HACKING AKSI, PENGATURAN, & PENEGAKAN HUKUMNYA AGUS RAHARJO PURWOKERTO, 26 MEI 2017
CYBER SPACE CYBER LAW
CYBER THREAT
KNOWLEDGE DOMAIN CYBER CRIME
CYBER ATTACK CYBER SECURITY
CYBER THREATS
CYBER THREATS TO A CONTROL SYSTEM REFER TO PERSONS WHO ATTEMPT UNAUTHORISED ACCESS TO A CONTROL SYSTEM DEVICE AND NETWORK USING A DATA COMMUNICATIONS PATHWAY.
MAIN THREATS TO CYBER CRIME IS HACKING
INSIDERS UNSTRUCTURED THREATS
RECREATIONAL HACKERS INSTITUTIONAL HACKERS ORGANIZED CRIME
POTENTIAL THREATS
STRUCTURED THREATS
INDUSTRIAL ESPIONAGE HACKTIVISM TERRORIST
NATIONAL SECURITY THREATS
INTELLIGENCE AGENCIES INFORMATION WARRIORS
NEW INTERNET THREATS ALL COMPUTERS NEED INTERNET SECURITY
NEW TECHNOLOGIES NEW ANTI-MALWARE SOLUTIONS
Home users can lose valuable personal data with one click to the wrong website. Children trading games also exchange viruses unknowingly.
As cyber threats have evolved, so has software to deflect such threats.
You receive an email requesting an update to your payment details, and a hacker gains access to your bank account. A backdoor is installed on your machine, and your PC becomes a zombie, spewing out spam
Sophisticated antispyware and antivirus solutions capable of detecting the most complex new viruses are now available.
CYBERCRIME
Cybercrime in a narrow sense (computer crime); Any illegal behavior direct-ed by means of electronic operations that targets the security of computer systems and the data processed by them
Cybercrime in a broader sense (computer related crime); Any illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession, offering or distributing information by means of a computer system or network
CYBERCRIM E
TEORI SUBSTANTIF
NEW WINE WITHOUT BOTTLES • NEW WINE IN NEW BOTTLES
KEJAHATAN TERHADAP SISTEM KOMPUTER (1)
TIPE SERANGAN
THE PHYSICAL ATTACK THE SYNTACTIC ATTACK
THE SEMANTIC ATTACK
SISTEM KOMPUTER
HACKING/ CRACKING RAGAM
HACKTIVISM PENYEBARAN MALWARE
KEJAHATAN TERHADAP SISTEM KOMPUTER (2)
PENGERTIAN
• IS CONCEPTUALLY ANALOGOUS TO REALWORLD TRESSPASSING
TUJUAN
• PAMER KEBOLEHAN • MERUSAK SISTEM • MELUMPUHKAN SISTEM KOMPUTER
HACKING/CRACKING
DOS ATTACK
• KERJA JARINGAN LAMBAT • WEBSITE TIDAK DAPAT DIAKSES • SPAM E-MAIL TAK TERKEN-DALI
SITE DEFACEMENT
HACKING + AKTIVISM
SITE REDIRECT
DOS ATTACK
HACKTIVISM BENTUKNYA
INFORMATION THEFT AND DISTRIBUTION VIRTUAL SIT-INS
SITE PARODY
VIRTUAL SABOTAGE
KEJAHATAN TERHADAP SISTEM KOMPUTER (3) SOFTWARE DEVELOPMENT
