1 / 38

Keamanan Jaringan

Keamanan Jaringan. Dosen : TIM PENGAJAR PTIK. Computer Security.

meir
Télécharger la présentation

Keamanan Jaringan

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. KeamananJaringan Dosen : TIM PENGAJAR PTIK

  2. Computer Security The protection afforded to an automated information system in order to attain the applicable objectives of preserving the Confidentiality, Integrity, and Availability of information system resources (includes hardware, software, firmware, information/ data, and telecommunications).

  3. Outline • Kriptografi • KeamananJaringan & KomputerdiKehidupanSehari-hari • SegiFisik • SegiSistemOperasi • SegiPerangkatJaringan • SegiAplikasi

  4. Kriptografi

  5. Kriptografi • Kriptografi : • IlmudanSeniuntukmenjagakerahasiaanberita • ContohImplementasi : • Sandi Caesar (Caesar Cipher) : • Pesanasli : • MEET ME AFTER THE TOGA PARTY • Pesan yang diacak : • PHHW PH DIWHU WKH WRJD SDUWB • Rumus : • C = (P + K) mod 26

  6. IstilahdalamKriptografi • Plaintext : Teks asli • Ciphertext : Teks yang telah dienkripsi • Key : Kunci • Cipher : Algoritma enkripsi • Enciphering/Enkripsi : Proses mengubah plaintext menjadi ciphertext • Deciphering/Dekripsi : Proses mengubah ciphertext menjadi plaintext • Cryptanalysis : Teknik mendekripsi pesan tanpa mengetahui detail dari enkripsinya

  7. KategoriKriptografi • Kriptografi dibagi menjadi beberapa bagian, yaitu : • Berdasar jumlah key yang digunakan : • Simetris (Contoh : AES, DES, RC4) • Asimetris (Contoh : RSA) • Berdasar pengolahan plaintext: • Block Cipher (Contoh : AES, DES, RSA) • Stream Cipher (Contoh : RC4)

  8. SegiFisik KeamananJaringandanKomputer Di KehidupanSehari-hari

  9. BagianTerlemahdariSuatuSistemKeamanan

  10. Password Type

  11. Cracking Password

  12. KeyLogger

  13. Password Cracking Countermeasures

  14. SegiSistemOperasi KeamananJaringandanKomputer Di KehidupanSehari-hari

  15. Fatal Error?

  16. Malicious Software

  17. Vulnerability Attack

  18. Apakah Linux Amandari Virus?

  19. ContohAplikasi Trojan Horse

  20. Countermeasures

  21. SegiPerangkatJaringan KeamananJaringandanKomputer Di KehidupanSehari-hari

  22. AntaraSwitch, Hub, danWiFi Switch WiFi Access Point Hub

  23. Man in The Middle Attack

  24. Contoh MITM Attack Isipesan yang dikirimmenggunakanwifi

  25. MengamankanWiFi

  26. SalahSatu Cara Mengatasi MITM Attack • HTTPS

  27. SegiAplikasi KeamananJaringandanKomputer Di KehidupanSehari-hari

  28. Aplikasi yang SeringDigunakan

  29. Possible Threat in Email

  30. Contoh Phishing via Email

  31. Contoh Scam Email

  32. Contoh Scam Email (2)

  33. Countermeasures

  34. Possible Threat in Web Apps

  35. Dangerous Link

  36. Kilkbca.com

  37. FacebookPhising

More Related