- Beranda
- Komunitas
- Entertainment
- The Lounge
Hacker Itu DIAKUI . bukan MENGAKUI


TS
adhitts
Hacker Itu DIAKUI . bukan MENGAKUI
Quote:
Securing public infrastructure
Quote:
Jim Geovedi, Contributor, Jakarta
A cyberwar between Indonesia and Malaysia was sparked by the dispute over the Ambalat oil fields in the Sulawesi Sea, and, possibly, the impact of the ending of the amnesty for illegal Indonesian workers.
On March 5, 2005, Kuala Lumpur protested what it said was intrusion into its territory by an Indonesian naval vessel, while President Susilo Bambang Yudhoyono ordered the Indonesian military to make its presence felt in the disputed waters.
The next day, the website of Universiti Sains Malaysia (USM) was hacked and plastered with hostile Indonesian-sounding, anti-Malaysian messages; messages reminiscent of 1963's Konfrontasi and the Gerakan Ganyang Malaysia (Crush Malaysia Movement).
What followed sent companies and organizations on both sides of the straits scrambling to patch up their security systems and to temporarily shut down websites deemed a security risk.
Cyberwar is not real war Declaring war is a privilege reserved for recognized leaders of nations, not a bunch of unelected kids, even they believe they are acting on behalf of their nation.
By definition, a cyberwar is a coordinated, systematic attack on computers, communications networks, databases and media.
Other related terms are cyberterrorism, cybercrime, strategic information warfare, electronic warfare.
Information systems are complex and interconnected infrastructures upon which many nations are now heavily dependent.
They rest on insecure foundations -- the ability to network has far outpaced the ability to protect networks. With this dependency comes vulnerability to attack from virtually anyone, anywhere with a computer and a connection to the Internet.
Today, information technology -- and the ability to use it -- is more widely available than ever. Widespread, easy access to the Internet, combined with the ability to become anonymous, presents a completely new spectrum of threats to national security.
Not only can a government, group, or individual utilize information technology to disrupt the infrastructure of whole nations, but, often, attacks are not even noticeable until the damage has been done.
Malicious hackers find weaknesses Malicious hackers hit whoever they can, and target any website that has any kind of weakness. They use scanning tools to broadcast a search for security holes in domains that are hosted in Indonesia or Malaysia.
And they often pay little attention to the nature of the website. Many websites will remain vulnerable to malicious hacker attacks until network and system administrators tighten up the security of their servers.
Most hacker attacks, including website defacements, are made through a chain of passive servers that act as springboards.
But all malicious hackers represent threats to organizations for their ability to gain unauthorized access to sensitive information.
Future expectations Cyber tools and technologies are now on the way for both offense and defense. Networks -- and their vulnerability -- are evolving so rapidly that new tools for network mapping, scanning and probing will become increasingly critical to both attackers and defenders.
Deployment of new or improved security tools will help protect against both remote and inside threats.
New and better technologies could provide defenders with improved capabilities for detecting and attributing subtle malicious activity, and enable computer networks to respond to attacks automatically.
However, defense responses will remain at a disadvantage until more fundamental changes to computer and network architectures are made -- changes for which improved security has equal billing with increased functionality.
For attackers, viruses and worms are likely to become more controllable, precise, and predictable -- making them more suitable for weaponization.
In addition, tools for distributed hacking or denial of service -- the coordinated use of multiple, compromised computers or of independent and mobile software agents -- will mature as network connectivity and bandwidth increase.
They could provide attackers with planning aids to develop optimal strategies against potential targets and to more accurately predict effects.
Attackers and defenders alike, it seems, better be ready at all times and must never let down their guard in anticipating the future.
The author is an information security consultant at PT Bellua Asia Pacific, Indonesia. Jim is scheduled to speak at the Bellua Cyber Security Conference in Jakarta on March 23 and 24 (www.bellua.net). He is also a contributor to the OpenBSD and FreeBSD projects, and an active member of HERT, the Hacker Emergency Response Team.
A cyberwar between Indonesia and Malaysia was sparked by the dispute over the Ambalat oil fields in the Sulawesi Sea, and, possibly, the impact of the ending of the amnesty for illegal Indonesian workers.
On March 5, 2005, Kuala Lumpur protested what it said was intrusion into its territory by an Indonesian naval vessel, while President Susilo Bambang Yudhoyono ordered the Indonesian military to make its presence felt in the disputed waters.
The next day, the website of Universiti Sains Malaysia (USM) was hacked and plastered with hostile Indonesian-sounding, anti-Malaysian messages; messages reminiscent of 1963's Konfrontasi and the Gerakan Ganyang Malaysia (Crush Malaysia Movement).
What followed sent companies and organizations on both sides of the straits scrambling to patch up their security systems and to temporarily shut down websites deemed a security risk.
Cyberwar is not real war Declaring war is a privilege reserved for recognized leaders of nations, not a bunch of unelected kids, even they believe they are acting on behalf of their nation.
By definition, a cyberwar is a coordinated, systematic attack on computers, communications networks, databases and media.
Other related terms are cyberterrorism, cybercrime, strategic information warfare, electronic warfare.
Information systems are complex and interconnected infrastructures upon which many nations are now heavily dependent.
They rest on insecure foundations -- the ability to network has far outpaced the ability to protect networks. With this dependency comes vulnerability to attack from virtually anyone, anywhere with a computer and a connection to the Internet.
Today, information technology -- and the ability to use it -- is more widely available than ever. Widespread, easy access to the Internet, combined with the ability to become anonymous, presents a completely new spectrum of threats to national security.
Not only can a government, group, or individual utilize information technology to disrupt the infrastructure of whole nations, but, often, attacks are not even noticeable until the damage has been done.
Malicious hackers find weaknesses Malicious hackers hit whoever they can, and target any website that has any kind of weakness. They use scanning tools to broadcast a search for security holes in domains that are hosted in Indonesia or Malaysia.
And they often pay little attention to the nature of the website. Many websites will remain vulnerable to malicious hacker attacks until network and system administrators tighten up the security of their servers.
Most hacker attacks, including website defacements, are made through a chain of passive servers that act as springboards.
But all malicious hackers represent threats to organizations for their ability to gain unauthorized access to sensitive information.
Future expectations Cyber tools and technologies are now on the way for both offense and defense. Networks -- and their vulnerability -- are evolving so rapidly that new tools for network mapping, scanning and probing will become increasingly critical to both attackers and defenders.
Deployment of new or improved security tools will help protect against both remote and inside threats.
New and better technologies could provide defenders with improved capabilities for detecting and attributing subtle malicious activity, and enable computer networks to respond to attacks automatically.
However, defense responses will remain at a disadvantage until more fundamental changes to computer and network architectures are made -- changes for which improved security has equal billing with increased functionality.
For attackers, viruses and worms are likely to become more controllable, precise, and predictable -- making them more suitable for weaponization.
In addition, tools for distributed hacking or denial of service -- the coordinated use of multiple, compromised computers or of independent and mobile software agents -- will mature as network connectivity and bandwidth increase.
They could provide attackers with planning aids to develop optimal strategies against potential targets and to more accurately predict effects.
Attackers and defenders alike, it seems, better be ready at all times and must never let down their guard in anticipating the future.
The author is an information security consultant at PT Bellua Asia Pacific, Indonesia. Jim is scheduled to speak at the Bellua Cyber Security Conference in Jakarta on March 23 and 24 (www.bellua.net). He is also a contributor to the OpenBSD and FreeBSD projects, and an active member of HERT, the Hacker Emergency Response Team.
Quote:
Quote:
"Kalian belum pantas sandang gelar hacker!"
Quote:

