Upload
nguyenlien
View
213
Download
0
Embed Size (px)
Citation preview
Attackers
Foreign Countries
Organized Crime
Cyber Terrorism
Insiders
Hacktivism
Noobs
Attack Methods
Viruses
Web Attacks
Worms
Backdoors
Phishing
Database Attacks
?
Targeted Capabilities
Critical Infrastructure
IT Infrastructure
Corporate
Personal
Cyber Threat Landscapes
Current Conditions
LAW
• Law on ITE
Policy
•No National Policy of Cyber Security
• Fragmented Strategy of Internet Security
Institutions
•No National Cyber Agency
•Cyber Desk
• ID SIRTII
•National Crypto Agency
•MoD’s Center of Strategic Data and Communication
Infrastructure
• Fragmented Cyber Infrastructure
•No Single Platform
• Limited Expertise on Cyber Security
Cyber Security System
LAW
Law on Cyber
Policy
National Policy and Strategy of Cyber Security
Institutions
National Cyber Agency
Integrated-Coordinated
Agencies
Infrastructure
National Cyber Infrastructure
Integrated Platform
National Cyber Security Strategy
Defense in Depth CS Operation
Center Configuration Management
Identity Management
Key Education Techniques
Doctrine of Cyber Security
Defensive Offensive Deterrence
Identification Protect Prevent Response Recovery
Cyber Security Institutional Arrangements
National Cyber Agency
National Cyber Security Advisers
CERT – ID SIRTII Crypto Agency Cyber Defense
Command Oversight Committee
International Cooperation
Cyber Security Integrated Platform
Regulations on Cyber Security
Cyber Security
Systems
Cyber Security
Policies
Cyber Security
Institutional Arrangements
Cyber Security
Emergency Responses
Model
Total Control
Intelligence Model
Collaborative Network
Functions
Cyber Diplomacy
Cyber Defense
Cyber Crime
Signal Intelligence
Cryptography
Cyber Protection
Internet Filtering
Objects
Government Network
Critical Infrastructure
E-Commerce
Doctrine
Protection
Detection
Identification
Response
Recovery
Cyber Security Framework
DIGITAL INDONESIA
2020
Digital Infrastructure
E-Gov
E-Commerce
Cyber Diplomacy
Cyber Defense
Cyber Crime
Signal Intelligence
Cryptography
Cyber Protection
Internet Filtering
Cyber Security Arrangements
State Sovereignty
Security Measures
Standardization
Collaborative Networking
CBM Global Norms
Common Understanding
On
Cyber Security
Nature of Threats
Agreed Principles
Managing Threats
Operational Solutions
Th
reat
s
Transnational in nature, ignore political boundaries
The agenda is dominated by non-traditional security concern
Cyber security threatens the economic growth and welfare of all states
Ag
reed
Pri
nci
ple
s
The importance of creating global norms on cyber security
Respect for ASEAN spirit: respect for sovereignty, promotion of dialogue
and networking and enhanced interactions.
Adherence to ARF principle of “move forward at pace comfortable to all”, confidence building, and peaceful
resolution of conflict.
Cooperation between state actors and non state actors
Man
agin
g T
hre
ats
Shared awareness and exchange of information and best practices
Strengthening confidence building measures based on international
regional legal frameworks, arrangements and cooperation
Interagency cooperative frameworks through bilateral/regional
arrangements
Standardization of cyber security measures
Capacity Building of Enforcement Agencies in the region
Op
erat
ion
al a
nd
Tac
tica
l S
olu
tio
ns Developing standard operational
procedures and inter-operability
Adoption of advance technology in cyber security
Exchanges in cyber security measures
Establishment of focal points
Tactical training and exercises