computer security awareness
TRANSCRIPT
![Page 1: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/1.jpg)
Presented by
Helmy Faisal M
![Page 2: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/2.jpg)
![Page 3: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/3.jpg)
![Page 4: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/4.jpg)
![Page 5: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/5.jpg)
![Page 6: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/6.jpg)
![Page 7: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/7.jpg)
Motif Serangan terhadap Komputer?
• Iseng-iseng.
• Politik.
• Dendam (pasukan sakit hati).
• Pekerjaan (hacker, security
professional).
![Page 8: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/8.jpg)
![Page 9: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/9.jpg)
“ Informasi hanya bisa diakses oleh pihak yang berwenang ”
•motive
![Page 10: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/10.jpg)
“ Informasi hanya dapat dirubah oleh pihak yang berwenang ”
![Page 11: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/11.jpg)
“ Informasi tersedia saat dibutuhkan oleh pihak yang berwenang ”
![Page 12: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/12.jpg)
“ Pihak yang terlibat dengan pertukaran informasi dapat diidentifikasi dengan benar dan
adanya jaminan untuk keaslian identitas tersebut ”
![Page 13: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/13.jpg)
“ Penerima informasi mampu membuktikan bahwa pengirim informasi benar-benar mengirim bilamana pengirim menyangkal pernah mengirimkan informasi tersebut ”
![Page 14: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/14.jpg)
![Page 15: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/15.jpg)
“ Serangan terhadap aset dari sistem komputer sehingga menjadi tidak tersedia atau tidak dapat digunakan oleh pihak yang berwenang ”
![Page 16: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/16.jpg)
“ Pihak yang tidak berwenang mendapatkan akses terhadap sistem komputer dengan cara menyadap otentifikasi ”
![Page 17: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/17.jpg)
“ Pihak yang tidak berwenang dapat melakukan perubahan terhadap suatu aset ”
![Page 18: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/18.jpg)
“ Pihak yang tidak berwenang menyisipkan objek palsu kedalam sistem ”
![Page 19: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/19.jpg)
![Page 20: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/20.jpg)
“ Mengamankan lokasi sistem komputer terhadap serangan / perusakan yang bersifat fisik ”
![Page 21: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/21.jpg)
• Siapa saja yang boleh mengakses ruangan komputer?
![Page 22: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/22.jpg)
• Apakah ruangan komputer aman dari bencana? (bencana alam, bencana buatan).
![Page 23: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/23.jpg)
“ Salah satu teknik untuk memperoleh informasi dengan cara ‘menipu’ targetnya (manusia) “
![Page 24: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/24.jpg)
![Page 25: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/25.jpg)
• BIOS.
• Sistem operasi yang digunakan.
• Layanan yang di install.
![Page 26: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/26.jpg)
“ Menjaga agar sumber daya jaringan komputer digunakan sebagaimana mustinya ”
![Page 27: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/27.jpg)
• Keamanan pada aplikasi yang di install.
• Berhubungan erat dengan Secure Coding oleh programmer.
![Page 28: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/28.jpg)
• Memastikan data yang di transmisikan melalui jaringan komputer tidak dapat dibaca oleh pihak yang tidak berhak.
![Page 29: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/29.jpg)
• Menjamin privasi.
![Page 30: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/30.jpg)
• Mendukung verifikasi identitas pengguna.
![Page 31: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/31.jpg)
• Menjamin keaslian informasi.
![Page 32: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/32.jpg)
“Program komputer yang digunakan untuk menyusup, mengganggu, merusak, Mencuri informasi, atau menyebabkan sistem tidak bekerja sebagaimana mustinya”
![Page 33: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/33.jpg)
![Page 34: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/34.jpg)
• Keamanan adalah proses, tidak ada sistem yang 100% aman.
![Page 35: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/35.jpg)
• Keamanan berbanding terbalik dengan kenyamanan.
![Page 36: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/36.jpg)
![Page 37: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/37.jpg)
![Page 38: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/38.jpg)
![Page 39: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/39.jpg)
![Page 40: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/40.jpg)
![Page 41: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/41.jpg)
![Page 42: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/42.jpg)
![Page 43: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/43.jpg)
![Page 44: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/44.jpg)
![Page 45: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/45.jpg)
![Page 46: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/46.jpg)
“ Meningkatkan kesadaran setiap
orang akan keamanan dalam berinteraksi
dengan komputer dan internet ”
![Page 47: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/47.jpg)
![Page 48: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/48.jpg)
![Page 49: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/49.jpg)
![Page 50: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/50.jpg)
![Page 51: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/51.jpg)
![Page 52: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/52.jpg)
![Page 53: Computer security awareness](https://reader033.vdocuments.net/reader033/viewer/2022061506/556184a3d8b42a71658b45ec/html5/thumbnails/53.jpg)