Quote:
Merdeka.com - Belum habis berita mengenai serangan hacker ke situs-situs Australia dan juga penyadapan yang dilakukan pemerintah Negeri Kangguru tersebut, kini kembali surat terbuka dari seseorang untuk salah satu kelompok hacker di Indonesia.
Dari sebuah laman di Pastebin tertanggal 16 November lalu, muncul sebuah tulisan yang diperuntukkan bagi Java Cyber Army. Dalam tulisan tersebut mengatakan bahwa para hacker sekarang ini (termasuk JCA) yang telah berkoar-koar berhasil mengeksploitasi 1000 website dalam satu hari dan mempublikasikannya ke forum dan situs hacker hanyalah besar mulut saja.
Surat terbuka untuk Java Cyber Army di PastebinSang penulis yang diperkirakan adalah seorang hacker atau paling tidak berkecimpung dalam dunia IT tersebut juga menyebutkan bahwa hacker individu atau juga kelompok peretas saat ini hanya menginginkan sebuah pengakuan dan popularitas namun tidak benar-benar ingin menjaga kedaulatan cyber Indonesia.
Dari sebuah laman di Pastebin tertanggal 16 November lalu, muncul sebuah tulisan yang diperuntukkan bagi Java Cyber Army. Dalam tulisan tersebut mengatakan bahwa para hacker sekarang ini (termasuk JCA) yang telah berkoar-koar berhasil mengeksploitasi 1000 website dalam satu hari dan mempublikasikannya ke forum dan situs hacker hanyalah besar mulut saja.
Surat terbuka untuk Java Cyber Army di PastebinSang penulis yang diperkirakan adalah seorang hacker atau paling tidak berkecimpung dalam dunia IT tersebut juga menyebutkan bahwa hacker individu atau juga kelompok peretas saat ini hanya menginginkan sebuah pengakuan dan popularitas namun tidak benar-benar ingin menjaga kedaulatan cyber Indonesia.
Quote:

Quote:
Lanjutnya, seorang hacker adalah seseorang yang mampu mengerti, paham dan dapat membuat program sendiri, namun rata-rata mereka (para hacker sekarang ini) masih buta akan programming dan belum bisa membuat program sendiri.
Terlebih lagi, beberapa hari ini ketika panasnya tensi cyber Indonesia dan Australia, banyak yang mengatakan, "NKRI harga mati!," namun apa yang ada di lapangan? Pada kenyataannya hampir semua situs di Indonesia masih rentan untuk dibobol.
Oleh karenanya, terdapat satu kalimat yang patut digarisbawahi dari tulisan tersebut yaitu "Seorang hacker itu diakui, bukan mengakui."
"Sering melakukan deface terhadap website lain dan mengaku menjadi seorang developer, tapi kalian belum pantas untuk menyandang gelar seorang hacker! Hacker itu diakui bukan mengakui. Di sini kami tidak menggurui, namun harus jalan pada etika dunia kita (dunia peretasan). Apakah Kalian tidak malu dengan para sesepuh terdahulu yang sekarang geleng-geleng kepala dengan regenerasi seperti kalian?? Cobalah untuk lebih kreatif .. !!," tulisnya.
Terlebih lagi, beberapa hari ini ketika panasnya tensi cyber Indonesia dan Australia, banyak yang mengatakan, "NKRI harga mati!," namun apa yang ada di lapangan? Pada kenyataannya hampir semua situs di Indonesia masih rentan untuk dibobol.
Oleh karenanya, terdapat satu kalimat yang patut digarisbawahi dari tulisan tersebut yaitu "Seorang hacker itu diakui, bukan mengakui."
"Sering melakukan deface terhadap website lain dan mengaku menjadi seorang developer, tapi kalian belum pantas untuk menyandang gelar seorang hacker! Hacker itu diakui bukan mengakui. Di sini kami tidak menggurui, namun harus jalan pada etika dunia kita (dunia peretasan). Apakah Kalian tidak malu dengan para sesepuh terdahulu yang sekarang geleng-geleng kepala dengan regenerasi seperti kalian?? Cobalah untuk lebih kreatif .. !!," tulisnya.
Quote:
0
7.7K
Kutip
26
Balasan


Komentar yang asik ya
Urutan
Terbaru
Terlama


Komentar yang asik ya
Komunitas Pilihan