Backtrack is a linux distro which is derived from slackware which is a merger of whax and auditor security collection. Backtrack two released on 6 March 2007 which include more than 300 security tools while the beta version of BackTrack 3 was released on 14 December 2007 on the third release is more focused on hardware support. While the version of backtrack 3 released on 19 June 2008 on backtrack 3 versions of this saint and the inserting nessus maltego while not included as well stick with kernel version 2.6.21.5. And the most recent backtrack 5.
example of using backtrack:
- networking
- security
- auditing
- hacking
and still much more . . . .
Information System Audit
Senin, 16 April 2012
Cybercrime
cybercime as defined as : "Offense that are commited againt individual or group of individuals with a criminal motive to intentionally harm the reputation of victim or cause or physical or mental harm to the victim directly or indirectly, using modem telecommunication network suck as internet (Chat rooms, emails, notice boards and groups) and mobile phone.
Pure evil is a crime is a crime committed because of criminal motives. Crimes of this type typically use the Internet only as a means of crimes. Examples of these crimes is Carding
On the type of crimes on the internet are included in the "gray", is quite difficult to determine whether it is a criminal offense or not the activities are sometimes not given a motive for the crimes. One example is probing or portscanning
A crime that occurs when a person entering or breaking into a computer network system illegally, without permission, or without the consent of the owner of the computer network system that entered
Committed a crime by entering the data or information to the internet about something that is untrue, unethical, and may be unlawful or disturbing public order
The spread of the virus is generally carried out using email. Often times people are exposed to the email system does not recognize this virus. The virus is then transmitted to another place via email
Cyber Espionage is a crimes that utilizes the Internet to conduct espionage against the other party, to enter the target networked systems
This type of crime to interfere with or harass a person by using a computer
Carding is a crime committed for stealing credit card numbers belonging to others and used in commercial transactions on the internet
The term hacker is usually refers to someone who has great interest to study in detail the computer systems and how to improve capabilities. As for those who frequently take strong action on the net destruction is typically called a cracker. Arguably this cracker is a hacker who is actually the ability to utilize things that are negative
Cybersquatting is a crime committed by registering the domain name of the company of others and then try to sell them to companies with higher price
The crimes of piracy hijacking other people's work.
An act of cybercrime including cyber terrorism if it threatens the government or citizens, including cracking into government or military sites
Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft,
and other cross-border crimes. Activity crossing international borders
and involving the interests of at least one nationstate is sometimes
referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions through the International Criminal Court.
Types cybercrime
A. cybercrime is based targeting crime. cybercrime can be devided become 3 types :
1. Cybercrime Against Person :
This type of crimes, targeted attacks directed against individuals or individuals who have given their nature or according to objective criteria such attacks
2. Againts Property
Cybercrime committed to disrupt or attack the property of others. Some examples of these types crimes such as illegally accessing a computer through the cyber world, possession of unauthorized electronic information / information theft, carding, cybersquating, hijacking, data forgery, and all activities that are detrimental to other people's property
3. Againts Government
Cybercrime Against Government done with special purpose attacks against the government. These activities such as cyber terrorism as an act that threatens the government as well as cracking to the official website of the government or military sites.
B. Based on the pattern of activities that do, cybercrime can be classified into two types as follows:
1. Cybercrime as a purely criminal act
Pure evil is a crime is a crime committed because of criminal motives. Crimes of this type typically use the Internet only as a means of crimes. Examples of these crimes is Carding
2. Cybercrime as a crimes "gray"
On the type of crimes on the internet are included in the "gray", is quite difficult to determine whether it is a criminal offense or not the activities are sometimes not given a motive for the crimes. One example is probing or portscanning
C. Based on the type of activities done, cybercrime can be classified into several types as follows :
1. unauthorized Access
A crime that occurs when a person entering or breaking into a computer network system illegally, without permission, or without the consent of the owner of the computer network system that entered
2. illegal Contents
Committed a crime by entering the data or information to the internet about something that is untrue, unethical, and may be unlawful or disturbing public order
3. Deliberate spread of virus
The spread of the virus is generally carried out using email. Often times people are exposed to the email system does not recognize this virus. The virus is then transmitted to another place via email
4. data Forgery
These types of crimes carried out with the aim of falsifying data on important documents on the Internet. These documents are usually owned by the institution or agency that has a web-based database sites
These types of crimes carried out with the aim of falsifying data on important documents on the Internet. These documents are usually owned by the institution or agency that has a web-based database sites
5. Cyber Espionage, Sabotage, and Extortion
Cyber Espionage is a crimes that utilizes the Internet to conduct espionage against the other party, to enter the target networked systems
6. cyberstalking
This type of crime to interfere with or harass a person by using a computer
7. carding
Carding is a crime committed for stealing credit card numbers belonging to others and used in commercial transactions on the internet
8. Hacking and Cracker
The term hacker is usually refers to someone who has great interest to study in detail the computer systems and how to improve capabilities. As for those who frequently take strong action on the net destruction is typically called a cracker. Arguably this cracker is a hacker who is actually the ability to utilize things that are negative
9. Cybersquatting and Typosquatting
Cybersquatting is a crime committed by registering the domain name of the company of others and then try to sell them to companies with higher price
10. hijacking
The crimes of piracy hijacking other people's work.