CYBERCRIME IN NARROW SENSE IN ITE LAW ILLEGAL ACCESS (PASAL 30 AYAT 1 - 3) ILLEGAL INTERCEPTION (PASAL 31 AYAT 1 DAN 2) DATA INTERFERENCE (PASAL 32) SISTEM INTEFERENCE (PASAL 33) ILLEGAL DEVICES (PASAL 34) COMPUTER FORGERY (PASAL 35) COMPUTER RELATED FRAUD (PASAL 36)
ANCAMAN PIDANA PASAL 30 (1) PENJARA 6 TH DAN/ATAU DENDA PALING BANYAK RP 600 JT PASAL 30 (2) PENJARA 7 TH DAN/ATAU DENDA PALING BANYAL 700 JT PASAL 30 (3) PENJARA 8 TH DAN/ATAU DENDA PALING BANYAK RP 800 JT PASAL 31 (1)/(2) PENJARA 10 TH DAN/ATAU DENDA PALING BANYAK RP 800 JT
3 PENDEKATAN UNTUK MEMAHAMI, MENGANTISIPASI DAN MEMPERTAHANKAN KEAMANAN DI CYBERSPACE
PENDEKATAN TEKNOLOGI
PENDEKATAN SOSIAL
PENDEKATAN HUKUM
COMPUTER VULNERABILITY MENYIMPAN SEJUMLAH BESAR DATA DALAM RUANG KECIL
KEMUDAHAN AKSES
KOMPLEKSITAS TEKNOLOGI
KESALAHAN MANUSIA
PERLUNYA PERUBAHAN ATURAN YANG DISEBABKAN 2 HAL: MENAWARKAN KESEMPATAN PELAKU KEJAHATAN MENYERANG KORBANNYA DARI KETERPENCILAN TEMPAT DARI BENUA YANG BERBEDA HASIL KEJAHATAN TIDAK SEGERA JELAS
UNDANG-UNDANG BARU
TEKNOLOGI
KEJAHATAN CYBER
CHALLENGES TO CYBERLAW ENFORCERS TECHNOLOGICAL CHALLENGES • TECHNOLOGY ALLOW FOR NEAR ABSOLUTE ANONYMITY OF CULPRITS
LEGAL CHALLENGES • LAWS LAG BEHIND THE CHANGES IN TECHNOLOGY
RESOURCE CHALLENGES • LACK OF SUFFICIENT EXPERTS/BUDGET
LAW IS ALIEN TO TECHNOLOGIST
WHEN LAW IS IGNORED • Your Information Assets May be endangered even without an Intrusion
WHEN LAW IS IGNORED • If your Electronic Documents are not valid in law and you have proudly replaced paper backed systems to Electronic Document backed systems, • Your Cyber savyness could become a disaster
COMBATING CYBER CRIMES TECNOLOGICAL MEASURE
• • • •
PUBLIC KEY CRYPTOGRAPHY DIGITAL SIGNATURE FIREWALLS HONEY POTS
CYBER INVESTIGATION
• COMPUTER FORENSIC IS THE PROCESS OF IDENTIFYING • PRESERVING, ANALYZING AND PRESENTING DIGITAL EVIDENCE IN A MANNER THAT IS LEGALLY ACCEPTABLE IN COURTS OF LAW
ADMINISTRATION OF JUSTICE
• THESE RULES OF EVIDENCE INCLUDE ADMISSIBILITY (IN COURTS), AUTHENTICITY (RELATION INCIDENT), COMPLETENESS, RELIABILITY AND BELIEVABILITY
LEGAL FRAMEWORK
• LAW MAKING • LAW ENFORCEMENT
PREVENTION BASED BY USER
CRIME CONTROL MODEL
TIDAK COCOK
DUE PROCESS MODEL
PREVENTION LAW ENFORCEMENT
TUJUAN PEMIDANAAN • ASPEK PERLINDUNGAN MASYARAKAT TERHADAP TINDAK PIDANA • ASPEK PERLINDUNGAN/PE MBINAAN INDIVIDU PELAKU TINDAK PIDANA
UU ITE
REKOMENDASI JENIS SANKSI
• JENIS SANKSI: PENJARA DAN • DETERMINISME DENDA TEKNOLOGI • EFEK BURUK • LARANGAN PIDANA PENJARA MENGKASES • DENDA YANG TIDAK INTERNET DALAM DIBAYAR JANGKA WAKTU TERTENTU • ELECTRONIC SANCTION
CUKUP SEKIAN SAHAJA