Summary of "Cyber Crime & Cyber Security"
Overview
A comprehensive lecture on cyber security and cyber crime focused on Indonesia, linking to the Personal Data Protection (PDP) law and the pending national cyber security bill. Topics covered include the threat landscape, causes of cybercrime, notable 2023 incidents, national framework and governance, technical and organizational controls, incident response and recovery, and the market/economic context.
Key technological concepts & recommendations
- Cybersecurity defined as information security applied across computers, devices, networks, cloud, mobile, and IoT — protecting non‑physical information/data flows.
- Risk landscape: extreme weather, AI‑driven misinformation, political polarization, cost‑of‑living pressures, and rising cyber attacks as top global risks.
- Root causes of cybercrime:
- Massive internet penetration (>210 million users in Indonesia).
- Widely available auditing/infiltration tools and malicious/free malware distribution.
- Insufficient law enforcement and weak prosecutions.
- Widespread business adoption of outdated/unpatched software.
- Recommendation: continuous security testing and audits — ISO 27001 compliance is beneficial but not sufficient; move from annual audits to more frequent and independent testing.
Notable 2023 incident examples (monthly highlights)
- January: WhatsApp APK wedding‑invitation scams leading to account hacks (social engineering).
- February: online gambling infiltration of state sites; mass takedowns but weak prosecutions.
- March: 19.5 million BPJS personal data leak (detailed identity data).
- April–May: banking incidents including ransomware and a core banking outage at BSI due to legacy systems.
- June: hundreds of malicious Android apps on the Play Store.
- July: large data leaks (passports, national population data) — many breaches likely unreported (iceberg effect).
- Sep–Oct–Nov: government/official channel hacks (e.g., DPR YouTube), alleged 164 TB Ministry of Defense data leak, recurring APK frauds and PPS scams.
- Resulting harms: fraud, financial loss, human trafficking, and national security exposure.
Stakeholders & governance (who must be involved)
- Government: executive, ministries, regulators (Kominfo, BI, OJK)
- Parliament (DPR), judiciary, law enforcement, intelligence
- Critical infrastructure owners/operators, vendors/technology providers
- Academia, civil society, and global partners (e.g., Interpol)
- Recommendation: an integrated national cyber security framework with clear roles/responsibilities, mandatory standards, a compliance and audit/supervisory body, and a continuous improvement loop
National Cyber Security Framework — flow & stages
Flow: Legislative driver → national framework → stakeholder integration → obligations for owners/operators/vendors → audit/supervision → continuous updates
Implementation stages:
- Strategy formulation
- Form a working group / national technical authority / national CERT
- Integrate framework across sectors (including physical and personal data)
- Create a communication framework for updates & coordination
- Implement controls adapted to business/environment realities
- Periodic compliance reporting, audits, and incident management
Emphasis: coordination, legal basis (the cybersecurity law is still a bill), standards, guidelines, and documented procedures.
Incident response model & best practices
Four recommended phases:
- Prevent — harden systems, patch, secure configurations, limit privileges, user awareness
- Detect — logs, IDS/IPS, antivirus, anomaly monitoring, routine scans
- React (contain/mitigate) — rapid containment, isolation, malware removal
- Determine — root‑cause analysis and proactive remediation
Preventive measures:
- Regular patching, secure configurations, least privilege, avoid untrusted software/APKs, user training
Detection tools:
- Centralized logs, IDS/IPS, antivirus, file/date/size anomaly detection, scheduled scans
Corrective & recovery practices:
- Backups (daily/weekly/monthly; maintain clean backups), documented recovery plans, disaster recovery tests and simulations
- Cyber insurance can be used as an additional mitigation tool
Security domains organizations should cover
- Access control
- Telecommunications & network device security
- Operational management / process controls
- Application development security
- Cryptography / encryption
- Information system architecture
- Operations (operator controls, admin practices)
- Business continuity & disaster recovery (BCP/DRP)
- Legal requirements & ethics (forensics, investigations)
- Physical security & placement of systems (data center environment)
Technical controls & architecture
- Data center tiers and environmental controls; consider upgrades to higher tiers for reliability.
- Hardware redundancy and fault tolerance: network, processors, external storage (disk mirroring/shadowing), power (dual feeds, UPS), and transactional rollback support for databases.
- Access controls: unique accounts, routine credential rotation, multi‑factor authentication (MFA), biometrics where appropriate.
- Network defense: hardware/software firewalls, network segmentation, sniffing mitigation, encrypted channels.
- Cryptography: adopt stronger key lengths, use asymmetric PKI for key management and authentication.
- Audit trails: ensure traceability for detection and forensic investigations.
Threat actors & types of cyber violations
Threat sources:
- Organized crime, hacktivists, extremist groups, insider threats (disgruntled employees), competitors, foreign intelligence/actors, investigative actors (journalists), and natural/environmental threats
Violation types:
- Illegal access/hacking, data espionage/theft, illegal interception (MITM), data tampering/destruction, system disruption (DoS, malware), computer‑related fraud, illegal content/deepfakes, copyright infringement, identity crimes
Market & economic context
- APAC cybersecurity spending is growing rapidly. Indonesia estimated: ~USD 690M (2021) → ~USD 1B+ (2024), with projected ~23% annual growth (mid‑2025).
- ROI case: cybersecurity investments can yield >52% ROI and payback within 0–24 months if combined with HR development, clear ROI targets, focus on main problems, change management, and executive support.
- Demand drivers: banking/finance, telecom, health, fintech, e‑commerce, and government sectors.
Organizational & human factors
- The human factor is a major risk: historically ~65% of security breaches involve people.
- Critical needs: certified staff, ongoing capacity building, incident response teams, separation of duties, supervision, insider controls, and leadership roles (CISO/CIO).
User‑level guidance (practical tips)
- Avoid installing APKs or software from untrusted sources; scan files with antivirus before opening.
- Keep device OS and apps updated frequently and apply patches promptly.
- Use strong encryption and MFA; avoid outdated/unsupported systems.
- Follow organizational backup policies and report anomalies promptly.
Policy & legal needs
- Urgent need to pass national cyber security legislation (complementing PDP law) and establish mandatory standards, supervisory bodies, and enforcement mechanisms to increase prosecutions and deterrence.
- Encourage ASEAN/regional and global cooperation for law enforcement and coordinated incident response.
Market & capacity development recommendations
- Build a cybersecurity ecosystem: training, certifications, university programs, industry alliances (domestic & international).
- Provide incentives for digital transformation and secure procurement.
- Secure executive buy‑in for investments and set clear business‑aligned ROI targets.
Conclusion
Cyber security is an urgent, multi‑dimensional problem requiring legal, organizational, technical, and human measures. Continuous audits, stakeholder collaboration, capacity building, and effective enforcement are essential to reduce cybercrime and protect national interests.
Note: Subtitles for the presentation were auto‑generated; some names and terms may be approximate.
Main speakers / sources
- Mr. Teguh (Mas Tegu) — main presenter
- Darel (moderator/announcer)
- Brief mentions / context references: Mr. Singgi (teacher evaluation), institutions cited — Kominfo, DPR (parliament), BPJS, BSI (bank), Lemhanas, BSS (national cyber agency), BI, OJK, Interpol.
Category
Technology
Share this summary
Is the summary off?
If you think the summary is inaccurate, you can reprocess it with the latest model.