Ensuring The Dissipation Of Cyberattacks During The G20 Summit

JAKARTA - The National Cyber and Crypto Agency (BSSN) revealed threats to cybersecurity that could potentially occur at the G20 Summit in Nusa Dua, Bali, on November 15 and 16, 2022.

"In the National Security Operation Center (NSOC) monitoring report owned by BSSN, we see that there are several types of cyber threat trends that occur in Indonesia and also the potential threats that we see will occur at the G20 Summit later," said Spokesperson for the National Cyber and Crypto Agency (BSSN) Ariandi Putra in a press conference #G20updates themed "G20 Summit Cyber Security", Tuesday, October 25, as reported by Antara.

These threats include spam which is the use of electronic devices to send messages repeatedly without being desired by the recipient. The second is phishing, namely digital crimes to steal someone's personal information and data via electronic mail, telephone, text messages, or other means.

Next, there is also a faulty document, which is a virus attached to documents. Fourth, cyber hijacking attacks in the form of browser hijacking. Then, there is also the potential for fake WiFi to exist.

"Furthermore, we also see that there are several other threats, such as malware operations, the exploitation of vulnerabilities that we see from the results of the IT security assessment (information technology security assessment) carried out by BSSN. In addition, we also monitor data theft related to cyber threat trends that occur not only at the G20 Summit, but also before the G20 Summit," he continued.

To avoid these various cyber threats, BSSN has prepared anticipatory steps, including presenting three cyber security support clusters consisting of security before, during, and after the G20 Summit.

"We do this in order to maximize and see how the ideal situation of cyber security is that wants to be done during the main event (core events) on November 15 and 16," he said.

First, before the G20 Summit, BSSN conducted an audit of the information security management system, measured the level of maturity in cybersecurity, and monitored the traffic anomaly (current) based on the BSSN's NSOC monitoring report, and mapped the potential for cyber threats.

Then, when the G20 Summit takes place, BSSN will monitor cybercurrent and incident information, secure signals and counter-sensing, and carry out digital forensics and respond to cyber incidents that occur.

"After the event, we don't want to leave the event (G20 Summit). We are also still working, still doing various things, including the implementation of the identification of cyber security vulnerabilities," said Rian.

In addition, he added, BSSN also mapped potential threats of data disclosure and continued to carry out digital forensics and responses to cyber incidents that occurred.

Through this series of security measures, BSSN hopes that the ideal situation for securing the G20 Summit can really be carried out well.