SlideShare a Scribd company logo
1 of 36
1
Keamanan Informasi
Management Information Systems, 9th edition,
By Raymond McLeod, Jr. and George P. Schell
© 2004, Prentice Hall, Inc.
2
Pengantar
• Keamanan informasi dimaksudkan untuk mencapai
kerahasiaan, ketersediaan, dan integritas di dalam sumber
daya informasi perusahaan.
• Manajemen keamanan informasi terdiri dari:
1. Perlindungan Sehari-hari disebut Manajemen
Keamanan Informasi (information security
management/ ISM)
2. Persiapan untuk menghadapi operasi setelah bencana
disebut Manajemen Kesinambungan Bisnis (business
continuity management /BCM)
3
Kemanan Informasi
• Kemanan Informasi menggambarkan
usaha untuk melindungi komputer dan non-
peralatan komputer, fasilitas, data, dan
informasi dari penyalahgunaan oleh orang
yang tidak bertanggung jawab
• Definisi ini meliputi pengutip, fax mesin,
dan semua jenis media, termasuk dokumen
kertas
4
Tujuan Keamanan Informasi
• Keamanan informasi dimaksudkan untuk mencapai
tiga sasaran utama, yaitu:
– Kerahasiaan: melindungi data dan informasi
perusahaan dari penyingkapan orang –orang
yang tidak berhak
– Ketersediaan: meyakinkan bahwa data dan
informasi perusahaan hanya dapat digunakan
oleh orang yang berhak menggunakannya.
– Integritas: sistem informasi perlu menyediakan
representasi yang akurat dari sistem fisik yang
direpresentasikan
5
Manajemen Keamanan Informasi
• Istilah corporate information systems
security officer (CISSO) telah digunakan
untuk orang yang berada di organisasi yang
bertanggung jawab pada sistem keamanan
informasi perusahaan.
• Saat ini ada istilah baru yaitu corporate
information assurance officer (CIAO)
yang melaporkan kepada CEO dan
mengatur suatu unit jaminan informasi
6
Manajemen Keamanan
Informasi (ISM)
• ISM terdiri dari empat langkah:
1. Identifikasi threats (ancaman) yang dapat
menyerang sumber daya informasi perusahaan
2. Mendefinisikan resiko dari ancaman yang dapat
memaksakan
3. Penetapan kebijakan keamanan informasi
4. Menerapkan controls yang tertuju pada resiko
• Gambar 9.1 mengilustrasikan pendekatan manajemen
resiko
• Benchmarks juga digunakan untuk memastikan
integritas dari sistem manajemen resiko
7
8
Ancaman
• Ancaman keamanan informasi adalah seseorang,
organisasi, mekanisme, atau peristiwa yang dapat
berpotensi menimbulkan kejahatan pada sumber
daya informasi perusahaan
• Ancaman dapat berupa internal atau external,
disengaja atau tidak disengaja
• Gambar 9.2 memperlihatkan tujuan keamanan
informasi dan bagaimana keamanan informas
diberlakukan terhadap empat jenis resiko:
• Ancaman Internal dan External
• Disengaja dan tidak disengaja
9
10
Resiko
Tindakan tidak sah yang menyebabkan resiko dapat
digolongkan ke dalam empat jenis :
1. Pencurian dan Penyingkapan tidak sah
2. Penggunaan Tidak Sah
3. Pembinasaan dan Pengingkaran Layanan
yang tidak sah
4. Modifikasi yang tidak sah
11
Ancaman Yang Paling
Terkenal – “VIRUS”
• sebuah virus adalah sebuah program komputer yang
dapat mereplikasi dirinya sendiri tanpa pengetahuan
pengguna
• sebuah worm tidak dapat mereplikasi dirinya sendiri
tanpa sebuah sistem tapi dapat memancarkan salinan
dengan sendirinya oleh e-mail
• sebuah Trojan horse tidak dapat mereplikasi
maupun mendstribusikan dirinya sendiri. Distribusi
terpenuhi oleh para pemakai yang
mendistribusikannya sebagai utilitas, maka ketika
digunakan menghasilkan sesuatu perubahan yang
tidak dikehendaki dalam kemampuan sistem
12
Pertimbangan E-COMMERCE
• E-commerce telah memperkenalkan sebuah keamanan
resiko yang baru: penipuan kartu kredit. Keduanya
American Express dan Visa telah
mengimplementasikan program yang mengarahkan
secara rinci pada e-commerce
• American Express mengumumkan “penyediaan"
angka-angka kartu kredit. Angka ini, dibandingkan
dengan angka kartu kredit pelanggannya, yang
ditujukan pada perdagangan eceran menggunakan e-
commerce, yang memilih American Express untuk
pembayarannya.
• Visa telah mengumumkan sepuluh praktek terkait
dengan keamanan yang mereka harap pengecernya
untuk mengikuti lebih dari tiga langkah praktek yang
umum dilakukan
13
Tindakan Pencegahan Visa
Pengecer Harus:
– Instalasi dan pelihara firewall
– Menjaga sistem keamanan selalu “up to date”
– Enkripsi penyimpanan data dan sebarkan data
– Gunakan dan perbaharui software antivirus
– Membatasi akses data bagi mereka yang memang perlu mengetahui
– Menugaskan ID unik untuk orang yang memiliki akses data khusus
– Menelusuri akses data dengan ID unik
– Tidak menggunakan password default dari vendor
– Secara teratur menguji keamanan sistem
Pengecer perlu:
– Memantau pegawai yang memiliki akses data
– Tidak meninggalkan data (disket, kertas, dll) atau
komputer dalam keadaan tidak aman
