Professional Documents
Culture Documents
TUGAS 1
Mata Kuliah :
TIK3072C Praktikum Keamanan Siber
Sherwin Reinaldo U Aldo Sompie ST, MT
Xaverius B.N. Najoan ST, MT
Dibuat oleh :
Background / Scenario
Computing power and resources have increased tremendously over the last 10 years. A benefit of having
multicore processors and large amounts of RAM is the ability to use virtualization. With virtualization, one or
more virtual computers operate inside one physical computer. Virtual computers that run within physical
computers are called virtual machines. Virtual machines are often called guests, and physical computers are
often called hosts. Anyone with a modern computer and operating system can run virtual machines.
A virtual machine image file has been created for you to install on your computer. In this lab, you will
download and import this image file using a desktop virtualization application, such as VirtualBox.
Required Resources
Computer with a minimum of 2 GB of RAM and 8 GB of free disk space
High speed Internet access to download Oracle VirtualBox and the virtual machine image file
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
b. Choose and download the appropriate installation file for your operating system.
c. When you have downloaded the VirtualBox installation file, run the installer and accept the default
installation settings.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
b. A new window will appear. Specify the location of the .OVA file and click Next.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
c. A new window will appear presenting the settings suggested in the OVA archive. Check the "Reinitialize
the MAC address of all network cards" box at bottom of the window. Leave all other settings as default.
Click Import.
d. When the import process is complete, you will see the new Virtual Machine added to the VirtualBox
inventory in the left panel. The virtual machine is now ready to use.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 4 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
b. Click the green arrow Start button at the top portion of the VirtualBox application window. If you get the
following dialog box, click Change Network Settings and set your Bridged Adapter. Click the dropdown
list next the Name and choose your network adapter (will vary for each computer).
c. Click OK. A new window will appear, and the virtual machine boot process will start.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 5 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
d. When the boot process is complete, the virtual machine will ask for a username and password. Use the
following credentials to log into the virtual machine:
Username: analyst
Password: cyberops
You will be presented with a desktop environment: there is a launcher bar at the bottom, icons on the
desktop, and an application menu at the top.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 6 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
c. Locate and launch the web browser application. Can you navigate to your favorite search engine?
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 7 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
Click the Save the machine state radio button and click OK. The next time you start the virtual machine,
you will be able to resume working in the operating system in its current state.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 8 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
Send the shutdown signal: simulates pressing the power button on a physical computer
Power off the machine: simulates pulling the plug on a physical computer
Closing the VM using CLI:
To shut down the VM using the command line, you can use the menu options inside the VM or enter
sudo shutdown -h now command in a terminal window and provide the password cyberops when
prompted.
Rebooting the VM:
If you want to reboot the VM, you can use the menu options inside the VM or enter sudo reboot
command in a terminal and provide the password cyberops when prompted.
Note: You can use the web browser in this virtual machine to research security issues. By using the virtual
machine, you may prevent malware from being installed on your computer.
Reflection
What are the advantages and disadvantages of using a virtual machine?
Kelebihan :
Efisien & fleksibel — dalam satu device, pemakai bisa memanfaatkan berbagai macam operating system
untuk kebutuhan yang berbeda-beda.
Maintenance yang mudah — berbeda dengan komputer fisik, software virtual machine lebih mudah untuk
dikelola. Selain itu, VM juga mempunyai biaya perawatan yang lebih murah.
Kinerja yang hebat — memberdayakan pemakai guna mencapai tujuan akhir mereka dengan kinerja serta
kualitas yang bisa melampaui sistem computing konvensional.
Kekurangan :
- VM ini bisa membuat virtualisasi sistem yang terbilang kompleks dan cukup banyak memakan lokasi
hardware di komputer utama.
- Selain itu juga memakan ruang penyimpanan data virtual yang lumayan besar dan mengambil sebagian
fungsi prosesor dan RAM.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 9 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
Background / Scenario
Governments, businesses, and individual users are increasingly the targets of cyberattacks and experts
predict that these attacks are likely to increase in the future. Cybersecurity education is a top international
priority as high-profile cyber-security related incidents raise the fear that attacks could threaten the global
economy. The Center for Strategic and International Studies estimates that the cost of cybercrime to the
global economy is more than $400 billion annually and in the United State alone as many as 3000 companies
had their systems compromised in 2013. In this lab you will study four high profile cyberattacks and be
prepared to discuss the who, what, why and how of each attack.
