipments, tools and high technology facilities
 Weaponization
 Cyber Warriors (State & Non State)
 Goals/Objectives as interests
 Attacks result in a physical effect that will eventually affect the
National interests
 Legal system & ethics impacts
 Cyber Warfare will become...
Big Threat... also Big Challenge
favorite kind of Asymmetric Warfare
the Future of Warfare
(Laksma (Purn) Ir.Iwan Kustiyawan,MM, Cyber Threat & Cyber War, IDU, 2015)
Cyber War
Cyber War (Perang Siber) adalah suatu tindakan
pemaksaan kepada satu pihak untuk mengikuti
kehendak pihak yang lain dimana tindakan tersebut
terjadi di dunia maya, namun memiliki dampak di dunia
nyata.
(Diolah dari berbagai sumber)
Information Operations
(Joint Publication 3-13, 27 November 2012)
Why Cyber War?
Today’s critical infrastructure networks are key targets
for cyber attack because they have grown to the point
where they run the command and control systems,
manage the logistics, enable the staff planning and
operations, and are the backbone of the intelligence
capabilities.
More importantly today, most command and control
systems, as well as the weapon systems themselves,
are connected to the Global Information Grid or have
embedded computer chips.
(Andress, Jason & Steve Winterfield, Cyber Warfare : Techniques, Tactics and Tools for
Security Practitioners, 2nd Edition, Elsevier Inc, Massachusetts, 2014)
 Simple, easier and cheaper by exploiting IT’s vulnerabilities and
quality of human resources.
 Can be done by anyone, anytime and anywhere, supported by
universal freedom.
 Low risk with big impact.
 Cyber activities control and law enforcements are still limited.
 Complicated consideration about space, time, distance and other
reasons.
 Able to support many kinds of interests.
 Start and finish, objectives and targets are physically in real space.
(Laksma (Purn) Ir.Iwan Kustiyawan,MM, Cyber Threat & Cyber War, IDU, 2015)
Why Cyber War?
Forms
•Serangan pada beragam sasaran-sasaran sipil yang
menyebabkan kerusakan fisik.
•Gangguan dan serangan pada infrastruktur informasi
nasional kritis yang menyebabkan kerusakan fisik.
•Gangguan dan serangan pada sasaran-sasaran militer
dalam teritorial kedaulatan negara.
•Gangguan dan serangan pada sasaran-sasaran militer
di luar teritorial kedaulatan negara.
(Kol Dr. Arwin DW Sumari, Dynamics of Cyber Warfare, IDU, 2015)
Forms
•Penyisipan perangkat serangan tidak aktif (dormant)
seperti kuda troya atau bom logika yang mungkin
disiapkan untuk penyerangan.
•Aktivitas kriminal dan spionase industri.
•Penggunaan persenjataan ganda, seperti
pengumpulan intelijen, penggalian (probe)
kerawanan-kerawanan keamanan, dan uji penetrasi.
•Kampanye media propaganda, penyalahgunaan dan
pengubahan wajah (defacement) situs-situs resmi.
(Kol Dr. Arwin DW Sumari, Dynamics of Cyber Warfare, IDU, 2015)
Forms
Examples
Forms (in Indonesia)
• Serangan dalam bentuk malware, botnet dan trojan
•Fake server dan fake application (server palsu dan
aplikasi palsu)
• Serangan dalam media jejaring sosial
• Serangan di perangkat bergerak (mobile)
(Kol Dr. Arwin DW Sumari, Dynamics of Cyber Warfare, IDU, 2015)
Examples (in Indonesia)
Anticipation & Countermeasure
“. . . it’s now clear this cyber threat is one of the
most serious economic and national security
challenges we face as a nation,”
Obama said, adding, “. . . we’re not as prepared
as we should be, as a government or as a
country”
(Remarks by president Barrack Obama on Securing Our Nation’s Cyber
Infrastructure, 2010)
Anticipation & Countermeasure
 Detection, Early Warning and Alert System
 Countermeasure
 Needs :
 Policy & Decision
 Mechanism & Procedure
 Target & Method
 Command & Control
 Weapons : Tools & Equipment as Logical, Physical, and
Psychological Weapons
(Laksma (Purn) Ir.Iwan Kustiyawan,MM, Cyber Threat & Cyber War, IDU, 2015)
Situational
Awareness
Deterence
Strategies
Cyber
Education
& Training
Research &
Development
Trusted
Internet
Connection
Global Supply
Chain Security
Cyber
Counter
Intelligence
Public & Private
Collaboration
Implement
Info Security
Technologies
Classified
Network
Security
Intrusion
Prevention
Intrusion
Detection
 Comprehensive
National Cyber
Security Initiative
 National Security
Directive
 Presidential Directive
 Focus Areas
Anticipation & Countemeasure
Anticipation & Countermeasure
• Treat cyberspace as an “operational domain” as the
rest of the military does the ground, air, or sea.
• implement new security concepts to succeed there.
• partner with other agencies and private sector.
• build relationships with international partners.
• develop new talent to spur new innovation in how
the military might fight and win in this space.
(Singer, PW & Allan Friedman, Cybersecurity And Cyberwar : What Everyone Needs to
Know, Oxford University Press, New York, 2014)
Anticipation & Countermeasure
(Sumber : Kompas, 11 Juli 2017)
PerPres No.53 Tahun 2017
Anticipation & Countermeasure
Relevansi dengan Dunia Usaha
Relevansi dengan Dunia Usaha
Relevansi dengan Dunia Usaha
 The internet allows an attacker to attack from anywhere on the planet.
 Risks caused by poor security knowledge and practice :
 Identity Theft
 Monetary Theft
 Legal Ramifications (for yourself and companies)
 Termination if company policies are not followed
 According to www.SANS.org, the top vulnerabilities available for a cyber
criminal are :
 Web Browser
 IM Clients
 Web Applications
 Excessive User Rights
Importance of Security
• Virus
• Worm
• Trojan Horse / Logic Bomb
• Social Engineering
• Rootkits
• Botnets / Zombies
Threats
Relevansi dengan Dunia Usaha
Relevansi dengan Dunia Usaha
• Manusia adalah rantai terlemah dari sistem pengamanan
informasi.
• Menambah wawasan teknologi informasi dan melaksanakan
user awareness training yang berkelanjutan akan menambah
keamanan informasi.
• Pengamanan informasi sangat membutuhkan peran aktif dari
seluruh karyawan, investasi terhadap teknologi security akan
terbuang percuma jika tidak didukung dengan kesadaran
karyawan dalam menjaga aset informasi.
• Perlunya juga tata kelola yang baik dari manajemen yaitu
dengan menerapkan kebijakan dan prosedur pengamanan
informasi.
sesuatu untuk kita renungkan..
sesuatu untuk kita renungkan..
Asymmetric Warfare