– Hapus data jika sudah tidak digunakan
14
Manajemen Resiko
• The four sub steps to defining information risks
are:
1. Identify business assets to be protected from
risks
2. Recognize the risks
3. Determine the level of impact on the firm
should the risks materialize
4. Analyze the vulnerabilities of the firm
• A systematic approach can be taken to sub steps
3 and 4 by determining the impact and analyzing
the vulnerabilities
• Table 9.1 illustrates the options.
15
16
Risk Analysis Report
• The findings of the risk analysis should be
documented in a report that contains detailed
information such as the following for each risk:
1. A description of the risk
2. Source of the risk
3. Severity of the risk
4. Controls that are being applied to the risk
5. The owner(s) of the risk
6. Recommended action to address the risk
7. Recommended time frame for addressing the risk
8. What was done to mitigate the risk
17
INFORMATION SECURITY POLICY
• A security policy can be implemented using
the following five phase approach (Fig.
9.3):
• Phase 1: Project Initiation
• Phase 2: Policy Development
• Phase 3: Consultation and Approval
• Phase 4:Awareness and Education
• Phase 5: Policy Dissemination
18
19
Separate policies are developed for:
• Information systems security
• System access control
• Personnel security
• Physical and environmental security
• Telecommunications security
• Information classification
• Business continuity planning
• Management accountability
These policies are distributed to employees,
preferably in writing and in educational and training
programs. With the policies established, controls can
be implemented
20
CONTROLS
• A control is a mechanism implemented to
protect the firm from risks or minimize the
impact of those risks on the firm should they
occur:
1. Technical controls are those built into systems by
system developers during the system development life
cycle
2. Access control is the basis for security against threats
by unauthorized persons
3. Intrusion detection systems try to recognize an
attempt to breach security before it has the
opportunity to inflict damage
21
22
Access Control
1. User identification. Users first identify themselves
by providing something that they know, such as a
password
2. User authentication. Once initial identification has
been accomplished, users verify their right to access
by providing something that they have, such as a
smart card or token, or an identification chip
3. User authorization. With the identification and
authentication checks passed, a person can then be
authorized certain levels or degrees of use. For
example, one user might be authorized only to read
from a file, whereas another might be authorized to
make changes
23
Firewalls
• A firewall acts as a filter and barrier restricting the
data flowing between the firm’s network and the
Internet
• There are three types of firewalls:
– Packet-Filters – are routers equipped with data tables of IP
addresses which reflect the filtering policy positioned
between the Internet and the internal network, it can serve
as a firewall
– Circuit-Level Firewall – installed between the Internet
and the firm's network but closer to the communications
medium
– Application-Level Firewall – located between the router
and the computer performing the application
24
Cryptographic Controls
• Cryptography is the use of coding by means of
mathematical processes
• The data and information can be encrypted as it
resides in storage and or transmitted over
networks
• If an unauthorized person gains access, the
encryption makes the data and information
unreadable and prevents its unauthorized use
• Special protocols such as SET (Secure Electronic
Transactions) have been developed for use in e-
commerce
25
FORMAL CONTROLS
• Formal controls include the establishment of:
• Codes of conduct
• Documentation of expected procedures and
practices
• Monitoring and preventing behavior that varies
from the established guidelines
• The controls are formal in that management:
• Devotes considerable time to devising them
• They are documented in writing
• They are expected to be in force for the long term
26
INFORMAL CONTROLS
Informal controls include such activities as:
• Instilling the firm's ethical beliefs in its
employees;
• Ensuring an understanding of the firm's
mission and objectives;
• Education and training programs; and
• Management development programs
These controls are intended to ensure that the
firm's employees both understand and
support the security program
27
ACHIEVING THE PROPER LEVEL
OF CONTROLS
• As all three types of controls, technical, formal, and
informal - cost money
