Simply stated, cybercrime can be interpreted as any type of criminal activity that uses telematics technology as its medium. The forms of cybercrime are various, ranging from the ' low tech ' such as defamation through social media to the ' high tech ' such as theft of credit card data and other customer data.
According to its terminology, cybersecurity is an activity to secure telematics resources in order to prevent cybercrime.
A process of improving security (security hardening), generally includes technical issues, such as security from the network side, operating system, data security and application source code. Financial and telecommunications institutions routinely hire cyber securitytechnicians to carry out penetration testing'. But aside from the technical side, security tightening activities must also include security against threats from internal personnel. There must be a number of protocols or SOPs that must be carried out by the personnel. In fact, it can be said that internal personnel is the highest security threat factor compared to technical matters.
In terms of human resources, cybersecurity practitioners can be grouped into at least 3 groups:
1. Security Analyst
Assigned to map potential security threats, then provide recommendations for mitigation of potential threats.
2. Forensic Specialist
As the name implies, this forensic specialist is tasked to conduct an investigation after a security leak incident. A forensic specialist must have qualified technical skills to be able to find and map the traces left by the perpetrators, to be able to track and find the perpetrators.
The term hacker has been experiencing a distortion of meaning, whereas if the act of hacking is a criminal act even though it is not entirely like that. Hacker itself is a term given to people who have the ability to carry out acts of exploitation of telematics systems through various means.
If conventional physical war can be seen in the form of destruction, the killing of a number of people and occupation of the territory, then this cyber warfare is largely behind the counter activities and is invisible. But the potential damage caused by this cyberwar could be as dangerous as conventional warfare. Activities that occur in cyber warfare, in general, are hacking and anti-hacking activities carried out 'officially' by the state. The goal starts with stealing data to paralyze the system owned by the enemy country.