Weitere ähnliche Inhalte

Was ist angesagt?

ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan SiberID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan SiberIGF Indonesia
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! newsMarioEliseo3
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkIGF Indonesia
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect usLuis Borges Gouveia
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaINFOGAIN PUBLICATION
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industryjournal ijrtem
 

Was ist angesagt? (9)

ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan SiberID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 
Us gov't building hacker army for cyber war yahoo! news
Us gov't building hacker army for cyber war   yahoo! newsUs gov't building hacker army for cyber war   yahoo! news
Us gov't building hacker army for cyber war yahoo! news
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
Trends_in_my_profession(revised)
Trends_in_my_profession(revised)Trends_in_my_profession(revised)
Trends_in_my_profession(revised)
 

Ähnlich wie Cyber War

Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxglendar3
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxtodd581
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalLeslie Lee
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 
VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016Cameron Brown
 
IDSECCONF2018 Keynote Speaker - Agung Nugraha, S.IP., M.Si (Han)
IDSECCONF2018 Keynote Speaker - Agung Nugraha, S.IP., M.Si (Han)IDSECCONF2018 Keynote Speaker - Agung Nugraha, S.IP., M.Si (Han)
IDSECCONF2018 Keynote Speaker - Agung Nugraha, S.IP., M.Si (Han)idsecconf
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıGovernment
 
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSAN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSDaphne Smith
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectorsLove Steven
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxcroysierkathey
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewIOSR Journals
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...ijaia
 
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...Audrey Britton
 
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONSCYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONSIAEME Publication
 

Ähnlich wie Cyber War (20)

Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docxRunning head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
Running head METHODS USED IN CYBER WARFARE1METHODS USED IN CYB.docx
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016VFAC REVIEW issue12_extract_2016
VFAC REVIEW issue12_extract_2016
 
Cyber Security Cooperation
Cyber Security CooperationCyber Security Cooperation
Cyber Security Cooperation
 
IDSECCONF2018 Keynote Speaker - Agung Nugraha, S.IP., M.Si (Han)
IDSECCONF2018 Keynote Speaker - Agung Nugraha, S.IP., M.Si (Han)IDSECCONF2018 Keynote Speaker - Agung Nugraha, S.IP., M.Si (Han)
IDSECCONF2018 Keynote Speaker - Agung Nugraha, S.IP., M.Si (Han)
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
 
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSAN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
Cyber security: challenges for society- literature review
Cyber security: challenges for society- literature reviewCyber security: challenges for society- literature review
Cyber security: challenges for society- literature review
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Cyber Security in 2018
Cyber Security in 2018Cyber Security in 2018
Cyber Security in 2018
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...Applications of artificial intelligence techniques to combating cyber crimes ...
Applications of artificial intelligence techniques to combating cyber crimes ...
 
