All entries by this author

CIO Security Forum: What CIO needs to know about ISO 27001 Information Security Management System (ISMS)

Aug 7th, 2012 | By | Category: CIO Security Forum

ISO 27001 bukan hanya merupakan kepentingan bagian teknologi informasi (TI). Walaupun tidak dapat dipungkiri bahwa TI amat berperan dalam pengelolaan informasi. ISO 27001 memiliki peran strategis bagi perkembangan bisnis secara keseluruhan dan merupakan tanggung-jawab manajemen. British Standard Institution (BSI) dan XecureIT mengundang Bapak/Ibu untuk menghadiri presentasi dan diskusi terkait ISO 27001 Information Management System (ISMS), […]



Security Night: Keamanan eKTP, Kamis, 02 Agustus 2012, 17.00-21.00

Jul 26th, 2012 | By | Category: KKI

Implementasi eKTP di Indonesia sudah dijalankan. Tidak bisa dipungkiri bahwa banyak sekali potensi manfaat yang diperoleh Indonesia melalui eKTP. Namun, jumlah informasi yang berisi ratusan juta data-data pribadi WNI menjadikan sistem eKTP amat menarik bagi banyak pihak. Mulai dari para penjahat siber, perusahaan, hingga negara asing. Banyak pertanyaan muncul dikalangan peminat keamanan informasi. Salah satu […]



XSIRT Newsletter, 02 September 2011: Sertifikat Digital Asli Tapi Palsu Semakin Marak

Sep 2nd, 2011 | By | Category: Newsletter, XSIRT

XecureIT Security Incident Response Team Newsletter DAFTAR ISI Agenda Berita Peringatan Keamanan Peringatan Kelemahan Peralatan Keamanan Klik disini untuk membaca XSIRT Newsletter edisi publik yang lain. AGENDA Information Security Training and Certification Schedule 3-in-1 Information Assurance Professional Training (CISSP-CISM-ISMS), 10-15 Oktober 2011 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge Training, 10-14 Oktober […]



XSIRT Newsletter, 23 Agustus 2011: Kode Sumber Trojan Spyeye beredar di Internet

Aug 23rd, 2011 | By | Category: Incident Handling, Newsletter, XSIRT

XecureIT Security Incident Response Team Newsletter DAFTAR ISI Agenda Berita Laporan Penelitian Peringatan Kelemahan Peralatan Keamanan Tips   AGENDA Information Security Training and Certification Schedule 3-in-1 Information Assurance Professional Training (CISSP-CISM-ISMS), 10-15 Oktober 2011 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge Training, 10-14 Oktober 2011 ISO 27001 Information Security Management System (ISMS) […]



XSIRT Newsletter, 12 Agustus 2011: Kelemahan paling berbahaya pada Blackberry Enterprise Server

Aug 12th, 2011 | By | Category: Newsletter, XSIRT

XecureIT Security Incident Response Team Newsletter DAFTAR ISI Agenda Berita Peringatan Kelemahan Peralatan Keamanan Tips AGENDA Information Security Training and Certification Schedule 3-in-1 Information Assurance Professional Training (CISSP-CISM-ISMS), 10-15 Oktober 2011 Certified Information Systems Security Professional (CISSP) Common Body of Knowledge Training, 10-14 Oktober 2011 ISO 27001 Information Security Management System (ISMS) Lead Implementer Training, […]



Security Quality Requirements Engineering (SQUARE)

May 28th, 2011 | By | Category: Management

Security Quality Requirements Engineering (SQUARE) is a nine-step process to help organizations build security into the early stages of the production life cycle. The process involves identifying and assessing processes and techniques to improve requirements identification, analysis, specification, and management. It also focuses on management issues associated with the development of good security requirements. Using […]



Intruder Detection Checklist on Windows System

May 28th, 2011 | By | Category: Incident Handling

Intruder Detection Checklist on Windows System by CERT® Coordination Center This document is being published jointly by the CERT Coordination Center and AusCERT (Australian Computer Emergency Response Team). Introduction General Advice Pertaining to Intrusion Detection Look for Signs that Your System may have been Compromised A Word on Rootkits Examine Log Files Check for Odd […]



Intruder Detection Checklist on UNIX System

May 28th, 2011 | By | Category: Incident Handling

Intruder Detection Checklist on UNIX System by CERT® Coordination Center   Introduction Look for Signs That Your System May Have Been Compromised Examine log files Look for setuid and setgid Files Check system binaries Check for packet sniffers Examine files run by ‘cron’ and ‘at’. Check for unauthorized services Examine /etc/passwd file Check system and […]