Professional Documents
Culture Documents
“ Penanganan Insiden Keamanan Siber Pada Kasus Eksploitasi Aplikasi Web, Jaringan dan Data Breach“
Kesiapsiagaan Teknis Insiden Keamanan Siber Pemerintah Pusat
Bandung, 19 dan 21 September 2022
SPBE
Outline
Source : https://www.itu.int/epublications/publication/D-STR-GCI.01-2021-HTM-E
LANSKAP ANCAMAN SIBER GLOBAL
Major
Attack
Types
you need to know
at least
Source : https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021
LANSKAP ANCAMAN SIBER GLOBAL
7. Mobile Device
5. Cloud Vulnerability 6. Ransomware 8. Internet of Things
Vulnerability
Online data storage and transfer provides Hackers can capture sensitive data or Devices that connect to multiple Smart technology users may not realize
increased opportunities for a potential take down networks and demand networks are exposed to more potential that any IoT device can be hacked to
hack payment for restored access. security threats. obtain network access.
Source : https://www.embroker.com/blog/top-10-cybersecurity-threats-2022/
LANSKAP ANCAMAN SIBER NASIONAL 2022
LANSKAP ANCAMAN SIBER NASIONAL 2022
LANSKAP ANCAMAN SIBER NASIONAL 2022
LANSKAP ANCAMAN SIBER NASIONAL 2022
LANSKAP ANCAMAN SIBER NASIONAL 2022
EKSPLOITASI APLIKASI WEB DAN
JARINGAN
EKSPLOITASI APLIKASI WEB DAN
JARINGAN
MITRE ATT&CK threat models and methodologies
Reference - https://attack.mitre.org/
EKSPLOITASI APLIKASI WEB DAN
JARINGAN
Reference:
- https://owasp.org/
- https://owasp.org/www-project-top-ten/
EKSPLOITASI APLIKASI WEB DAN
JARINGAN
Content Management
Operating System
System ( CMS )
Dracos OS Caine OS
EKSPLOITASI APLIKASI WEB DAN
JARINGAN
Cloud
Better Chance
for Attackers API / Fintech
IoT(Physical)
Data connection
Latest technology
trend changes
attackers’ chance of
Cryptocurrency
successful
exploitation
DevOps / DevSecOps
Reference :
https://cybersecurityforme.com/cybersecurity-and-latest-technology-trends/
DATA BREACH ( KEBOCORAN DATA )
Data Breach
Ransomware McDonald’s
https://pbs.twimg.com/media/FMd_r9bXIAYlGG7?format=jpg&name=900x900;
https://borncity.com/win/2022/02/26/nvidia-von-cyberangriff-betroffen-25-feb-2022/
DATA BREACH
https://www.viva.co.id/digital/digilife/1444068-
kebocoran-data-bank-indonesia-terus-bertambah
DATA BREACH
SOLUSI DAN TINDAK PREVENTIF
SOLUSI DAN TINDAKAN PREVENTIF
Reference : https://portswigger.net/web-security/cross-site-scripting
CYBERDRILL EXERCISE
Data Breach 17 Reconnaissance , Phising Attack & Infiltrated
Trending
Data Sale in
Random Search Organization Search
Dark Web Random Gathering Information
16 Share in Social From Public Sources
Media 1 2
15 Share Data Breach
to Community to 14
Upload Backdoor take attention
Target Found
3
10
13 8
Database
CYBERDRILL EXERCISE
Case Study Cyber Attack Anatomy of Data Breach
Recon Phising Infiltrated Backdoor Lateral Data Exfiltrate
Movement Collection
1 2 3 4 5 6 7