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
Applications Of Artificial Intelligence Techniques To Combating Cyber Crimes ...
 
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONSCYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
 

Kürzlich hochgeladen

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 

Kürzlich hochgeladen (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Cyber War

  • 2. Asymmetric Warfare “There is a war out there, old friend - a World War... and it’s not about whose got the most bullets; it’s about who controls the information.” “Sneakers” (1992)
  • 3. ..dewasa ini perang siber telah menjadi strategi untuk menimbulkan kerugian yang berdampak strategis terhadap suatu negara.. Perkembangan teknologi informasi dan komunikasi juga menciptakan peperangan berbasis jaringan yang mengandalkan keunggulan informasi, sekaligus mampu melaksanakan perang diranah digital ataupun ruang siber. Dampak yang ditimbulkan dapat menjadikan situasi keamanan dunia yang mengkhawatirkan,.. .... Dari aspek pertahanan, ruang siber telah menjadi domain kelima yang dapat dijadikan sebagai medan peperangan, selain medan perang darat, laut, udara dan ruang angkasa. Penggunaan sistem, peralatan, dan platform berbasis internet cenderung semakin meluas yang berpotensi menjadi kerawanan. (Buku Putih Pertahanan Indonesia, 2015)
  • 4. “Cyber” Cyberspace (Dunia Maya) Suatu “wadah” global, dimana di dalamnya merupakan suatu “alam” berisi informasi digital yang terdiri dari jaringan teknologi dan komunikasi maupun infrastruktur yang saling terkait, termasuk di dalamnya internet, jaringan telekomunikasi, sistem komputer, pengolah data dan pengendalinya. (Diolah dari berbagai sumber)
  • 5. What is Cyber Warfare ?... Cyber Warfare is:  Non Traditional Warfare (part of Asymmetric Warfare)  New Asymmetric Warfare method, conducted by exploitation of IT facilities and capabilities  Threat all aspects of the global system security, characteristics, forms, kinds and threat dimention, developed largely and complicated, covered all of human life aspects  Use cyberspace as a media  Targeting information systems or infrastructures which are not protected (Laksma (Purn) Ir.Iwan Kustiyawan,MM, Cyber Threat & Cyber War, IDU, 2015)
  • 6. What is Cyber Warfare ?...  Cyber Warfare Systems are completed by :  Equipments, tools and high technology facilities  Weaponization  Cyber Warriors (State & Non State)  Goals/Objectives as interests  Attacks result in a physical effect that will eventually affect the National interests  Legal system & ethics impacts  Cyber Warfare will become... Big Threat... also Big Challenge favorite kind of Asymmetric Warfare the Future of Warfare (Laksma (Purn) Ir.Iwan Kustiyawan,MM, Cyber Threat & Cyber War, IDU, 2015)
  • 7. Cyber War Cyber War (Perang Siber) adalah suatu tindakan pemaksaan kepada satu pihak untuk mengikuti kehendak pihak yang lain dimana tindakan tersebut terjadi di dunia maya, namun memiliki dampak di dunia nyata. (Diolah dari berbagai sumber) Information Operations (Joint Publication 3-13, 27 November 2012)
  • 8. Why Cyber War? Today’s critical infrastructure networks are key targets for cyber attack because they have grown to the point where they run the command and control systems, manage the logistics, enable the staff planning and operations, and are the backbone of the intelligence capabilities. More importantly today, most command and control systems, as well as the weapon systems themselves, are connected to the Global Information Grid or have embedded computer chips. (Andress, Jason & Steve Winterfield, Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners, 2nd Edition, Elsevier Inc, Massachusetts, 2014)
  • 9.  Simple, easier and cheaper by exploiting IT’s vulnerabilities and quality of human resources.  Can be done by anyone, anytime and anywhere, supported by universal freedom.  Low risk with big impact.  Cyber activities control and law enforcements are still limited.  Complicated consideration about space, time, distance and other reasons.  Able to support many kinds of interests.  Start and finish, objectives and targets are physically in real space. (Laksma (Purn) Ir.Iwan Kustiyawan,MM, Cyber Threat & Cyber War, IDU, 2015) Why Cyber War?