• The idea is to establish controls at the proper level
• The control decision boils down to cost versus return,
but in some industries there are other considerations
• In banking, when engaging in risk management for
ATMs, controls must keep the system secure but not at
the cost of diminishing customer convenience
• In health care, the system should not be so secure as to
reduce the amount of necessary patient information
available to hospitals and physicians
28
GOVERNMENT AND
INDUSTRY ASSISTANCE
• Several governments and international
organizations have established standards
(next slide) intended to serve as guidelines
for organizations seeking to achieve
information security
• Some are in the form of benchmarks,
sometimes referred to as a baseline
29
Government and Industry Assistance
• United Kingdom's BS7799 The UK standards establish a set of baseline controls.
Both Australia and New Zealand have instituted controls based on BS 7799
• BSI IT Baseline Protection Manual The baseline approach is also followed by the
German Bundesamt fur Sicherheit in der Informationstechnik (BSI). The baselines
are intended to provide reasonable security when normal protection requirements are
intended. The baselines can also serve as the basis for higher degrees of protection
when those are desired
• COBIT COBIT, from the Information Systems Audit and Control Association &
Foundation (ISACAF), focuses on the process that a firm can follow in developing
standards, paying special attention to the writing and maintaining of the document
• GASSP Generally Accepted System Security Principles (GASSP) is a product of
the U. S. National Research Council. Emphasis is on the rationale for establishing a
security policy
• GMITS The Guidelines for the Management of IT Security (GMITS) is a product
of the International Standards Organization (ISO) Joint Technical Committee and it
provides a list of the information security policy topics that should be included in an
organization's standards
• ISF Standard of Good Practice The Information Security Forum Standard of
Good Practice takes a baseline approach, devoting considerable attention to the user
behavior that is expected if the program is to be successful
30
GOVERNMENT LEGISLATION
• Governments in both the U.S. and U.K. have
established standards and passed legislation
aimed at addressing the increasing
importance of information security:
– U.S. Government Computer Security Standards
– The U.K. Anti-terrorism, Crime and Security
Act (ATCSA) 2001
– U.S. Government Internet Crime Legislation
31
INDUSTRY STANDARDS
• The Center for Internet Security (CIS) is
a non profit organization dedicated to
assisting computer users to make their
systems more secure
• CIS Benchmarks have been established and
are integrated in a software package that
calculates a "security" score on a 10-point
scale
32
PROFESSIONAL CERTIFICATION
• Beginning in the 1960s the IT profession
began offering certification programs:
– Information Systems Audit and Control
Association (ISACA)
– International Information System Security
Certification Consortium (ISC)
– SANS (SysAdmin, Audit, Network,
Security) Institute
33
PUTTING INFORMATION
SECURITY MANAGEMENT IN
PERSPECTIVE
• Firms should put in place an information security
management policy before putting controls in place
• The policy can be based on an identification of
threats and risks or on guidelines provided by
governments and industry associations
• Firms implement a combination of technical, formal,
and informal controls expected to offer the desired
level of security within cost parameters and in
accordance with other considerations that enable the
firm and its systems to function effectively
34
BUSINESS CONTINUITY
MANAGEMENT (BCM)
• The key element in BCM is a contingency plan,
formally detailing the actions to be taken in the
event that there is a disruption, or threat of
disruption, in any part of the firm’s computing
operation
• Rather using a single, large contingency plan, a
firm’s best approach is to develop several sub-
plans that address specific contingencies. Such as:
• An emergency plan
• A backup plan
• A vital records plan
35
PUTTING BUSINESS CONTINUITY
MANAGEMENT IN PERSPECTIVE
• Much effort has gone into contingency planning
and much information and assistance is available
• Some firms use packaged plans they can adapt to
their needs
• TAMP Computer Systems markets a Disaster
Recovery System (DRS) that includes a database
management system, instructions and tools that
can be used in preparing a recovery plan
• There are also guidelines and outlines that firms
can use as starting points or benchmarks to
achieve
36
END OF CHAPTER 9