11. cyber terrorism
An act of cybercrime including cyber terrorism if it threatens the government or citizens, including cracking into government or military sites
Business Continuity Planning
Business Continuity Management (BCM) is the process of planning to ensure that your business can return to "business as usual" as quickly and painlessly as possible in the event of a major disruption.
We’ve pulled together some simple information on how to plan for
business disruptions - whether you’re a micro-business or an
international company, you should find the information you need to help
keep your business running.
Why should I plan for business disruptions?
A disaster can strike any organisation, large or small. It can arrive
in the shape of storm, flood, fire, a terrorist bomb, action by
pressure groups, or product contamination.
How should I plan for business disruptions?
This is a five-step guide to get you started on business continuity planning - use the links below to go to each section
Step 1: Analyse your business
Step 2: Assess the risks
Step 3: Plan and prepare
Step 4: Communicate your plan
Step 5: Test your plan
How should I respond to a business disruption?
Check out our information on responding to business disruption, and what actions you can take in the short and long term to minimise the impact on your business.
It is not the 'headline-making' major disasters that are responsible for the majority of business continuity problems. More mundane and common occurrence can have a potentially costly effect.
These include:-
- Information security incidents
- Data loss or integrity issues
- IT equipment or system loss
- Communication services failure
- Availability of key staff
Cryptografi
Cryptografi is method of securing data that can be used to maintain data confidentilty, authenticity or integrity of the data and authenticity (authentication) sender. This method is intended of important that is retricted or confidential information send of the public communication can no be know and used by unauthorized parties. Criptografi is studi of learning the system in which confidentiality and authentiticity data can be guaranteed.
Cryptografi is the science and art to keep the message to be safe .. The actors or practitioners are called cryptographers cryptography. A cryptographic algorithm (a cryptographic algorithm), called a cipher, a mathematical equation that is used for encryption and decryption. Usually these two equations (for encryption and decryption) has a mathematical relationship is quite close.
The process undertaken to secure a message (called plaintext) into a hidden message (called ciphertext) is encrypted (encryption). Encryption is used to encrypt the data or information that can not be read by unauthorized people. By encrypting your data is encoded (encrypted) using a key (key). To open (decrypt) data were used also a key that can be the same as the key to encrypt (for the case of private key cryptography) or with a different key (for the case of public key cryptography).
Hash
They provide a mapping between an arbitrary length input, and a (usually) fixed length (or smaller length) output. It can be anything from a simple crc32, to a full blown cryptographic hash function such as MD5 or SHA1/2/256/512. The point is that there's a one-way mapping going on. It's always a many:1 mapping (meaning there will always be collisions) since every function produces a smaller output than it's capable of inputting (If you feed every possible 1mb file into MD5, you'll get a ton of collisions).
encryption
They provide a 1:1 mapping between an arbitrary length input and and output. And they are always reversible. The important thing to note is that it's reversible using some method. And it's always 1:1 for a given key. Now, there are multiple input:key pairs that might generate the same output (in fact there usually are, depending on the encryption function). Good encrypted data is indistinguishable from random noise. This is different from a good hash output which is always of a consistent format.
reference : http://stackoverflow.com
Cryptografi is the science and art to keep the message to be safe .. The actors or practitioners are called cryptographers cryptography. A cryptographic algorithm (a cryptographic algorithm), called a cipher, a mathematical equation that is used for encryption and decryption. Usually these two equations (for encryption and decryption) has a mathematical relationship is quite close.