  • 10. Forms •Serangan pada beragam sasaran-sasaran sipil yang menyebabkan kerusakan fisik. •Gangguan dan serangan pada infrastruktur informasi nasional kritis yang menyebabkan kerusakan fisik. •Gangguan dan serangan pada sasaran-sasaran militer dalam teritorial kedaulatan negara. •Gangguan dan serangan pada sasaran-sasaran militer di luar teritorial kedaulatan negara. (Kol Dr. Arwin DW Sumari, Dynamics of Cyber Warfare, IDU, 2015)
  • 11. Forms •Penyisipan perangkat serangan tidak aktif (dormant) seperti kuda troya atau bom logika yang mungkin disiapkan untuk penyerangan. •Aktivitas kriminal dan spionase industri. •Penggunaan persenjataan ganda, seperti pengumpulan intelijen, penggalian (probe) kerawanan-kerawanan keamanan, dan uji penetrasi. •Kampanye media propaganda, penyalahgunaan dan pengubahan wajah (defacement) situs-situs resmi. (Kol Dr. Arwin DW Sumari, Dynamics of Cyber Warfare, IDU, 2015)
  • 12. Forms
  • 14. Forms (in Indonesia) • Serangan dalam bentuk malware, botnet dan trojan •Fake server dan fake application (server palsu dan aplikasi palsu) • Serangan dalam media jejaring sosial • Serangan di perangkat bergerak (mobile) (Kol Dr. Arwin DW Sumari, Dynamics of Cyber Warfare, IDU, 2015)
  • 16. Anticipation & Countermeasure “. . . it’s now clear this cyber threat is one of the most serious economic and national security challenges we face as a nation,” Obama said, adding, “. . . we’re not as prepared as we should be, as a government or as a country” (Remarks by president Barrack Obama on Securing Our Nation’s Cyber Infrastructure, 2010)
  • 17. Anticipation & Countermeasure  Detection, Early Warning and Alert System  Countermeasure  Needs :  Policy & Decision  Mechanism & Procedure  Target & Method  Command & Control  Weapons : Tools & Equipment as Logical, Physical, and Psychological Weapons (Laksma (Purn) Ir.Iwan Kustiyawan,MM, Cyber Threat & Cyber War, IDU, 2015)
  • 18. Situational Awareness Deterence Strategies Cyber Education & Training Research & Development Trusted Internet Connection Global Supply Chain Security Cyber Counter Intelligence Public & Private Collaboration Implement Info Security Technologies Classified Network Security Intrusion Prevention Intrusion Detection  Comprehensive National Cyber Security Initiative  National Security Directive  Presidential Directive  Focus Areas Anticipation & Countemeasure
  • 19. Anticipation & Countermeasure • Treat cyberspace as an “operational domain” as the rest of the military does the ground, air, or sea. • implement new security concepts to succeed there. • partner with other agencies and private sector. • build relationships with international partners. • develop new talent to spur new innovation in how the military might fight and win in this space. (Singer, PW & Allan Friedman, Cybersecurity And Cyberwar : What Everyone Needs to Know, Oxford University Press, New York, 2014)
  • 20. Anticipation & Countermeasure (Sumber : Kompas, 11 Juli 2017)
  • 21. PerPres No.53 Tahun 2017 Anticipation & Countermeasure
  • 25.  The internet allows an attacker to attack from anywhere on the planet.  Risks caused by poor security knowledge and practice :  Identity Theft  Monetary Theft  Legal Ramifications (for yourself and companies)  Termination if company policies are not followed  According to www.SANS.org, the top vulnerabilities available for a cyber criminal are :  Web Browser  IM Clients  Web Applications  Excessive User Rights Importance of Security
  • 26. • Virus • Worm • Trojan Horse / Logic Bomb • Social Engineering • Rootkits • Botnets / Zombies Threats
  • 28. Relevansi dengan Dunia Usaha • Manusia adalah rantai terlemah dari sistem pengamanan informasi. • Menambah wawasan teknologi informasi dan melaksanakan user awareness training yang berkelanjutan akan menambah keamanan informasi. • Pengamanan informasi sangat membutuhkan peran aktif dari seluruh karyawan, investasi terhadap teknologi security akan terbuang percuma jika tidak didukung dengan kesadaran karyawan dalam menjaga aset informasi. • Perlunya juga tata kelola yang baik dari manajemen yaitu dengan menerapkan kebijakan dan prosedur pengamanan informasi.
  • 29. sesuatu untuk kita renungkan..
  • 30. sesuatu untuk kita renungkan..

Hinweis der Redaktion

  1. Each of these will be covered thoroughly in the slides that follow.