More Related Content

What's hot

Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit processDivya Tiwari
 
Modul diktat kuliah sia
Modul diktat kuliah siaModul diktat kuliah sia
Modul diktat kuliah siasdcahyo
 
Keamanan sistem informasi
Keamanan sistem informasiKeamanan sistem informasi
Keamanan sistem informasiEko Mardianto
 
isu sosial dan etika dalam sistem informasi
isu sosial dan etika dalam sistem informasiisu sosial dan etika dalam sistem informasi
isu sosial dan etika dalam sistem informasiKasi Irawati
 
Keamanan sistem informasi
Keamanan sistem informasi Keamanan sistem informasi
Keamanan sistem informasi handy watung
 
Pengantar Dan Konsep Keamanan Sistem Informasi
Pengantar Dan Konsep Keamanan Sistem Informasi   Pengantar Dan Konsep Keamanan Sistem Informasi
Pengantar Dan Konsep Keamanan Sistem Informasi Indri Sukmawati Rahayu
 
Sistem informasi akuntansi- sistem pengendalian intern
Sistem informasi akuntansi- sistem pengendalian internSistem informasi akuntansi- sistem pengendalian intern
Sistem informasi akuntansi- sistem pengendalian internReni Deswita
 
Bab 2 sistem informasi untuk keunggulan kompetitif
Bab 2   sistem informasi untuk keunggulan kompetitifBab 2   sistem informasi untuk keunggulan kompetitif
Bab 2 sistem informasi untuk keunggulan kompetitifquantum enterprise
 
Komunikasi Bisnis_Komunikasi Antarpribadi
Komunikasi Bisnis_Komunikasi AntarpribadiKomunikasi Bisnis_Komunikasi Antarpribadi
Komunikasi Bisnis_Komunikasi AntarpribadiAni Yuliani
 
Sistem informasi manajemen keamanan informasi
Sistem informasi manajemen    keamanan informasiSistem informasi manajemen    keamanan informasi
Sistem informasi manajemen keamanan informasiHarisno Al-anshori
 
BAB 3 Menggunakan Teknologi Informasi dalam Menjalankan Perdagangan Elektroni...
BAB 3Menggunakan Teknologi Informasi dalam Menjalankan Perdagangan Elektroni...BAB 3Menggunakan Teknologi Informasi dalam Menjalankan Perdagangan Elektroni...
BAB 3 Menggunakan Teknologi Informasi dalam Menjalankan Perdagangan Elektroni...Emilia Wati
 
Si&pi,wendi, hapzi ali, siklus produksi dan sistem informasi produksi, un...
Si&pi,wendi, hapzi ali, siklus produksi dan sistem informasi produksi, un...Si&pi,wendi, hapzi ali, siklus produksi dan sistem informasi produksi, un...
Si&pi,wendi, hapzi ali, siklus produksi dan sistem informasi produksi, un...wendi_bppk
 
Manajemen Keamanan Informasi Berbasis Standar di Lembaga Informasi: Pengenala...
Manajemen Keamanan Informasi Berbasis Standar di Lembaga Informasi: Pengenala...Manajemen Keamanan Informasi Berbasis Standar di Lembaga Informasi: Pengenala...
Manajemen Keamanan Informasi Berbasis Standar di Lembaga Informasi: Pengenala...Muhammad Bahrudin
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approachtschraider
 
Keunggulan operasional dan kedekatan dengan pelanggan
Keunggulan operasional dan kedekatan dengan pelangganKeunggulan operasional dan kedekatan dengan pelanggan
Keunggulan operasional dan kedekatan dengan pelanggantasyaifada63
 
Tata kelola ti (pt. telkom)
Tata kelola ti (pt. telkom)Tata kelola ti (pt. telkom)
Tata kelola ti (pt. telkom)Elisa Lumintang
 
Mitigasi Risiko Fraud _Training FRAUD RISK ASSESSMENT
Mitigasi Risiko Fraud _Training FRAUD RISK ASSESSMENTMitigasi Risiko Fraud _Training FRAUD RISK ASSESSMENT
Mitigasi Risiko Fraud _Training FRAUD RISK ASSESSMENTKanaidi ken
 
Quiz si & pi minggu 4 55026 (dosen hapzi, prof. dr. mm)
Quiz si & pi minggu 4   55026 (dosen hapzi, prof. dr. mm)Quiz si & pi minggu 4   55026 (dosen hapzi, prof. dr. mm)
Quiz si & pi minggu 4 55026 (dosen hapzi, prof. dr. mm)ADE NURZEN
 

What's hot (20)

Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
Modul diktat kuliah sia
Modul diktat kuliah siaModul diktat kuliah sia
Modul diktat kuliah sia
 
Keamanan sistem informasi
Keamanan sistem informasiKeamanan sistem informasi
Keamanan sistem informasi
 
isu sosial dan etika dalam sistem informasi
isu sosial dan etika dalam sistem informasiisu sosial dan etika dalam sistem informasi
isu sosial dan etika dalam sistem informasi
 
Keamanan sistem informasi
Keamanan sistem informasi Keamanan sistem informasi
Keamanan sistem informasi
 
Pengantar Dan Konsep Keamanan Sistem Informasi
Pengantar Dan Konsep Keamanan Sistem Informasi   Pengantar Dan Konsep Keamanan Sistem Informasi
Pengantar Dan Konsep Keamanan Sistem Informasi
 
