School of Information Systems

Securing Information Systems

What is Computer Crime?

Computer crime is a crime committed by computer users who have extensive knowledge of computers and networks. Those who have knowledge and abilities of computers and networks in security can be divided into two types, hackers and crackers. Hackers and crackers are not the same, they are a bit similar, but they also have very big differences.

Hackers is a person or group of people who have the ability to hack into a security system to be able to access data that does not belong to them. Hackers are also commonly called “White hat hackers”. Although hackers do these illegal things, but hackers do not take the data they get for their personal benefit, they just want to test how strong the security system is. After hackers try to hack the security system from the data, they will notify the owner of the data that the security system they have is still insecure and they will tell the owner where the weakness of their security system is.

Crackers are people who sound like hackers, they can hack into the security system, but unlike hackers, Crackers will break into the security system and steal the data for their personal benefit. Crackers can also be called “Black hat hackers”. Crackers usually do hack that is damages and harms others.

What is Cyberwar & Cyberterrorism?

Cyberwar is a digital warfare related to computers and networks, usually Cyberwar is a war between states against other states. Cyberwar can be in various forms, ranging from spreading propaganda through social media to being very destructive and can cause death. In Cyberwar, a country usually pays hackers and crackers to hack the security networks of other countries.

Unlike Cyberwar, which is a crime committed by the state on a large scale, Cyberterrorism is a crime committed by individuals or groups that have political, religious, or ideological goals. The way Cyberterrorism works is similar to the way Cyberwar works, but the most visible difference is the main perpetrators and the target of this crime. The impact of Cyberterrorism can be even greater than Cyberwar because attacks from Cyberterrorism can be launched from anywhere in the world and unpredictable.

How to manage IS Security?

To manage IS Security, we must pay attention to a few primary goal points:

  • Availability
    This means that the real owner of the data user can access the data without any problems.
  • Integrity
    This means that no one else can manipulate data and systems from the security.
  • Confidentiality
    This means that no one else can access data without having permission to access the data.
  • Accountability
    this means that it can ensure that all actions that occur in the system can be traced.

By focusing on these 4 primary goals, IS Security should be able to provide good enough quality to maintain the security of data that must be protected.

References:

https://binus.ac.id/2013/11/ini-perbedaan-istilah-hacker-dengan-cracker/

https://www.idntimes.com/tech/trend/agung-destian-putra/perbedaan-hacker-dan-cracker-c1c2/4

https://www.zdnet.com/article/cyberwar-a-guide-to-the-frightening-future-of-online-conflict/

https://mizanpublishing.com/apa-itu-cyber-war-kenali-dan-waspadai

PPT Session 15&16 Securing Information Systems

Gregorius Christian Widjaja