SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
Perkembangan IKP di Indonesia
Andika Triwidada
idsecconf 2021
Rekap IKP
https://www.appviewx.com/education-center/pki/
Isi Sertifikat SSL
Hubungan Trust Sertifikat SSL
● mengapa berlapis?
● boleh berapa lapis?
https://www.iana.org/dnssec/ceremonies
Sertifikat SSL yang Tidak Terpercaya
Siklus Hidup Sertifikat
https://www.secardeo.com/products/certlife-certificate-management/
Selain SSL, Sertifikat Untuk Apa?
•Code signing
•Digital signature
•…
Contoh Code Signing
Contoh Digital Signature
https://helpx.adobe.com/sign/using/digital-signatures.html
Situasi di Indonesia
Dasar Hukum
● UU No 11/2008 tentang Informasi dan Transaksi Elektronik
⇒ UU No 19/2016 tentang Perubahan Atas UU 11/2008
● PP No 82/2012 tentang Penyelenggaraan Sistem dan Transaksi Elektronik
⇒ PP No 71/2019 Penyelenggaraan Sistem dan Transaksi Elektronik
● Permen Kominfo No 29/2006 Pedoman Penyelenggaraan CA
+Lampiran Permen Kominfo No 29/2006
● Permen Kominfo No 30/2006 BPCA
⇒ Permen Kominfo No 11/2018 Penyelenggaraan Sertifikasi Elektronik
⇒ Permen Kominfo draft 2021 (?)
PP no 71/2019
Pasal 57
1. Penyelenggara Sertifikasi Elektronik Indonesia menyediakan layanan yang tersertifikasi.
2. Layanan sebagaimana dimaksud pada ayat (1) meliputi:
a. Tanda Tangan Elektronik; dan/atau
b. layanan lain yang menggunakan Sertifikat Elektronik.
3. Layanan lain sebagaimana dimaksud pada ayat (2) huruf b meliputi:
a. segel elektronik;
b. penanda waktu elektronik;
c. layanan pengiriman elektronik tercatat;
d. autentikasi situs web; dan/atau
e. preservasi Tanda Tangan Elektronik dan/atau segel elektronik.
Implementasi di Industri
https://tte.kominfo.go.id/listpsrenew
2+ juta pengguna
Fintech
POJK no. 77 tahun 2016 Pasal 41
tentang Layanan Pinjam Meminjam
Uang Berbasis Teknologi Informasi
Masalah Code Signing
● 2010: StuxNet, sertifikat dicuri dari Realtek Semiconductor dan JMicron
● 2020: SolarWinds
Masalah Terkait Tanda Tangan Digital
A taxonomy and survey of attacks on digital signatures, Jorge L.
Hernandez-Ardieta dkk., 2012: 117 attacks on digital signatures that
have been classified using the taxonomy and method of
classification proposed …
PDF: https://pdf-insecurity.org/
The Adobe Approved Trust List is a
program that allows millions of users
around the world to create digital
signatures that are trusted whenever
the signed document is opened in
Adobe® Acrobat® or Reader®
software.
Implikasi
● Implementor
○ Penyedia Layanan
○ Pengguna Layanan Dasar
● Awareness
Terima Kasih

Weitere ähnliche Inhalte

Was ist angesagt?

Studi smart card 2008
Studi smart card 2008Studi smart card 2008
Studi smart card 2008fsfarisya
 
Edge Exploration of QR Code Technology Implementation
Edge Exploration of QR Code Technology ImplementationEdge Exploration of QR Code Technology Implementation
Edge Exploration of QR Code Technology ImplementationDony Riyanto
 
Yunitha ahda lestari 37 (aplikasi modalku)
Yunitha ahda lestari  37 (aplikasi modalku)Yunitha ahda lestari  37 (aplikasi modalku)
Yunitha ahda lestari 37 (aplikasi modalku)tani57
 
Road Map Fintech di Indonesia _ Materi Training "Financial Technology"
Road Map Fintech di Indonesia _ Materi Training "Financial Technology"Road Map Fintech di Indonesia _ Materi Training "Financial Technology"
Road Map Fintech di Indonesia _ Materi Training "Financial Technology"Kanaidi ken
 