Sistem informasi akuntansi- sistem pengendalian intern
Sistem informasi akuntansi- sistem pengendalian internSistem informasi akuntansi- sistem pengendalian intern
Sistem informasi akuntansi- sistem pengendalian intern
 
Bab 2 sistem informasi untuk keunggulan kompetitif
Bab 2   sistem informasi untuk keunggulan kompetitifBab 2   sistem informasi untuk keunggulan kompetitif
Bab 2 sistem informasi untuk keunggulan kompetitif
 
Komunikasi Bisnis_Komunikasi Antarpribadi
Komunikasi Bisnis_Komunikasi AntarpribadiKomunikasi Bisnis_Komunikasi Antarpribadi
Komunikasi Bisnis_Komunikasi Antarpribadi
 
Sistem informasi manajemen keamanan informasi
Sistem informasi manajemen    keamanan informasiSistem informasi manajemen    keamanan informasi
Sistem informasi manajemen keamanan informasi
 
BAB 3 Menggunakan Teknologi Informasi dalam Menjalankan Perdagangan Elektroni...
BAB 3Menggunakan Teknologi Informasi dalam Menjalankan Perdagangan Elektroni...BAB 3Menggunakan Teknologi Informasi dalam Menjalankan Perdagangan Elektroni...
BAB 3 Menggunakan Teknologi Informasi dalam Menjalankan Perdagangan Elektroni...
 
Si&pi,wendi, hapzi ali, siklus produksi dan sistem informasi produksi, un...
Si&pi,wendi, hapzi ali, siklus produksi dan sistem informasi produksi, un...Si&pi,wendi, hapzi ali, siklus produksi dan sistem informasi produksi, un...
Si&pi,wendi, hapzi ali, siklus produksi dan sistem informasi produksi, un...
 
Manajemen Keamanan Informasi Berbasis Standar di Lembaga Informasi: Pengenala...
Manajemen Keamanan Informasi Berbasis Standar di Lembaga Informasi: Pengenala...Manajemen Keamanan Informasi Berbasis Standar di Lembaga Informasi: Pengenala...
Manajemen Keamanan Informasi Berbasis Standar di Lembaga Informasi: Pengenala...
 
Keamanan Komputer [Sistem Manajemen Keamanan Informasi]
Keamanan Komputer [Sistem Manajemen Keamanan Informasi]Keamanan Komputer [Sistem Manajemen Keamanan Informasi]
Keamanan Komputer [Sistem Manajemen Keamanan Informasi]
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
 
Keunggulan operasional dan kedekatan dengan pelanggan
Keunggulan operasional dan kedekatan dengan pelangganKeunggulan operasional dan kedekatan dengan pelanggan
Keunggulan operasional dan kedekatan dengan pelanggan
 
Tata kelola ti (pt. telkom)
Tata kelola ti (pt. telkom)Tata kelola ti (pt. telkom)
Tata kelola ti (pt. telkom)
 
Mitigasi Risiko Fraud _Training FRAUD RISK ASSESSMENT
Mitigasi Risiko Fraud _Training FRAUD RISK ASSESSMENTMitigasi Risiko Fraud _Training FRAUD RISK ASSESSMENT
Mitigasi Risiko Fraud _Training FRAUD RISK ASSESSMENT
 
Quiz si & pi minggu 4 55026 (dosen hapzi, prof. dr. mm)
Quiz si & pi minggu 4   55026 (dosen hapzi, prof. dr. mm)Quiz si & pi minggu 4   55026 (dosen hapzi, prof. dr. mm)
Quiz si & pi minggu 4 55026 (dosen hapzi, prof. dr. mm)
 
manajemen risiko kepatuhan
manajemen risiko kepatuhanmanajemen risiko kepatuhan
manajemen risiko kepatuhan
 

Similar to Keamanan informasi

Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVEric Vanderburg
 
Information Security
Information Security Information Security
Information Security Alok Katiyar
 
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptWilsonWanjohi5
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docxmoggdede
 
Information management unit 4 security,control and reporting
Information management unit 4 security,control and reportingInformation management unit 4 security,control and reporting
Information management unit 4 security,control and reportingGanesha Pandian
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxTikdiPatel
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
IAS101_Week 2-3_Introduction to Information Systems and Security.pptx
IAS101_Week 2-3_Introduction to Information Systems and Security.pptxIAS101_Week 2-3_Introduction to Information Systems and Security.pptx
IAS101_Week 2-3_Introduction to Information Systems and Security.pptxAngela Arago
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxNeilStark1
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfNeilStark1
 

Similar to Keamanan informasi (20)

internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
Information Security
Information Security Information Security
Information Security
 
