Hacking 1

Page 1

HACKING AKSI, PENGATURAN, & PENEGAKAN HUKUMNYA AGUS RAHARJO PURWOKERTO, 26 MEI 2017


CYBER SPACE CYBER LAW

CYBER THREAT

KNOWLEDGE DOMAIN CYBER CRIME

CYBER ATTACK CYBER SECURITY


CYBER THREATS

CYBER THREATS TO A CONTROL SYSTEM REFER TO PERSONS WHO ATTEMPT UNAUTHORISED ACCESS TO A CONTROL SYSTEM DEVICE AND NETWORK USING A DATA COMMUNICATIONS PATHWAY.

MAIN THREATS TO CYBER CRIME IS HACKING


INSIDERS UNSTRUCTURED THREATS

RECREATIONAL HACKERS INSTITUTIONAL HACKERS ORGANIZED CRIME

POTENTIAL THREATS

STRUCTURED THREATS

INDUSTRIAL ESPIONAGE HACKTIVISM TERRORIST

NATIONAL SECURITY THREATS

INTELLIGENCE AGENCIES INFORMATION WARRIORS


NEW INTERNET THREATS ALL COMPUTERS NEED INTERNET SECURITY

NEW TECHNOLOGIES NEW ANTI-MALWARE SOLUTIONS

Home users can lose valuable personal data with one click to the wrong website. Children trading games also exchange viruses unknowingly.

As cyber threats have evolved, so has software to deflect such threats.

You receive an email requesting an update to your payment details, and a hacker gains access to your bank account. A backdoor is installed on your machine, and your PC becomes a zombie, spewing out spam

Sophisticated antispyware and antivirus solutions capable of detecting the most complex new viruses are now available.


CYBERCRIME

Cybercrime in a narrow sense (computer crime); Any illegal behavior direct-ed by means of electronic operations that targets the security of computer systems and the data processed by them

Cybercrime in a broader sense (computer related crime); Any illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession, offering or distributing information by means of a computer system or network


CYBERCRIM E

TEORI SUBSTANTIF

NEW WINE WITHOUT BOTTLES • NEW WINE IN NEW BOTTLES


KEJAHATAN TERHADAP SISTEM KOMPUTER (1)

TIPE SERANGAN

THE PHYSICAL ATTACK THE SYNTACTIC ATTACK

THE SEMANTIC ATTACK

SISTEM KOMPUTER

HACKING/ CRACKING RAGAM

HACKTIVISM PENYEBARAN MALWARE


KEJAHATAN TERHADAP SISTEM KOMPUTER (2)

PENGERTIAN

• IS CONCEPTUALLY ANALOGOUS TO REALWORLD TRESSPASSING

TUJUAN

• PAMER KEBOLEHAN • MERUSAK SISTEM • MELUMPUHKAN SISTEM KOMPUTER

HACKING/CRACKING

DOS ATTACK

• KERJA JARINGAN LAMBAT • WEBSITE TIDAK DAPAT DIAKSES • SPAM E-MAIL TAK TERKEN-DALI


SITE DEFACEMENT

HACKING + AKTIVISM

SITE REDIRECT

DOS ATTACK

HACKTIVISM BENTUKNYA

INFORMATION THEFT AND DISTRIBUTION VIRTUAL SIT-INS

SITE PARODY

VIRTUAL SABOTAGE

KEJAHATAN TERHADAP SISTEM KOMPUTER (3) SOFTWARE DEVELOPMENT


CYBERCRIME IN NARROW SENSE IN ITE LAW ILLEGAL ACCESS (PASAL 30 AYAT 1 - 3) ILLEGAL INTERCEPTION (PASAL 31 AYAT 1 DAN 2) DATA INTERFERENCE (PASAL 32) SISTEM INTEFERENCE (PASAL 33) ILLEGAL DEVICES (PASAL 34) COMPUTER FORGERY (PASAL 35) COMPUTER RELATED FRAUD (PASAL 36)