Trend Perkembangan Fintech Tahun 2025_ Materi Training "Financial Technology"
Trend Perkembangan Fintech Tahun 2025_ Materi Training "Financial Technology"Trend Perkembangan Fintech Tahun 2025_ Materi Training "Financial Technology"
Trend Perkembangan Fintech Tahun 2025_ Materi Training "Financial Technology"Kanaidi ken
 
Microfinance seminar, Presentasi Turnkey Lender
Microfinance seminar, Presentasi Turnkey LenderMicrofinance seminar, Presentasi Turnkey Lender
Microfinance seminar, Presentasi Turnkey LenderPT Datacomm Diangraha
 
TUGAS1 - BANK BCA - KEL 1 #IBIKKG - HUMDIANA,S.Kom., M.M., M.Kom
TUGAS1 - BANK BCA - KEL 1 #IBIKKG - HUMDIANA,S.Kom., M.M., M.KomTUGAS1 - BANK BCA - KEL 1 #IBIKKG - HUMDIANA,S.Kom., M.M., M.Kom
TUGAS1 - BANK BCA - KEL 1 #IBIKKG - HUMDIANA,S.Kom., M.M., M.KomWindaAmalia9
 
Studi smart card rfid 2009
Studi smart card rfid 2009Studi smart card rfid 2009
Studi smart card rfid 2009fsfarisya
 
Pengenalan Teknologi Smart Card
Pengenalan Teknologi Smart CardPengenalan Teknologi Smart Card
Pengenalan Teknologi Smart CardGamatechno
 
Urgensi PDP Dalam Membangun Ekonomi Digital Indonesia
Urgensi PDP Dalam Membangun Ekonomi Digital IndonesiaUrgensi PDP Dalam Membangun Ekonomi Digital Indonesia
Urgensi PDP Dalam Membangun Ekonomi Digital IndonesiaAlvidha Septianingrum
 
Meningkatkan Finansial Inklusi Melalui Digitalisasi Perbankan
Meningkatkan Finansial Inklusi Melalui Digitalisasi PerbankanMeningkatkan Finansial Inklusi Melalui Digitalisasi Perbankan
Meningkatkan Finansial Inklusi Melalui Digitalisasi PerbankanLestari Moerdijat
 
Cashless Regulation in Indonesia:“Tantangan Indonesia Menuju Cashless Society”
Cashless Regulation in Indonesia:“Tantangan Indonesia Menuju Cashless Society”Cashless Regulation in Indonesia:“Tantangan Indonesia Menuju Cashless Society”
Cashless Regulation in Indonesia:“Tantangan Indonesia Menuju Cashless Society”Yudi Herdiana
 
Industri Fintech dan Inklusi Keuangan Menunjukan Pertumbuhan
Industri Fintech dan Inklusi Keuangan Menunjukan PertumbuhanIndustri Fintech dan Inklusi Keuangan Menunjukan Pertumbuhan
Industri Fintech dan Inklusi Keuangan Menunjukan PertumbuhanLestari Moerdijat
 
Electronic Money @ Indonesia
Electronic Money @ IndonesiaElectronic Money @ Indonesia
Electronic Money @ IndonesiaArief Gunawan
 
Regulasi dan Kebijakan Pemerintah tentang Fintech_ Materi Training "Financial...
Regulasi dan Kebijakan Pemerintah tentang Fintech_ Materi Training "Financial...Regulasi dan Kebijakan Pemerintah tentang Fintech_ Materi Training "Financial...
Regulasi dan Kebijakan Pemerintah tentang Fintech_ Materi Training "Financial...Kanaidi ken
 
SIM, Puji Astuti, Hapzi Ali, Sistem Pendukung Keputusan ( DSS ), Universitas ...
SIM, Puji Astuti, Hapzi Ali, Sistem Pendukung Keputusan ( DSS ), Universitas ...SIM, Puji Astuti, Hapzi Ali, Sistem Pendukung Keputusan ( DSS ), Universitas ...
SIM, Puji Astuti, Hapzi Ali, Sistem Pendukung Keputusan ( DSS ), Universitas ...Puji Astuti
 

Was ist angesagt? (20)

Studi smart card 2008
Studi smart card 2008Studi smart card 2008
Studi smart card 2008
 
Edge Exploration of QR Code Technology Implementation
Edge Exploration of QR Code Technology ImplementationEdge Exploration of QR Code Technology Implementation
Edge Exploration of QR Code Technology Implementation
 
