Keamanan Komputer - 07 - Official Site of AURELIO RAHMADIAN

advertisement
Keamanan Komputer
Security Policy
-Aurelio Rahmadian-
Objektif
Tingkat Keamanan yang Dibutuhkan
 Acceptable Use Policy
 Authentication
 Security Policy
 Disaster Recovery Plan

Tingkat Keamanan yang Dibutuhkan

Tergantung…
◦ jenis bisnis/usaha yang dijalankan oleh
perusahaan
◦ jenis data yang disimpan di jaringan
◦ filosofi manajemen dari perusahaan
Tingkat Keamanan yang Dibutuhkan
Acceptable Use Policy
Acceptable Use/Usage Policy (AUP)
 Fair Use Policy
 Terms of Service (ToS)
 Terms of Use
 Terms and Conditions

Acceptable Use Policy
Merupakan sejumlah aturan yang
diterapkan oleh pemilik atau manajer dari
jaringan, website, atau sistem komputer
yang fungsinya untuk membatasi
bagaimana objek tersebut digunakan
 User harus menyetujui untuk mematuhi
aturan tersebut untuk menggunakan
layanan

Acceptable Use Policy
“AUP documents are written for corporations,
businesses, universities, schools, internet
service providers, and website owners, often
to reduce the potential for legal action that
may be taken by a user, and often with little
prospect of enforcement.”
-wikipedia-
Acceptable Use Policy
https://community.ja.net/library/acceptable
-use-policy
 http://www.freeservers.com/policies/acce
ptable_use.html
 http://info.yahoo.com/legal/us/yahoo/utos/
utos-173.html
 http://www.google.com/intl/en/policies/ter
ms/

Acceptable Use Policy

Using our Services
◦ Don’t misuse our Services. For example, don’t interfere with our
Services or try to access them using a method other than the
interface and the instructions that we provide.You may use our
Services only as permitted by law, including applicable export
and re-export control laws and regulations. We may suspend or
stop providing our Services to you if you do not comply with
our terms or policies or if we are investigating suspected
misconduct.
◦ Using our Services does not give you ownership of any
intellectual property rights in our Services or the content you
access. You may not use content from our Services unless you
obtain permission from its owner or are otherwise permitted by
law. These terms do not grant you the right to use any branding
or logos used in our Services. Don’t remove, obscure, or alter
any legal notices displayed in or along with our Services.
-Google Terms-
Authentication

Username
Authentication

Username
◦
◦
◦
◦
◦
◦
◦
◦
◦
◦
◦
Use your life as a template
Use your pastime
Keep it succinct
Use compound words
Use your favorite TV show
Try leetspeak
Make your pet's name your user name
Play with your name
Use unique characters
Use a name generator
Jumble it Up
Authentication

Username
◦ Avoid using names that could be a problem or
a risk
 Your full or last name
 Obscene words—somebody could become
offended
 Your street address
 Do not make an excessively long username
 Do not use your email name as a user name
Authentication

Password
◦ Contain both upper and lower case
characters (e.g., a-z, A-Z)
◦ Have digits and punctuation characters as well
as letters e.g., 0-9, !@#$%^&*()_+|~=\`{}[]:";'<>?,./)
◦ Are at least eight alphanumeric characters
long
◦ Are not a word in any language, slang, dialect,
jargon, etc.
◦ Are not based on personal information,
names of family, etc.
Authentication

Password
◦ Passwords should never be written down or
stored on-line
◦ Try to create passwords that can be easily
remembered, one way to do this is create a
password based on a song title, affirmation, or
other phrase
◦ For example, the phrase might be: "This May
Be One Way To Remember" and the
password could be: "TmB1w2R!" or
"Tmb1W>r~" or some other variation
25 password yang paling
mudah ditebak dan terburuk
di internet (2013)
-SplashData (Software company, CA)-
Security Policy
Inti dari pengamanan sebuah sistem,
organisasi, ataupun objek lainnya yang
berbentuk tujuan pengamanan dan prioritas
yang tertulis
 Mencakup pembatasan perilaku anggota,
pembatasan akses fungsi, program, data, serta
pembatasan yang berhubungan dengan
mekanisme seperti pintu, kunci, dll.
 Perlu dibentuk sebelum kebutuhan teknis