Required Resources
PC or mobile device with Internet access
Read the articles found from your search in step 1a and be prepared to discuss and share your research
on the who, what, when, where, and why of each attack.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 10 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
Stuxnet adalah worm multi-bagian yang berjalan di stik USB dan menyebar melalui komputer Microsoft
Windows. Virus mencari tanda-tanda perangkat lunak Siemens Step 7 pada setiap PC yang terinfeksi,
yang digunakan oleh komputer industri sebagai PLC untuk mengotomatisasi dan memantau peralatan
elektro-mekanis.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 11 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
e. What was the motivation of the attackers in this case? What did they hope to achieve?
Pihak Barat mengkhawatirkan bahwa tujuan utama Iran adalah membangun senjata nuklir. Sementara Iran
selalu mengatakan tujuan program itu benar-benar untuk menghasilkan energi untuk kepentingan
damai.Stuxnet dirancang untuk menyerang kelemahan sistem pada peralatan buatan Siemens yang
digunakan untuk mengatur pasokan air, anjungan pengeboran minyak dan pembangkit tenaga listrik.
f. What was the outcome of the attack? (stolen data, ransom, system damage, etc.)
Varian yang berbeda dari Stuxnet miliki target lima organisasi Iran, kemungkinan target luas diduga adalah
infrastruktur pengayaan uranium di Iran. Symantec mencatat pada Agustus 2010 bahwa 60% dari
komputer yang terinfeksi di seluruh dunia berada di Iran. Siemens menyatakan pada 29 November cacing
tidak menyebabkan kerusakan pada pelanggan, kecuali program nuklir Iran, yang menggunakan peralatan
terembargo Siemens yang diperoleh secara rahasia, telah mengalami kerusakan karena Stuxnet.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 12 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
Background / Scenario
The Internet of Things (IoT) consists of digitally connected devices that are connecting every aspect of our
lives, including our homes, offices, cars, and even our bodies to the Internet. With the accelerating adoption of
IPv6 and the near universal deployment of Wi-Fi networks, the IoT is growing at an exponential pace. Industry
experts estimate that by 2020, the number of active IoT devices will approach 50 billion. IoT devices are
particularly vulnerable to security threats because security has not always been considered in IoT product
design. Also, IoT devices are often sold with old and unpatched embedded operating systems and software.
Required Resources
PC or mobile device with Internet access
Vulnerability akan digunakan oleh hacker sebagai jalan untuk masuk kedalam sistem secara ilegal.
Hacker biasanya akan membuat Exploit yang desesuaikan dengan vulnerability yang telah ditemukan
nya. Setiap aplikasi (service,desktop,web base) pasti memiliki celah atau vulnerability,hanya saja belum
ketauan.lambat laun akan ditemukan juga oleh hacker
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 13 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
Update Operating system,firmware dan aplikasi. Karena celah keamanan ini berasal dari software atau
service yang berjalan di dalam sistem, maka jangan lupa untuk mengikuti perkembangan aplikasi yang
digunakan. Selalu update secara berkala baik Operating sistem ataupun aplikasi,karena vulnerability bisa
berasal dari Operating software ataupun aplikasi yang terinstall di komputer. karena meggupdate aplikasi
adalah obat untuk mengatasi vulnerability
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 14 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
Background / Scenario
In 2016, it was estimated that businesses lost $400 million dollars annually to cyber criminals. Governments,
businesses, and individual users are increasingly the targets of cyberattacks and cybersecurity incidents are
becoming more common.
In this lab, you will create three hypothetical cyber attackers, each with an organization, an attack, and a
method for an organization to prevent or mitigate the attack.
Note: You can use the web browser in virtual machine installed in a previous lab to research security issues.
By using the virtual machine, you may prevent malware from being installed on your computer.
Required Resources
PC or mobile device with Internet access
Scenario 1:
a. Who is the attacker?
Penjahat cyber.
• Jangan gunakan wifi yang tidak dikenal untuk melakukan transaksi perbankan.
• Jangan berbagi kunci keamanan dengan siapa pun.
• Dicurigai tawar-menawar terlalu bagus dalam pembelian online yang, oleh karena
itu, tidak nyata.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 15 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
Scenario 2:
a. Who is the attacker?
Hacker
b. What organization/group is the attacker associated with?
Di Kolombia hacker yang berbeda tidak terkait dengan organisasi seperti itu.
Lihatlah tautan yang akan Anda buka, karena mereka dapat dikloning dan dibawa,
bahkan, kunci keamanan halaman resmi, tetapi mereka kehilangan surat atau simbol
yang merupakan tanda penipuan mereka.
Scenario 3:
a. Who is the attacker?
Ciberdelincuentes.
b. What organization/group is the attacker associated with?
Di Kolombia hacker yang berbeda tidak terkait dengan organisasi seperti itu.
c. What is the motive of the attacker?
Pencurian 500 juta peso dari sebuah bank di Kolombia.
d. What method of attack was used?