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.ppt
 
Information security management
Information security managementInformation security management
Information security management
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
Unit v
Unit vUnit v
Unit v
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
Information management unit 4 security,control and reporting
Information management unit 4 security,control and reportingInformation management unit 4 security,control and reporting
Information management unit 4 security,control and reporting
 
Security Ch-1.pptx
Security Ch-1.pptxSecurity Ch-1.pptx
Security Ch-1.pptx
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
IAS101_Week 2-3_Introduction to Information Systems and Security.pptx
IAS101_Week 2-3_Introduction to Information Systems and Security.pptxIAS101_Week 2-3_Introduction to Information Systems and Security.pptx
IAS101_Week 2-3_Introduction to Information Systems and Security.pptx
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
Mis 1
Mis 1Mis 1
Mis 1
 
MIS chap # 9.....
MIS chap # 9.....MIS chap # 9.....
MIS chap # 9.....
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
 

Keamanan informasi

  • 1. 1 Keamanan Informasi Management Information Systems, 9th edition, By Raymond McLeod, Jr. and George P. Schell © 2004, Prentice Hall, Inc.
  • 2. 2 Pengantar • Keamanan informasi dimaksudkan untuk mencapai kerahasiaan, ketersediaan, dan integritas di dalam sumber daya informasi perusahaan. • Manajemen keamanan informasi terdiri dari: 1. Perlindungan Sehari-hari disebut Manajemen Keamanan Informasi (information security management/ ISM) 2. Persiapan untuk menghadapi operasi setelah bencana disebut Manajemen Kesinambungan Bisnis (business continuity management /BCM)
  • 3. 3 Kemanan Informasi • Kemanan Informasi menggambarkan usaha untuk melindungi komputer dan non- peralatan komputer, fasilitas, data, dan informasi dari penyalahgunaan oleh orang yang tidak bertanggung jawab • Definisi ini meliputi pengutip, fax mesin, dan semua jenis media, termasuk dokumen kertas
  • 4. 4 Tujuan Keamanan Informasi • Keamanan informasi dimaksudkan untuk mencapai tiga sasaran utama, yaitu: – Kerahasiaan: melindungi data dan informasi perusahaan dari penyingkapan orang –orang yang tidak berhak – Ketersediaan: meyakinkan bahwa data dan informasi perusahaan hanya dapat digunakan oleh orang yang berhak menggunakannya. – Integritas: sistem informasi perlu menyediakan representasi yang akurat dari sistem fisik yang direpresentasikan
  • 5. 5 Manajemen Keamanan Informasi • Istilah corporate information systems security officer (CISSO) telah digunakan untuk orang yang berada di organisasi yang bertanggung jawab pada sistem keamanan informasi perusahaan. • Saat ini ada istilah baru yaitu corporate information assurance officer (CIAO) yang melaporkan kepada CEO dan mengatur suatu unit jaminan informasi
  • 6. 6 Manajemen Keamanan Informasi (ISM) • ISM terdiri dari empat langkah: 1. Identifikasi threats (ancaman) yang dapat menyerang sumber daya informasi perusahaan 2. Mendefinisikan resiko dari ancaman yang dapat memaksakan 3. Penetapan kebijakan keamanan informasi 4. Menerapkan controls yang tertuju pada resiko • Gambar 9.1 mengilustrasikan pendekatan manajemen resiko • Benchmarks juga digunakan untuk memastikan integritas dari sistem manajemen resiko
  • 7. 7
  • 8. 8 Ancaman • Ancaman keamanan informasi adalah seseorang, organisasi, mekanisme, atau peristiwa yang dapat berpotensi menimbulkan kejahatan pada sumber daya informasi perusahaan • Ancaman dapat berupa internal atau external, disengaja atau tidak disengaja • Gambar 9.2 memperlihatkan tujuan keamanan informasi dan bagaimana keamanan informas diberlakukan terhadap empat jenis resiko: • Ancaman Internal dan External • Disengaja dan tidak disengaja
  • 9. 9
  • 10. 10 Resiko Tindakan tidak sah yang menyebabkan resiko dapat digolongkan ke dalam empat jenis : 1. Pencurian dan Penyingkapan tidak sah 2. Penggunaan Tidak Sah 3. Pembinasaan dan Pengingkaran Layanan yang tidak sah 4. Modifikasi yang tidak sah
  • 11. 11 Ancaman Yang Paling Terkenal – “VIRUS” • sebuah virus adalah sebuah program komputer yang dapat mereplikasi dirinya sendiri tanpa pengetahuan pengguna • sebuah worm tidak dapat mereplikasi dirinya sendiri tanpa sebuah sistem tapi dapat memancarkan salinan dengan sendirinya oleh e-mail • sebuah Trojan horse tidak dapat mereplikasi maupun mendstribusikan dirinya sendiri. Distribusi terpenuhi oleh para pemakai yang mendistribusikannya sebagai utilitas, maka ketika digunakan menghasilkan sesuatu perubahan yang tidak dikehendaki dalam kemampuan sistem
  • 12. 12 Pertimbangan E-COMMERCE • E-commerce telah memperkenalkan sebuah keamanan resiko yang baru: penipuan kartu kredit. Keduanya American Express dan Visa telah mengimplementasikan program yang mengarahkan secara rinci pada e-commerce • American Express mengumumkan “penyediaan" angka-angka kartu kredit. Angka ini, dibandingkan dengan angka kartu kredit pelanggannya, yang ditujukan pada perdagangan eceran menggunakan e- commerce, yang memilih American Express untuk pembayarannya. • Visa telah mengumumkan sepuluh praktek terkait dengan keamanan yang mereka harap pengecernya untuk mengikuti lebih dari tiga langkah praktek yang umum dilakukan