The process undertaken to secure a message (called plaintext) into a hidden message (called ciphertext) is encrypted (encryption). Encryption is used to encrypt the data or information that can not be read by unauthorized people. By encrypting your data is encoded (encrypted) using a key (key). To open (decrypt) data were used also a key that can be the same as the key to encrypt (for the case of private key cryptography) or with a different key (for the case of public key cryptography).
Hash
They provide a mapping between an arbitrary length input, and a (usually) fixed length (or smaller length) output. It can be anything from a simple crc32, to a full blown cryptographic hash function such as MD5 or SHA1/2/256/512. The point is that there's a one-way mapping going on. It's always a many:1 mapping (meaning there will always be collisions) since every function produces a smaller output than it's capable of inputting (If you feed every possible 1mb file into MD5, you'll get a ton of collisions).
encryption
They provide a 1:1 mapping between an arbitrary length input and and output. And they are always reversible. The important thing to note is that it's reversible using some method. And it's always 1:1 for a given key. Now, there are multiple input:key pairs that might generate the same output (in fact there usually are, depending on the encryption function). Good encrypted data is indistinguishable from random noise. This is different from a good hash output which is always of a consistent format.
reference : http://stackoverflow.com
Selasa, 06 Maret 2012
When We Need to Perform Information System Audit
Although
various types of audits conducted, the majority of audit emphasis on
accounting information systems within an organization and implementation
of financial recording and operation of effective and efficient
organization. Broadly
speaking, the need for the audit in a company that already has
expertise in the field of information technology among other things:
A. Losses due to data loss.
Data are processed into an information, an important asset in today's business organizations. Many operating activities rely on some important information. Information of a business organization will be a portrait or picture of the state organization in the past, present and future. If this information is missing will result in potentially fatal for the organization in carrying out its activities.
B. Losses due to computer processing errors.
Computer processing becomes the primary focus in a computer-based information systems. Many organizations have been using computers as a means to improve the quality of their work. Starting
from a simple job, such as the calculation of compound interest to the
use of computers as an aid in navigating airplanes or missiles. And many of these organizations are interconnected and integrated. It would be very concerned if there is an error in processing on the computer. Losses ranging from mathematical calculations are not trusted to the dependence of human life.
C. Wrong decisions due to misinformation.
The quality of a decision depends on the quality of information presented to decision-making. The accuracy and significance of the data or information depends on the type of decisions to be taken. If
top managers will make decisions that are strategic, it may be related
to the properties can be tolerated, long-term decisions. But sometimes misleading information will impact decision-making that is misleading as well.
D. Losses due to misuse of computers (Computer abused)
The
main themes that drive the development of the systems audit business
information within an organization is due to the frequent occurrence of
crime computer misuse. Some
types of crime and the misuse of computers, among others, is a virus,
hacking, direct access is not legal (for example, went into the computer
without permission or using a computer terminal and can result in
physical damage or retrieve data or computer programs without
permission) and or unauthorized access to personal interests (someone who has the authority to use the computer but for the purposes of undue).
- Hacking - a person with an unauthorized access to computer systems that can view, modify, or remove a computer program or data or disrupt the system.
- Viruses - A virus is a computer program that attaches itself and run itself a computer program or computer system on a floppy disk, data or program that aims to disrupt or damage the way a computer program or data in it. The virus was designed with two purposes, firstly to actively replicating itself and both interfere with or damage the operating system, programs or data.
- Hardware, software, data, facilities, and other supporting documentation is damaged or stolen and misused or modified.
- Confidentiality of data or important information from the person or organization is damaged or stolen or modified.
- Routine operational activities will be disrupted.
- Computer crime and abuse from time to time increased, and nearly 80% of perpetrators of computer crime is on the inside.
In an information system, hardware, software, data and personnel is an organizational resource. Some
business organizations spend substantial funds to invest in the
preparation of an information system, including the development of human
resources. So that the necessary controls to maintain an investment in this field.
Information
within a business organization is very diverse, from the data of
employees, customers, and other transactions is very risky if not
maintained properly. A person can only use the information to be misused. For example, if confidential customer data, can be used by competitors to take advantage of the competition.