Yunitha ahda lestari 37 (aplikasi modalku)
Yunitha ahda lestari  37 (aplikasi modalku)Yunitha ahda lestari  37 (aplikasi modalku)
Yunitha ahda lestari 37 (aplikasi modalku)
 
Regulasi Fintech
Regulasi FintechRegulasi Fintech
Regulasi Fintech
 
Road Map Fintech di Indonesia _ Materi Training "Financial Technology"
Road Map Fintech di Indonesia _ Materi Training "Financial Technology"Road Map Fintech di Indonesia _ Materi Training "Financial Technology"
Road Map Fintech di Indonesia _ Materi Training "Financial Technology"
 
Trend Perkembangan Fintech Tahun 2025_ Materi Training "Financial Technology"
Trend Perkembangan Fintech Tahun 2025_ Materi Training "Financial Technology"Trend Perkembangan Fintech Tahun 2025_ Materi Training "Financial Technology"
Trend Perkembangan Fintech Tahun 2025_ Materi Training "Financial Technology"
 
Microfinance seminar, Presentasi Turnkey Lender
Microfinance seminar, Presentasi Turnkey LenderMicrofinance seminar, Presentasi Turnkey Lender
Microfinance seminar, Presentasi Turnkey Lender
 
TUGAS1 - BANK BCA - KEL 1 #IBIKKG - HUMDIANA,S.Kom., M.M., M.Kom
TUGAS1 - BANK BCA - KEL 1 #IBIKKG - HUMDIANA,S.Kom., M.M., M.KomTUGAS1 - BANK BCA - KEL 1 #IBIKKG - HUMDIANA,S.Kom., M.M., M.Kom
TUGAS1 - BANK BCA - KEL 1 #IBIKKG - HUMDIANA,S.Kom., M.M., M.Kom
 
Studi smart card rfid 2009
Studi smart card rfid 2009Studi smart card rfid 2009
Studi smart card rfid 2009
 
Pengenalan Teknologi Smart Card
Pengenalan Teknologi Smart CardPengenalan Teknologi Smart Card
Pengenalan Teknologi Smart Card
 
Urgensi PDP Dalam Membangun Ekonomi Digital Indonesia
Urgensi PDP Dalam Membangun Ekonomi Digital IndonesiaUrgensi PDP Dalam Membangun Ekonomi Digital Indonesia
Urgensi PDP Dalam Membangun Ekonomi Digital Indonesia
 
Go Cashless Jenis-Jenis Transaksi Digital
Go Cashless Jenis-Jenis Transaksi Digital Go Cashless Jenis-Jenis Transaksi Digital
Go Cashless Jenis-Jenis Transaksi Digital
 
Meningkatkan Finansial Inklusi Melalui Digitalisasi Perbankan
Meningkatkan Finansial Inklusi Melalui Digitalisasi PerbankanMeningkatkan Finansial Inklusi Melalui Digitalisasi Perbankan
Meningkatkan Finansial Inklusi Melalui Digitalisasi Perbankan
 
Cashless Regulation in Indonesia:“Tantangan Indonesia Menuju Cashless Society”
Cashless Regulation in Indonesia:“Tantangan Indonesia Menuju Cashless Society”Cashless Regulation in Indonesia:“Tantangan Indonesia Menuju Cashless Society”
Cashless Regulation in Indonesia:“Tantangan Indonesia Menuju Cashless Society”
 
Industri Fintech dan Inklusi Keuangan Menunjukan Pertumbuhan
Industri Fintech dan Inklusi Keuangan Menunjukan PertumbuhanIndustri Fintech dan Inklusi Keuangan Menunjukan Pertumbuhan
Industri Fintech dan Inklusi Keuangan Menunjukan Pertumbuhan
 
Electronic Money @ Indonesia
Electronic Money @ IndonesiaElectronic Money @ Indonesia
Electronic Money @ Indonesia
 
Regulasi dan Kebijakan Pemerintah tentang Fintech_ Materi Training "Financial...
Regulasi dan Kebijakan Pemerintah tentang Fintech_ Materi Training "Financial...Regulasi dan Kebijakan Pemerintah tentang Fintech_ Materi Training "Financial...
Regulasi dan Kebijakan Pemerintah tentang Fintech_ Materi Training "Financial...
 