  • 13. 13 Tindakan Pencegahan Visa Pengecer Harus: – Instalasi dan pelihara firewall – Menjaga sistem keamanan selalu “up to date” – Enkripsi penyimpanan data dan sebarkan data – Gunakan dan perbaharui software antivirus – Membatasi akses data bagi mereka yang memang perlu mengetahui – Menugaskan ID unik untuk orang yang memiliki akses data khusus – Menelusuri akses data dengan ID unik – Tidak menggunakan password default dari vendor – Secara teratur menguji keamanan sistem Pengecer perlu: – Memantau pegawai yang memiliki akses data – Tidak meninggalkan data (disket, kertas, dll) atau komputer dalam keadaan tidak aman – Hapus data jika sudah tidak digunakan
  • 14. 14 Manajemen Resiko • The four sub steps to defining information risks are: 1. Identify business assets to be protected from risks 2. Recognize the risks 3. Determine the level of impact on the firm should the risks materialize 4. Analyze the vulnerabilities of the firm • A systematic approach can be taken to sub steps 3 and 4 by determining the impact and analyzing the vulnerabilities • Table 9.1 illustrates the options.
  • 15. 15
  • 16. 16 Risk Analysis Report • The findings of the risk analysis should be documented in a report that contains detailed information such as the following for each risk: 1. A description of the risk 2. Source of the risk 3. Severity of the risk 4. Controls that are being applied to the risk 5. The owner(s) of the risk 6. Recommended action to address the risk 7. Recommended time frame for addressing the risk 8. What was done to mitigate the risk
  • 17. 17 INFORMATION SECURITY POLICY • A security policy can be implemented using the following five phase approach (Fig. 9.3): • Phase 1: Project Initiation • Phase 2: Policy Development • Phase 3: Consultation and Approval • Phase 4:Awareness and Education • Phase 5: Policy Dissemination
  • 18. 18
  • 19. 19 Separate policies are developed for: • Information systems security • System access control • Personnel security • Physical and environmental security • Telecommunications security • Information classification • Business continuity planning • Management accountability These policies are distributed to employees, preferably in writing and in educational and training programs. With the policies established, controls can be implemented
  • 20. 20 CONTROLS • A control is a mechanism implemented to protect the firm from risks or minimize the impact of those risks on the firm should they occur: 1. Technical controls are those built into systems by system developers during the system development life cycle 2. Access control is the basis for security against threats by unauthorized persons 3. Intrusion detection systems try to recognize an attempt to breach security before it has the opportunity to inflict damage
  • 21. 21
  • 22. 22 Access Control 1. User identification. Users first identify themselves by providing something that they know, such as a password 2. User authentication. Once initial identification has been accomplished, users verify their right to access by providing something that they have, such as a smart card or token, or an identification chip 3. User authorization. With the identification and authentication checks passed, a person can then be authorized certain levels or degrees of use. For example, one user might be authorized only to read from a file, whereas another might be authorized to make changes
  • 23. 23 Firewalls • A firewall acts as a filter and barrier restricting the data flowing between the firm’s network and the Internet • There are three types of firewalls: – Packet-Filters – are routers equipped with data tables of IP addresses which reflect the filtering policy positioned between the Internet and the internal network, it can serve as a firewall – Circuit-Level Firewall – installed between the Internet and the firm's network but closer to the communications medium – Application-Level Firewall – located between the router and the computer performing the application
  • 24. 24 Cryptographic Controls • Cryptography is the use of coding by means of mathematical processes • The data and information can be encrypted as it resides in storage and or transmitted over networks • If an unauthorized person gains access, the encryption makes the data and information unreadable and prevents its unauthorized use • Special protocols such as SET (Secure Electronic Transactions) have been developed for use in e- commerce
  • 25. 25 FORMAL CONTROLS • Formal controls include the establishment of: • Codes of conduct • Documentation of expected procedures and practices • Monitoring and preventing behavior that varies from the established guidelines • The controls are formal in that management: • Devotes considerable time to devising them • They are documented in writing • They are expected to be in force for the long term