Pembuatan lebih dari 20 rekening tabungan melalui situs web Bancolombia secara ilegal
menggunakan identitas pihak ketiga.
e. What was the target and vulnerability used against the business?
Upaya untuk membeli dua jam tangan Rolex, masing-masing seharga 25 juta peso, di sebuah toko
perhiasan di Bucaramanga. Seorang pria yang ingin membeli 10 sepeda motor di sebuah dealer di Cúcuta
tanpa formalitas lebih lanjut. Dan draft dugaan sumbangan dari Fasad LSM Di Medellín. Ini adalah
beberapa modalitas yang dengannya Jaringan penjahat cyber mencoba menghasilkan uang dari bank
Bancolombia.
f. How could this attack be prevented or mitigated?
Setiap saat peringatan ini dan tidak meminjamkan identitas Anda atau akun Anda untuk
deposito atau penggunaan asal meragukan atau untuk orang yang tidak dikenal.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 16 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
Background / Scenario
In our technology-centric world, as the world gets more connected, it also gets less safe. Cybersecurity is one
of the fastest growing and in-demand professions. Individuals in this field perform a wide variety of jobs
including but not limited to consultation, investigation and program management services to mitigate risks
through both internal and external sources. Cybersecurity professionals are required to evaluate, design and
implement security plans, conduct in-depth fraud investigation and perform security research and risk
assessment and propose solutions to potential security breaches.
Individuals with good security skills have a great earning potential. To be considered for one of these high
paying jobs, it is imperative to have the proper qualifications. To this effect, it is important to consider the
industry certificates available for this career path. There are many certifications to choose from, and selecting
the right certificate(s) for you individually requires careful consideration.
Note: You can use the web browser in virtual machine installed in a previous lab to research security related
issues. By using the virtual machine, you may prevent malware from being installed on your computer.
Required Resources
PC or mobile device with Internet access
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 17 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
- CompTIA Security +: Pemegang kredensial Keamanan + diakui sebagai possessing keterampilan teknis
yang unggul, pengetahuan dan keahlian yang luas dalam berbagai disiplin ilmu terkait keamanan.
Kredensial CompTIA Security+ juga disetujui oleh Departemen Pertahanan AS untuk memenuhi
persyaratan Directive 8140/8570.01-M. Selain itu, kredensial Keamanan + sesuai dengan standar untuk
ISO 17024.Kredensial Keamanan + memerlukan satu ujian, saat ini dihargai $ 339. Satu: SY0-501 (90
pertanyaan, 90 menit untuk menyelesaikan; 750 pada skala 100-900 diperlukan untuk lulus).
- CISSP: Certified Information Systems Security Professional (CISSP) adalah sertifikasi tingkat lanjutan
untuk pro TI yang serius tentang karir dalam keamanan information. Pemegang kredensial CISSP adalah
pengambil keputusan yang memiliki pengetahuan ahli dan keterampilan teknis yang diperlukan untuk
mengembangkan, membimbing dan kemudian mengelola standar keamanan, kebijakan dan prosedur
dalam organisasi mereka. CISSP terus banyak dicari oleh para profesional TI dan diakui dengan baik
oleh organisasi TI. Ini adalah perlengkapan reguler pada survei sertifikasi keamanan yang paling dicari
dan harus dimiliki. (ISC) 2 juga menawarkan tiga konsentrasi CISSP yang menargetkan bidang minat
tertentu dalam keamanan TI:
• Arsitektur (CISSP-ISSAP)
• Teknik (CISSP-ISSEP)
• Manajemen (CISSP-ISSMP)
Ujian konsentrasi CISSP masing-masing $ 599, dan pencari kredensial saat ini harus memiliki
CISSP yang valid. Biaya tahunan sebesar $ 85 diperlukan untuk mempertahankan kredensial
CISSP. Sertifikasi ulang diperlukan setiap tiga tahun.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 18 of 20 www.netacad.com
Lab - Installing the CyberOps Workstation Virtual Machine
Step 2: Investigate positions available within cybersecurity
Indeed.com is one of the largest job site worldwide. Using your browser of choice, access indeed.com and
search for cybersecurity jobs available within the last two weeks.
1. How many new job listings were posted within the last two weeks?
Ada 26 pekerjaan yang terdaftar.
6. Investigate online resources that allow you to legally test your hacking skills. These tools allow a novice
with limited cyber security experience to sharpen their penetration testing skills, such as Google Gruyere
(Web Application Exploits and Defenses).
DVIA, Game of Hacks, HackThis!!, Hack This Site, Hellbound Hackers, , Muttilidae, OverTheWire,
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 19 of 20 www.netacad.com