At
the time computers were first used, many auditors have thought that the
audit process will be much changed to conform with the use of computer
technology. There
are two main points to consider in the audit of electronic data
processing, namely the collection of evidence (evidence collection) and
evaluation of evidence (evidence evaluation)
Job Rule Information System Auditor
The CISA certification is for those who need to display knowledge of IT
auditing, security, and control. This certification is extremely
popular with the number of certified professionals numbering over
30,000. Testing is offered once per year at testing locations worldwide.
"IT professionals holding the Certified Information Systems Auditor (CISA) certification earned the largest gains in premium bonus pay among 56 certifications surveyed by Foote Partners, LLC during 2003 and 2002."
Requirements:
To maintain your certification you must pay maintenance fees and complete a minimum of 20 contact hours of CPE (continuing professional education) credits annually.
"IT professionals holding the Certified Information Systems Auditor (CISA) certification earned the largest gains in premium bonus pay among 56 certifications surveyed by Foote Partners, LLC during 2003 and 2002."
Requirements:
- Must pass one exam. The exam is administered once annually, in June and consists of 200 multiple choice questions to be completed in four hours.
- Five years of verifiable experience in IS auditing, control or security is required. Experience must be obtained in the 10 years preceding taking of the exam.
- Agree to the ISACA code of ethics.
- Agree to adhere to the Information Systems Auditing Standards as adopted by ISACA.
- Prices for ISCA members range from $300 to 385 depending upon when you register and if you do so online.
- Prices for non-members rangge from $420 to 505, also depending upon date and method of
To maintain your certification you must pay maintenance fees and complete a minimum of 20 contact hours of CPE (continuing professional education) credits annually.
Information Systems Audit
ISACA is an international professional association that deals with IT Governance. It is an affiliate member of IFAC.Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.
The intent of the certification is to provide a common body of knowledge for information technology / systems risk management, and to recognize the knowledge of enterprise and IT risk that a wide range of IT and Business practitioners have acquired, as well as the capability to: design, implement and maintain information system (IS) controls, to mitigate IS/IT risks.
The CRISC requires demonstrated knowledge in five functional areas or ‘’Domains’’ of IT risk management.
History
The ISACA was founded in the USA in 1967,
when a group of individuals with jobs auditing controls in the computer
systems, which were becoming increasingly critical to the operations of
their organizations, recognized the need for a centralized source of
information and guidance in the field. In 1969, Stuart Tyrnauer,
employed by the (then) Douglas Aircraft Company, incorporated the entity
as the EDP Auditors Association, serving as its founding Chairman for
the first three years. In 1976 the association formed an education
foundation to undertake large-scale research efforts to expand the
knowledge and value of the IT governance and control field.
Current status
ISACA currently serves more than 95,000 constituents (members and
professionals holding ISACA certifications) in more than 160 countries.
The job titles of members are such as IS auditor, consultant, educator,
IS security professional, regulator, chief information officer and internal auditor.
They work in nearly all industry categories. There is a network of
ISACA chapters with 170 chapters established in over 160 countries.
Chapters provide education, resource sharing, advocacy, networking and
other benefits.
Major publications
- Standards, Guidelines and Procedures for information system auditing(Guideline co-developed with the International Federation of Accountants)
- COBIT
- Val IT (Getting best value from IT investments)
- Risk IT
- Information System Control Journal
Certifications
Certified Information Systems Auditor(CISA)
Certified Information Security Manager (CISM)
Certified in the Governance of Enterprise IT (CGEIT)
Certified in Risk and Information Systems Control (CRISC)
Certified in Risk and Information Systems Control (CRISC) is a certification for information technology professionals with experience in managing IT risks, awarded by ISACA. To gain this certification, candidates must pass a written examination and have at least eight years of information technology or business experience, with a minimum of three years work experience in at least three CRISC domains.The intent of the certification is to provide a common body of knowledge for information technology / systems risk management, and to recognize the knowledge of enterprise and IT risk that a wide range of IT and Business practitioners have acquired, as well as the capability to: design, implement and maintain information system (IS) controls, to mitigate IS/IT risks.
The CRISC requires demonstrated knowledge in five functional areas or ‘’Domains’’ of IT risk management.
- Risk Identification, Assessment and Evaluation
- Risk Response
- Risk Monitoring
- Information Systems Control Design and Implementation
- IS Control Monitoring and Maintenance
Langganan:
Postingan (Atom)