  • 26. 26 INFORMAL CONTROLS Informal controls include such activities as: • Instilling the firm's ethical beliefs in its employees; • Ensuring an understanding of the firm's mission and objectives; • Education and training programs; and • Management development programs These controls are intended to ensure that the firm's employees both understand and support the security program
  • 27. 27 ACHIEVING THE PROPER LEVEL OF CONTROLS • As all three types of controls, technical, formal, and informal - cost money • The idea is to establish controls at the proper level • The control decision boils down to cost versus return, but in some industries there are other considerations • In banking, when engaging in risk management for ATMs, controls must keep the system secure but not at the cost of diminishing customer convenience • In health care, the system should not be so secure as to reduce the amount of necessary patient information available to hospitals and physicians
  • 28. 28 GOVERNMENT AND INDUSTRY ASSISTANCE • Several governments and international organizations have established standards (next slide) intended to serve as guidelines for organizations seeking to achieve information security • Some are in the form of benchmarks, sometimes referred to as a baseline
  • 29. 29 Government and Industry Assistance • United Kingdom's BS7799 The UK standards establish a set of baseline controls. Both Australia and New Zealand have instituted controls based on BS 7799 • BSI IT Baseline Protection Manual The baseline approach is also followed by the German Bundesamt fur Sicherheit in der Informationstechnik (BSI). The baselines are intended to provide reasonable security when normal protection requirements are intended. The baselines can also serve as the basis for higher degrees of protection when those are desired • COBIT COBIT, from the Information Systems Audit and Control Association & Foundation (ISACAF), focuses on the process that a firm can follow in developing standards, paying special attention to the writing and maintaining of the document • GASSP Generally Accepted System Security Principles (GASSP) is a product of the U. S. National Research Council. Emphasis is on the rationale for establishing a security policy • GMITS The Guidelines for the Management of IT Security (GMITS) is a product of the International Standards Organization (ISO) Joint Technical Committee and it provides a list of the information security policy topics that should be included in an organization's standards • ISF Standard of Good Practice The Information Security Forum Standard of Good Practice takes a baseline approach, devoting considerable attention to the user behavior that is expected if the program is to be successful
  • 30. 30 GOVERNMENT LEGISLATION • Governments in both the U.S. and U.K. have established standards and passed legislation aimed at addressing the increasing importance of information security: – U.S. Government Computer Security Standards – The U.K. Anti-terrorism, Crime and Security Act (ATCSA) 2001 – U.S. Government Internet Crime Legislation
  • 31. 31 INDUSTRY STANDARDS • The Center for Internet Security (CIS) is a non profit organization dedicated to assisting computer users to make their systems more secure • CIS Benchmarks have been established and are integrated in a software package that calculates a "security" score on a 10-point scale
  • 32. 32 PROFESSIONAL CERTIFICATION • Beginning in the 1960s the IT profession began offering certification programs: – Information Systems Audit and Control Association (ISACA) – International Information System Security Certification Consortium (ISC) – SANS (SysAdmin, Audit, Network, Security) Institute
  • 33. 33 PUTTING INFORMATION SECURITY MANAGEMENT IN PERSPECTIVE • Firms should put in place an information security management policy before putting controls in place • The policy can be based on an identification of threats and risks or on guidelines provided by governments and industry associations • Firms implement a combination of technical, formal, and informal controls expected to offer the desired level of security within cost parameters and in accordance with other considerations that enable the firm and its systems to function effectively
  • 34. 34 BUSINESS CONTINUITY MANAGEMENT (BCM) • The key element in BCM is a contingency plan, formally detailing the actions to be taken in the event that there is a disruption, or threat of disruption, in any part of the firm’s computing operation • Rather using a single, large contingency plan, a firm’s best approach is to develop several sub- plans that address specific contingencies. Such as: • An emergency plan • A backup plan • A vital records plan
  • 35. 35 PUTTING BUSINESS CONTINUITY MANAGEMENT IN PERSPECTIVE • Much effort has gone into contingency planning and much information and assistance is available • Some firms use packaged plans they can adapt to their needs • TAMP Computer Systems markets a Disaster Recovery System (DRS) that includes a database management system, instructions and tools that can be used in preparing a recovery plan • There are also guidelines and outlines that firms can use as starting points or benchmarks to achieve