SIM, Puji Astuti, Hapzi Ali, Sistem Pendukung Keputusan ( DSS ), Universitas ...
SIM, Puji Astuti, Hapzi Ali, Sistem Pendukung Keputusan ( DSS ), Universitas ...SIM, Puji Astuti, Hapzi Ali, Sistem Pendukung Keputusan ( DSS ), Universitas ...
SIM, Puji Astuti, Hapzi Ali, Sistem Pendukung Keputusan ( DSS ), Universitas ...
 
Apakah PCI DSS
Apakah PCI DSSApakah PCI DSS
Apakah PCI DSS
 
Sim
SimSim
Sim
 

Ähnlich wie IKP_INDONESIA

Cloud Based Digital Signature - Agung Nugraha
Cloud Based Digital Signature - Agung NugrahaCloud Based Digital Signature - Agung Nugraha
Cloud Based Digital Signature - Agung Nugrahaidsecconf
 
Presentasi review sistem e goverment
Presentasi review sistem e govermentPresentasi review sistem e goverment
Presentasi review sistem e govermentakbifinata
 
kemampuan dan keamanan digital ASN.pdf
kemampuan dan keamanan digital ASN.pdfkemampuan dan keamanan digital ASN.pdf
kemampuan dan keamanan digital ASN.pdfEkaSPratama1
 
ID-IGF 2017 Kominfo - Nyoman Adhiarna - final
ID-IGF 2017 Kominfo - Nyoman Adhiarna - finalID-IGF 2017 Kominfo - Nyoman Adhiarna - final
ID-IGF 2017 Kominfo - Nyoman Adhiarna - finalNyoman Adhiarna
 
Digital Organization RP.pptx
Digital Organization RP.pptxDigital Organization RP.pptx
Digital Organization RP.pptxrichard pantun
 
Presentasi PANDI pada acara IDEA, 12 Desember 2013
Presentasi PANDI pada acara IDEA, 12 Desember 2013Presentasi PANDI pada acara IDEA, 12 Desember 2013
Presentasi PANDI pada acara IDEA, 12 Desember 2013andibudimansyah
 
Agus Yulianto - Bijak Memanfaatkan Fintech.pdf
Agus Yulianto - Bijak Memanfaatkan Fintech.pdfAgus Yulianto - Bijak Memanfaatkan Fintech.pdf
Agus Yulianto - Bijak Memanfaatkan Fintech.pdfdhitomtn
 
Mekari eSign Deck 2022 (1).pdf
Mekari eSign Deck 2022 (1).pdfMekari eSign Deck 2022 (1).pdf
Mekari eSign Deck 2022 (1).pdfRysYanti
 
Implementasi TTE dan TKDN SAKTI Edit.pdf
Implementasi TTE dan TKDN SAKTI Edit.pdfImplementasi TTE dan TKDN SAKTI Edit.pdf
Implementasi TTE dan TKDN SAKTI Edit.pdfAbdurrahmanAdi2
 
4. Tata Cara pendaftaran TPP SIR-final.pdf
4. Tata Cara pendaftaran TPP SIR-final.pdf4. Tata Cara pendaftaran TPP SIR-final.pdf
4. Tata Cara pendaftaran TPP SIR-final.pdfAndi Wahyudin
 
Penyelenggaraan smart-government indonesia pasca perpres 95 2018 SPBE
Penyelenggaraan smart-government indonesia pasca perpres 95 2018 SPBEPenyelenggaraan smart-government indonesia pasca perpres 95 2018 SPBE
Penyelenggaraan smart-government indonesia pasca perpres 95 2018 SPBEIbenk Dwi ANggono
 
Penerapan / Implementasi Tanda Tangan Digital - TTD
Penerapan / Implementasi Tanda Tangan Digital - TTDPenerapan / Implementasi Tanda Tangan Digital - TTD
Penerapan / Implementasi Tanda Tangan Digital - TTDThe World Bank
 
Technology Exploration in Development of Business Idea
Technology Exploration in Development of Business Idea Technology Exploration in Development of Business Idea
Technology Exploration in Development of Business Idea Achmad Yahya Sjarifuddin
 
e - Gov di Kulon Progo
e - Gov di Kulon Progoe - Gov di Kulon Progo
e - Gov di Kulon ProgoAnton Permana
 

Ähnlich wie IKP_INDONESIA (20)

Cloud Based Digital Signature - Agung Nugraha
Cloud Based Digital Signature - Agung NugrahaCloud Based Digital Signature - Agung Nugraha
Cloud Based Digital Signature - Agung Nugraha
 
