Professional Documents
Culture Documents
HACKING CASE
CAUSES OF CASE
Article 30:
1) Any person intentionally and without right or unlawful access to computers and/
or Electronic Systems belonging to another person in any way.
2) Any person intentionally and without right or unlawful access to computers and/
or Electronic Systems in any way with the purpose to obtain electronic
information and / or Electronic Document.
3) Any person intentionally and without right or unlawful access to computers and/
or Electronic Systems in any way to violate, break through, beyond, or break
through the security system.
Article 32:
(1) Any person intentionally and without right or unlawful in any way modify, add,
subtract, transmitting, damaging, removing, moving, hiding an Electronic
Information and/ or Electronic documents belonging to another person or public
property.
(2) Any person intentionally and without right or unlawful in any way to move or
transfer the Electronic Information and / or Electronic Systems Electronic
Documents to another person who is not entitled.
(3) The acts referred to in paragraph (1) which resulted in the opening of an
Electronic Information and / or confidential electronic documents become
accessible to the public with the integrity of the data that is not as it should be.
In the end the judges from Court of Jember, East Java, sentenced
him to 6 months imprisonment. According to the judges, the
hacker convicted of hacking and replacing the front page with
Jemberhacker Team, so that the site can not be accessed for 2
hours.
In his judgment, the judges consider that the hacker still young, can
be fostered, and also wanted to continue his education. This was
corroborated by the testimony of the police who stated intention to
use his expertise by trained and recruited as a internet security
worker at the Police Headquarters.
HACKING TECHNIQUE
AVOIDANCE
Develop a security protections start form computers that are used to build a website,
server security on the web hosting service provider, the technology used for
database protection and security team's ability to keep the web hosting provider files.
Security protection can be done by the following ways:
2. Audit Server: Web administrator must review, testing and simulation periodically
to server security management. This can involve white hackers to test the
security protection of the system from other hackers attacks.
3. Using the Best and Latest Technology: it is important to use powerful hardware
security, including that features Firewall, Intrusion Detection System (IDS) and
Intrusion Prevention System (IPS). For example using Fortigate, Cisco Series
security, and others. Moreover, it can also use the software or use IDS and IPS
security system for Linux distributions like Sootwall, Monowall, Customized
Distro, Linux and others.
In addition, it is better to use secure software and hardware that can automatically
send an email or sms warning and if system detect any attacks from hackers. That
way security efforts could be undertaken immediately.
GOVERNMENT ASSISTANCE
In the ITE Law, an active role of the ISP or web-hosting for more
attention to the security services have also been set up in Article 15,
Paragraph 1, 2 and 3, which reads:
(1) Each Operator must hold Electronic Systems Electronic
Systems reliably and safely and is responsible for the operation
of the Electronic Systems as appropriate.
(2) Electronic System Operator is responsible for the
implementation of the electronic systems.
(3) The provisions referred to in paragraph (2) shall not apply in the
case of occurrence of a force can be proven, errors and / or
omissions of the Electronic System users.
Thank You