ANCAMAN PIDANA PASAL 30 (1)  PENJARA 6 TH DAN/ATAU DENDA PALING BANYAK RP 600 JT PASAL 30 (2)  PENJARA 7 TH DAN/ATAU DENDA PALING BANYAL 700 JT PASAL 30 (3)  PENJARA 8 TH DAN/ATAU DENDA PALING BANYAK RP 800 JT PASAL 31 (1)/(2) PENJARA 10 TH DAN/ATAU DENDA PALING BANYAK RP 800 JT


3 PENDEKATAN UNTUK MEMAHAMI, MENGANTISIPASI DAN MEMPERTAHANKAN KEAMANAN DI CYBERSPACE

PENDEKATAN TEKNOLOGI

PENDEKATAN SOSIAL

PENDEKATAN HUKUM


COMPUTER VULNERABILITY MENYIMPAN SEJUMLAH BESAR DATA DALAM RUANG KECIL

KEMUDAHAN AKSES

KOMPLEKSITAS TEKNOLOGI

KESALAHAN MANUSIA


PERLUNYA PERUBAHAN ATURAN YANG DISEBABKAN 2 HAL: MENAWARKAN KESEMPATAN PELAKU KEJAHATAN MENYERANG KORBANNYA DARI KETERPENCILAN TEMPAT DARI BENUA YANG BERBEDA HASIL KEJAHATAN TIDAK SEGERA JELAS

UNDANG-UNDANG BARU

TEKNOLOGI

KEJAHATAN CYBER


CHALLENGES TO CYBERLAW ENFORCERS TECHNOLOGICAL CHALLENGES • TECHNOLOGY ALLOW FOR NEAR ABSOLUTE ANONYMITY OF CULPRITS

LEGAL CHALLENGES • LAWS LAG BEHIND THE CHANGES IN TECHNOLOGY

RESOURCE CHALLENGES • LACK OF SUFFICIENT EXPERTS/BUDGET


LAW IS ALIEN TO TECHNOLOGIST

WHEN LAW IS IGNORED • Your Information Assets May be endangered even without an Intrusion

WHEN LAW IS IGNORED • If your Electronic Documents are not valid in law and you have proudly replaced paper backed systems to Electronic Document backed systems, • Your Cyber savyness could become a disaster


COMBATING CYBER CRIMES TECNOLOGICAL MEASURE

• • • •

PUBLIC KEY CRYPTOGRAPHY DIGITAL SIGNATURE FIREWALLS HONEY POTS

CYBER INVESTIGATION

• COMPUTER FORENSIC IS THE PROCESS OF IDENTIFYING • PRESERVING, ANALYZING AND PRESENTING DIGITAL EVIDENCE IN A MANNER THAT IS LEGALLY ACCEPTABLE IN COURTS OF LAW

ADMINISTRATION OF JUSTICE

• THESE RULES OF EVIDENCE INCLUDE ADMISSIBILITY (IN COURTS), AUTHENTICITY (RELATION INCIDENT), COMPLETENESS, RELIABILITY AND BELIEVABILITY

LEGAL FRAMEWORK

• LAW MAKING • LAW ENFORCEMENT


PREVENTION BASED BY USER

CRIME CONTROL MODEL

TIDAK COCOK

DUE PROCESS MODEL

PREVENTION LAW ENFORCEMENT


TUJUAN PEMIDANAAN • ASPEK PERLINDUNGAN MASYARAKAT TERHADAP TINDAK PIDANA • ASPEK PERLINDUNGAN/PE MBINAAN INDIVIDU PELAKU TINDAK PIDANA

UU ITE

REKOMENDASI JENIS SANKSI

• JENIS SANKSI: PENJARA DAN • DETERMINISME DENDA TEKNOLOGI • EFEK BURUK • LARANGAN PIDANA PENJARA MENGKASES • DENDA YANG TIDAK INTERNET DALAM DIBAYAR JANGKA WAKTU TERTENTU • ELECTRONIC SANCTION


CUKUP SEKIAN SAHAJA


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.