Presentasi review sistem e goverment
Presentasi review sistem e govermentPresentasi review sistem e goverment
Presentasi review sistem e goverment
 
Menuju Ekonomi Digital Indonesia
Menuju Ekonomi Digital IndonesiaMenuju Ekonomi Digital Indonesia
Menuju Ekonomi Digital Indonesia
 
kemampuan dan keamanan digital ASN.pdf
kemampuan dan keamanan digital ASN.pdfkemampuan dan keamanan digital ASN.pdf
kemampuan dan keamanan digital ASN.pdf
 
ID-IGF 2017 Kominfo - Nyoman Adhiarna - final
ID-IGF 2017 Kominfo - Nyoman Adhiarna - finalID-IGF 2017 Kominfo - Nyoman Adhiarna - final
ID-IGF 2017 Kominfo - Nyoman Adhiarna - final
 
Digital Organization RP.pptx
Digital Organization RP.pptxDigital Organization RP.pptx
Digital Organization RP.pptx
 
Presentasi PANDI pada acara IDEA, 12 Desember 2013
Presentasi PANDI pada acara IDEA, 12 Desember 2013Presentasi PANDI pada acara IDEA, 12 Desember 2013
Presentasi PANDI pada acara IDEA, 12 Desember 2013
 
Ibenk - Kominfo
Ibenk - KominfoIbenk - Kominfo
Ibenk - Kominfo
 
Company profile IDkreasi
Company profile IDkreasiCompany profile IDkreasi
Company profile IDkreasi
 
Agus Yulianto - Bijak Memanfaatkan Fintech.pdf
Agus Yulianto - Bijak Memanfaatkan Fintech.pdfAgus Yulianto - Bijak Memanfaatkan Fintech.pdf
Agus Yulianto - Bijak Memanfaatkan Fintech.pdf
 
Mekari eSign Deck 2022 (1).pdf
Mekari eSign Deck 2022 (1).pdfMekari eSign Deck 2022 (1).pdf
Mekari eSign Deck 2022 (1).pdf
 
Implementasi TTE dan TKDN SAKTI Edit.pdf
Implementasi TTE dan TKDN SAKTI Edit.pdfImplementasi TTE dan TKDN SAKTI Edit.pdf
Implementasi TTE dan TKDN SAKTI Edit.pdf
 
4. Tata Cara pendaftaran TPP SIR-final.pdf
4. Tata Cara pendaftaran TPP SIR-final.pdf4. Tata Cara pendaftaran TPP SIR-final.pdf
4. Tata Cara pendaftaran TPP SIR-final.pdf
 
Digital Organization
Digital OrganizationDigital Organization
Digital Organization
 
F066255899
F066255899F066255899
F066255899
 
Penyelenggaraan smart-government indonesia pasca perpres 95 2018 SPBE
Penyelenggaraan smart-government indonesia pasca perpres 95 2018 SPBEPenyelenggaraan smart-government indonesia pasca perpres 95 2018 SPBE
Penyelenggaraan smart-government indonesia pasca perpres 95 2018 SPBE
 
Penerapan / Implementasi Tanda Tangan Digital - TTD
Penerapan / Implementasi Tanda Tangan Digital - TTDPenerapan / Implementasi Tanda Tangan Digital - TTD
Penerapan / Implementasi Tanda Tangan Digital - TTD
 
Technology Exploration in Development of Business Idea
Technology Exploration in Development of Business Idea Technology Exploration in Development of Business Idea
Technology Exploration in Development of Business Idea
 
e - Gov di Kulon Progo
e - Gov di Kulon Progoe - Gov di Kulon Progo
e - Gov di Kulon Progo
 
Karo cyber city
Karo cyber cityKaro cyber city
Karo cyber city
 

Mehr von idsecconf

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfidsecconf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...idsecconf
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfidsecconf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...idsecconf
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfidsecconf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...idsecconf
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfidsecconf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...idsecconf
 
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - AbdullahPentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullahidsecconf
 
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaHacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaidsecconf
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...idsecconf
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwiantoidsecconf
 
Stream crime
Stream crime Stream crime
Stream crime idsecconf
 

Mehr von idsecconf (20)

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - AbdullahPentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullah
 
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaHacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
 
Stream crime
Stream crime Stream crime
Stream crime
 

IKP_INDONESIA