Akbar PDF
Akbar PDF
Akbar Azwir
• Graduated from Binus University
• Certified Trainer since 2008
• Trainer at BelajarMikrotik.Com
02
About me
Belajar Mikrotik
• Started in 2013 by Herry Darmawan and Akbar
Azwir
02
Information Security
Information
Assets that has a value which therefor needs
protection
Information Security
Preservation of Confidentiality, Integrity, and
Availability of an information
02
Information Security
Graphic: http://www.cyberintelligence.my/our-approach/
03
Information Security
Graphic : http://www.iphonefaq.org/archives/ios-501,
http://idealway.tumblr.com/post/1434031686/3-reasons-why-continuous-improvement-efforts-fail 04
ISO 27001
ISO/IEC 27001:2013
Information technology – Security techniques –
Information security management systems -
Requirements
Standards that provides methodology for the implementation of
Information Security Management System in an organization.
05
ISO 27001
Benefit ISO 27001 PDCA Cycle
• Achieve marketing
advantage
• Lower cost
• Better organization
• Comply with legal
requirements or regulations
Graphic : http://www.netgrowthltd.co.uk/ISO27001.aspx
06
ISO 27001 Structures
Sections 0 to 3 are
introductory and are not
Section 0 Section 1
Section 2 Section 3 mandatory for implementation
Normative Terms and
Introduction Scope
references definitions
Sections 4 to 10 contains
requirements that must be
Section 7 Section 6 Section 5
Section 4 implemented in an
Context of the
Support Planning Leadership
organization organization if it wants to
comply
Section 9
Annex A contains 114 controls
Section 8 Section 10
Operation
Performance
Improvement
Annex A that must be implemented if
evaluation
applicable
07
Checklist
08
Checklist Download
http://www.belajarmikrotik.com/?p=21598
08
Checklist Categories
Router Policy
Contains question regarding the existence of Router Security Policy
Administrator Authentication
Questions about the procedure and technical control on how
administrator access to the router
09
Checklist Categories
Configuration Management
Contains question regarding the management of router configuration
Business Continuity
Questions about the procedure for disaster recovery and business
continuity
10
Thank you
[email protected]
www.belajarmikrotik.com
Credits
Herry Darmawan
Adhie Lesmana
12