Cyber Crime
Simply
stated, cybercrime can be interpreted as any type of criminal activity that
uses telematics technology as its medium. The forms of cybercrime are various,
ranging from the ' low tech ' such as defamation through social media to the ' high
tech ' such as theft of credit card data and other customer data.
Cyber Security
According
to its terminology, cybersecurity is an activity to secure telematics resources
in order to prevent cybercrime.
A process of improving security (security hardening), generally includes technical issues, such as security from the network side, operating system, data security and application source code. Financial and telecommunications institutions routinely hire cyber securitytechnicians to carry out penetration testing'. But aside from the technical side, security tightening activities must also include security against threats from internal personnel. There must be a number of protocols or SOPs that must be carried out by the personnel. In fact, it can be said that internal personnel is the highest security threat factor compared to technical matters.
In terms of human resources, cybersecurity practitioners can be grouped into at least 3 groups:
1. Security Analyst
Assigned to map potential security threats, then provide recommendations for mitigation of potential threats.
2. Forensic Specialist
As the name implies, this forensic specialist is tasked to conduct an investigation after a security leak incident. A forensic specialist must have qualified technical skills to be able to find and map the traces left by the perpetrators, to be able to track and find the perpetrators.
3. Hackers
The term hacker has been experiencing a distortion of meaning, whereas if the act of hacking is a criminal act even though it is not entirely like that. Hacker itself is a term given to people who have the ability to carry out acts of exploitation of telematics systems through various means.
Cyber War
If conventional physical war can
be seen in the form of destruction, the killing of a number of people and
occupation of the territory, then this cyber warfare is largely behind the
counter activities and is invisible. But the potential damage caused by this cyberwar could be as dangerous as conventional warfare. Activities that occur in cyber
warfare, in general, are hacking and anti-hacking activities carried out
'officially' by the state. The goal starts with stealing data to paralyze the
system owned by the enemy country.