Security Policy

Menulis security policy merupakan langkah
pertama, implementasinya merupakan
langkah yang lebih besar
◦ Conduct Security Awareness Seminars, workshops, quizzes
◦ Prepare Do's & Don'ts of Security Policy, distribute and
display them
◦ Create posters, stickers, t-shirts, mugs, mouse pads, all
with security messages
◦ Run slogan competitions
◦ Give wide publicity to any security breaches in (other)
companies
◦ And of course, perform security audits
Security Policy – E-mail Policy

Confidentiality of information:
◦ E-mail should not be used for confidential information exchange
◦ Sender will be totally responsible for the content of the
information
◦ Noe sensitive information like password, PIN, credit card details
should ever be sent by e-mail

Appropriate use:
◦ Use of e-mail will be restricted for business use only
◦ E-mail should not be used for sending spam mail
◦ E-mail should not be used to transmit chain mails, greetings,
graphics, etc.
◦ E-mails should not be automatically forwarded to addresses
outside the company
◦ Size of the e-mail should be restricted within approved limits
Security Policy – Email Policy

Management authority:
◦ Management could use its right to monitor
the e-mails
◦ Management could store the e-mails for
retreival at a later date for any legal purpose
◦ Any encryption done to e-mail attachments
should be with the company approval and the
encryption key should be stored for retreival
when necessary
Security Policy - Other









Acceptable use policy
Authentication standards
Rules for network access
Policy for disposal of materials
Virus protection standards
Online security resources
Server room security
Anti-theft devices for server hardware
Securing removable media
Disaster Recovery Plan
Merupakan sekumpulan proses atau
prosedur yang terdokumentasi untuk
memulihkan dan melindungi infrastruktur
IT saat terjadi bencana
 Hal yang tertulis mencakup aksi-aksi yang
perlu dilakukan sebelum bencana, saat
bencana berlangsung, serta setelah terjadi
bencana

Disaster Recovery Plan

Bencana dapat berupa bencana alam
maupun bencana yang diakibatkan manusia
Bencana alam
Perbuatan manusia
Longsor
Terorisme
Badai
Kecelakaan nuklir
Sambaran petir
Putusnya aliran listrik
Kebakaran liar
Kebakaran (urban)
Tsunami
Kebocoran bahan berbahaya
Letusan gunung berapi
Kerusuhan
Disaster Recovery Plan

Risk assessment
◦ Identifikasi bisnis proses dan resource yang
berhubungan dengan infrastruktur IT
◦ Identifikasi ancaman yang ada terhadap bisnis
proses dan resource IT
◦ Tentukan strategi untuk eliminasi atau mitigasi
resiko yang disebabkan oleh ancaman
Disaster Recovery Plan

Information asset management
◦ Apa saja aset yang dimiliki?
◦ Dimana aset tersebut?
◦ Siapa yang memiliki akses terhadap aset dan
tahukah tanggung jawab mereka?
◦ Ketika terjadi masalah, apa yang perlu
dilakukan?

Inventaris
Disaster Recovery Plan
How will you “reconnect” when
nothing works?
Disaster Recovery Plan

Basic Plan
◦
◦
◦
◦
Provides general guidance
Predicts Disasters
Has defined simple crisis protocols
Identifies leadership and authorities
Disaster Recovery Plan

Developing a DRP:
◦
◦
◦
◦
◦
◦
Conduct a Risk Assessment
Identify Recovery Strategies
Develop Recovery Procedures
Purchase Products and Services
Test the Plan and Train Users
Maintain the Plan
Disaster Recovery Plan

Identify processes & resources:
◦
◦
◦
◦
Work procedures
Applications supporting the procedures
Where input comes from and output goes
Alternate procedures when application
unavailable
◦ Tolerance to interruption
◦ Supporting infrastructure hardware and
software
Disaster Recovery Plan
◦
◦
◦
◦
Determine risks that can be eliminated
Determine maximum recovery response time
Determine backup frequency
Determine minimum emergency
configurations
Disaster Recovery Plan
Disaster Recovery Plan

Contoh rencana pemulihan data (tahap
pencegahan):
◦ Melakukan backup secara rutin ke magnetic
tape yang disimpan off-site
◦ Melakukan backup secara rutin ke electronic
“tape vault” melalui jaringan
◦ Remote mirroring data ke beberapa tempat
penyimpanan melalui jaringan
Disaster Recovery Plan

Some of DRP benefits:
◦
◦
◦
◦
◦
◦
◦
Providing a sense of security
Minimizing risk of delays
Guaranteeing the reliability of standby systems
Providing a standard for testing the plan
Minimizing decision-making during a disaster
Reducing potential legal liabilities
Lowering unnecessarily stressful work
environment
Download