Kuliah Ke 6 Thema: Fungsi, Map Proses Dan Nilai / Target Performansi (Kpi) Security Management
Kuliah Ke 6 Thema: Fungsi, Map Proses Dan Nilai / Target Performansi (Kpi) Security Management
Kuliah Ke 6 Thema: Fungsi, Map Proses Dan Nilai / Target Performansi (Kpi) Security Management
Thema
CUSTOMER
Market,
Market,Product
Productand
andCustomers
Customers
Service
Service
Resources
Resources
(Application, Computing and Network)
(Application, Computing and Network)
Supplier,
Supplier,Partner
Partner
SUPPLIRES/PARTNERS
ENTERPRISE MANAGEMENT
ENTERPRISE MANAGEMENT
Strategic & Enterprise Enterprise Risk Enterprise Effectiveness Knowledge & Re-search
Planning Management Management Management
Enterprise Risk
Enterprise Risk
Management
Management
(ERM)
(ERM)
Security Management processes interface to external security, police and/or investigative organizations.
These processes strongly interact with Fraud Management and have common elements and information services and
communications specific elements.
Security Management processes are implemented at many levels of the enterprise and at the user, system/network, etc. levels.
Note that the actual security monitoring, control and management procedures and facilities are embedded in the operational
infrastructure and processes defined and deployed within the SIP and Operations process areas.
Note that Audit Management processes provide assurance that the necessary control structures are in place, and provide an
estimate to the extent to which the procedures are followed and are effective
RM&O level 2 Processes ETOM Vs Rec ITU M.3400 (MFA)
RM&O LEVEL 2
PROCESSES v.3.5. (E- TOM)
M.3400 MANAGEMENT
FUNCTIONAL AREAS (MFA)
(M3400 MFA ITU REC)
(E- TOM)
Security
Management
ENTERPRISE MANAGEMENT 6
M3400 - TMN Functional Decomposition
M3400
Security Configuration Fault Performance Accounting
Management
Management Management Management Management Management
Functional
Areas 4 5 6 4 4
M3400
Containment Security
Security Prevention Detection
& Recovery Administration
Management
5 10 16 24 55
M3400
RAS Quality Alarm Fault Fault Trouble
Fault Testing
Assurance Surveillance Localization Correction Administration
Management
6 10 5 5 11 7 44
M3400 Collections
Usage Tariffing/ Enterprise
Accounting and
Measurement Pricing Control
Management Finance
17 8 21 11 57
7
Total functional units = 260
PREVENTION :
• Legal review
• Physical access security
• Guarding
• Personnal risk analysis
• Security screening
DETECTION
• Investigation of changes inrev.patern • Investigation of theft of service
• Support element protection • Internal traffic and activity pattern analysis
• Customer security alarm • Network security alarm
• Customer profiling • Software intrusion audit
SECURITY • Customer usage pattern analysis • support element security alarm reporting
MANAGEMENT
SECURITY ADMINSITRATION
• Security policy
• Customer audit trail
• Disaster recovery planning
• Customer security alarm management
• Management guards
• Testing of audit trail mechanism
• Audit trail analysis
• Adm. of internal authentication & access cont.
• Security alarm analysis
• Adm. of internal certification & encryption
• Assessment of corporate data integrity
• Network audit trail management
• Adm.of external authentication
• Network security alarm management
• Adm.of external access control
• NE audit trail management
• Adm. of external certification
• NE security alarm management
• Adm. of external encryption and keys
• Adm. of key for Nes
• Adm.of external security protocols
• Adm.of key by an NE
KPI Security Management
Process
Contoh pada Fraud Management
Accuracy
PREVENTION Security
Performance
Setting
• # Fraud
FRAUD
DETECTION Detected MANAGEMENT
• # Solution
provided Reducing
uncollectable
& Unbillable
Revenue
• # Fraud
CONTAINMENT Corected &
AND RECOVERY Recov ered
• Accuracy
SECURITY • Lengkap
ADMINSITRATION • Timely
SECURITY MANAGEMENT
CONCEPT
SISTIMATIKA
• Introduction, Status and Objective
• Security Management Processes and Procedure
• Security Management Function
o Risk Analysis
o Evaluation Of Security Services
o Evaluation Of Security Management Solution
o Alarming, Logging, and Reporting
o Protection Of Network Management Systems
• Instrumentation Of Security Management
o Monitoring Devices
o Encryption Devices
o Limiting access to End User Devices
o Improving LAN Security Management
• Human Resources demand of Security Management
Introduction, Status and Objective
SECURITY MANAGEMENT
Security umumnya berbanding lurus dengan biaya , semakin aman suatu jaringan ma
ka akan semakin mahal dan produk jasa semakin tidak kompetitif ,
Rev/
Cost/
Risk
nu e
ve
Re T
V I
PRO
rity)
Cost/Risk (Secu
Waktu
Introduction, Status and Objective
• Security Management adalah suatu kumpulan kegiatan
untuk melindungi jaringan dan seluruh komponen
didalamnya dari aspek yang merugikan Operator dan
Pelanggan antara lain ; akses ke aplikasi , transfer
informasi dalam jaringan , ketersediaan dan kesiapan
Back Up atau Cadangan .
o Risk Analysis
o Evaluation Of Security Services
o Evaluation Of Security Management Solution
o Alarming, Logging, and Reporting
o Protection Of Network Management Systems
Security Management Function
Risk Analysis
Analysis Object Analysis Result
• End User
• End User Workstation
• Local Area Networks • List and Description Of
• Metropolitan Area Network
• Wide Wrea Network Risk
• Processing component, including operation
system,database, files, and application
Security Management Function
Evaluation Of Security Service
Evaluation Object Evaluation Result
• Sophistication
• Cost
• Implementation Efforts • Risk Mitigation Ressult
• Maintenance Efforts • Process Improvement
• Demand For Human Ressources
Security Management Function
Alarming, Logging, and Reporting
Activities Result
Configuration,Fault,Performance,Security,
• Organisasi dan Job
Accounting and Planning .
Desc. Security
• Communication Form
Management
• Principal Application
• Various networks (LAN,MAN,WAN)
• Network Partition (End User
Area,Transmision,Processing Area )
Instrument Of Security Management
o Monitoring Devices
o Encryption Devices
o Limiting access to End User Devices
o Improving LAN Security Management
Instrument Of Security Management
Monitoring Device Functionality
• User identification and verification by password
• Authorization Checking for access requests
• Journaling , logging , and reporting of security violations and access to system
resources
• Facilities for delegating the control of resource to the appropriate argonizational
level
• Programs to report the status of MVS and VM security and integrity
• Real-time status displays (similar to network monitors NET/ALERT (AVAN848B)
• Application and cutomers transparency
• Three types of alerts :
o Security alerts, when an invalid log-on is attempted
o Equipments alerts, which identify hardware malfunction or failure
o Threshold alert, when a dial-in customer exceeds a specifieds connect-time
limit
o or idle time-limit
• A history of log-ons and alerts provided by audit trials
• Hackers trap via :
o Artificial respons delay
o Offering pseudosystem mode
Instrument Of Security Management
Monitoring Device Functionality
•Call-back, Using specific phone nimbersassigned to authoried customers
•Usual audit trails provided include :
o Date and time of all attempts
o Which line the call came in on
o Which line the call went out on
o Entry and disconnect time
o Passsword used
o User assocciated with the call
Instrument Of Security Management
Encription Device
•Montoring dan Pengecheckan Proses Enkripsi
• Perbaikan Proses Encripsi
•Modifikasi atau perubahan proses enkripsi (bila enkripsi telah terpecahkan)
Instrument Of Security Management
Limiting Access to End User Devices
•Melakukan pembatasan atas siapa yang diizinkan masuk pada peralatan peralatan
Peralatan End User ; terminal, personal system,worksatasion, dll.
•Monitoring proses autentifikasi pengguna jaringan
•Menggunakan kartu akses dengan Chip didalamnya
Instrument Of Security Management
Improving LAN Security Management
•Tapping
•Radiation Leakage
•File and Program Protection, and phisical Security
•Autentication, Audit Traill, and Encription bisa dikerjakan sama dengan pada WAN
MAP PROSES
FRAUD MANAGEMENT
(BEST PRACTISE)
REFERENSI NOMOR
TELECOMMUNICATION FRAUD DIVISION
OWNER M. FRAUD
TELCO MANAJEMEN PROSES PENANGANAN FRAUD
TOH Key Indicator :Reduce Uncollectible & Unbillable Revenue
ISSUED DATE
N ( Level 2)
CO
REVISI NOMOR
E=Eecuting
S=Suppoting
A=Advising
KESIMPULAN PENTING
KESIMPULAN PENTING
DO (HARUS DILAKUKAN)
•Process
o Consider security management as prime corporate objective
o Allocate sufficient funds and people
o Clearly define security objectives
o Analyze major threaths : Inside/Outside
o Set Up Close Loop: Monitor-Detect-Fix-Report
o Formulate: Four-Layer Security System
o Give Highest Security to Network Management Center System/Procedure
o Emphasize security procedures within the organization
•Product
o Select Products as Part of Close Loop
o Select Products as part of multi layered security
o Select Products with good audit trail function
•People
o Involve all corporate personnel
o Motivate user by explaining damage thet may be caaused by security failure s
KESIMPULAN PENTING
AVOID (JANGAN DILAKUKAN)
•Process
o Single Layer Security Procedure
o Considering Security Management as Overhead
o Being Satisfied with present security status
o Giving unlimited access to any individual
o Maintaining passwords/codes and so on, for extended periods
o Failling to adquately follow on security violations
•Product
o Those product that can be defeated or bypassed easily
o Those not designed with security as an essential part of them
•People
o Hiring Network Management Center personnel without stringent investigation
o Continuing network access to repeated security violators
CONTOH TUGAS KELOMPOK
SECURITY MANAGEMENT
SECURITY MANAGEMENT
Oleh :
Tim /Kelompok Pembuatan Tugas
Manajemen Jaringan Telekomunikasi UMB
Definisi
• Security Management adalah suatu kumpulan kegiatan untuk melindungi
jaringan dan seluruh komponen didalamnya dari aspek yang merugikan
Operator atau Pelanggan antara lain ; akses ke aplikasi , transfer informasi
dalam jaringan , ketersediaan dan kesiapan Back Up atau Cadangan .
2. Technical/Management
Security yang diperluas / dikembangkan dengan
memasukan unsur technical, management, dan
isu-isu strategi perusahaan yang memberikan
solusi security dan memungkinkan antar
pengguna di internal dan eksternal
Struktur Security Fungsional
Struktur Security Fungsional
3. Management: Peran Security selanjutnya
dikembangkan untuk memberikan pandangan
management ke seluruh program security perusahaan
– Memberikan penguasaan security (governance) dan kartu
catatan (scorecards)
– Tekhnikal security dikembalikan ke development, network dan
operation
Struktur Security Fungsional
Struktur Security Fungsional
Proses-proses Security
• “Security adalah sebuah rangkaian dalam infrastruktur yang mempunyai link yang
aman dan bukan merupakan sebuah produk ataupun serial teknologi. Merupakan
sebuah proses dari solusi yang terukur dalam kebutuhan bisnis organisasi”.
• “Proses Security desktop adalah pendekatan terpadu dari kebijakan yang mengikat,
terstandard, & berpedoman dengan membangun sebuah roadmap dari proses
customized yang akan menghasilkan sebuah hasil yang diinginkan, terukur & dapat
diaudit.”
• Didalam semua organisasi - kecuali jika pedoman khusus diberikan,
- Tidak akan ada jaminan bahwa security policy akan diimplementasikan dengan
baik.
- Bahwa banyak pengguna / user tidak membaca atau mengerti security policies
dan bahkan security awareness trainingtelah dilakukan.
- Para pengguna / user tidak mematuhi- dikarenakan tekanan pekerjaan yang
dialami tiap hari.
Proses-proses Security
• Bahwa satu-satunya cara untuk memastikan sesuai dengan security
policy adalah untuk mengakui jika security membutuhkan untuk
menyediakan dokumen proses security kepada user adalah singkat,
langsung, mudah dimengerti, dan dengan memberikan semua
template yang diperlukan.
• Proses ini adalah disebut “middle ground” antara security policy,
measuring, auditing dan memastikan bahwa users akan dan dapat
memberikan infrastruktur yang aman kepada perusahaan.
Dampak Security pada Proses Bisnis
Management Security Perusahaan
• Memulai dari dasar pikiran bahwa Security Service memerlukan untuk
menghasilkan solusi security ketika Organisasi perlu mencapai objektivitas.
• Membutuhkan promosi-promosi proses security yang focus dan
berkepemilikan.
• Melihat pada fidusiari, kwalitas dan kebutuhan security Organisasi serta
memberikan solusi untuk enam kriteria informasi yang dapat digunakan untuk
mendefinisikan secara umum apakah Organisasi membutuhkan Security
Service.
• Kriteria Informasi:
1. Ketersediaan (Availability)
2. Integritas (Integrity)
3. Kerahasiaan (Confidentiality)
4. Keandalan (Reliability)
5. Pemenuhan (Compliance)
6. Bukan Penanggalan (Non-repudiation)
Key Performance Indicators (KPI)
•Key Performance Area
- Kebijakan Security dan Design – Pedoman - Proses
Key Performance Indicators (KPI)
• Key Performance Area
- Aplikasi Security
• Key Performance Indicators
- Prosentase penyelesaian identifikasi aplikasi yang
sensitif oleh Department dan Data Owner.
- Prosentase penyelesaian identifikasi aplikasi yang
critical oleh Department dan Data Owner.
- Prosentase penyelesaian Sertifikasi security dan
Akreditasi aplikasi yang krusial / sensitif.
- Prosentase training khusus Security Awareness untuk
para developer dan data owners.
Key Performance Indicators (KPI)
• Key Performance Area
- Infrastruktur yang aman
SM Mencakup 4 kelompok grup (rec. ITU-T
M.3400)
• Prevention.
• Detection.
• Containment and recovery.
• Security administration
Prevention includes the following function
sets: