NIM: 12068138 — KELAS: 12.6B.23

Wolter – Pagi

Pertemuan 1 – Trend Serangan

Posted by enduser666 on April 2, 2009

tes2 juga

tes2 juga

Risk dikontribusi oleh:

· Aset (assets)

® Perangkat keras (hardware)

® Perangkat lunak (software)

® Dokumentasi (documentation)

® Data

® Komunikasi (communications)

® Lingkungan Sekitar (environtment)

® Manusia (people)

· Ancaman (threats)

® Pemakai (users)

® Peretas (hackers)

® Teroris (terrorists)

® Penjahat kriminal (criminals)

® Kecelakaan (accidents)

® Nasib (Acts of God)

® Issue motivated group

® Intel luar negeri (Foreign Intelligence)

  • Kerentanan (Vulnerability – jamak: vulnerbilities)

® Bugs

ü Software bugs

ü Hardware bugs

® Radiasi (radiation)

® Telepon (telephone)

ü Tapping / telephone tapping / wire tapping / wiretapping

ü Crosstalk

ü Cracker via telephone (phreaking / phone phreaking / phone fraud)

® Pengguna yang tidak berkepentingan (unauthorized user)

® Cetakan (printout)

ü Softcopy

ü Hardcopy

® Media penyimpanan (storage media)

® Keteledoran/kecerobohan (oversight) – human error

Empat klasifikasi keamanan berdasarkan lubang keamanan (security hole)

  1. Keamanan fisik (physical security)
  2. Keamanan karyawan & pengguna (personeel / employee & user)
  3. Keamanan data, media, dan teknik berkomunikasi
  4. Keamanan operasi / prosedur / kebijakan (policy)

Aspek keamanan

  • Serangan terhadap keamanan (security attack)

1. serangan pasif (passive attack)

2. serangan aktif (active attack)

  • Mekanisme keamanan (security mechanism)
  • Pelayanan demi keamanan (security service)

1. Privacy & Confidentiality

2. Integrity

3. Authentication

4. Availability

5. Access control

6. Non-repudiation

Beberapa kemungkinan serangan (attack) terhadap keamanan system informasi (W. Stallings)

  1. Interruption
  2. Interception
  3. Modification
  4. Fabrication

Istilah

  1. Distributed DoS
  2. Theft of Information
  3. Corruption of Data
  4. Spoofing
  5. Sniffer
  6. Password cracker
  7. Desctructive device
  8. Scanner

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

 
%d bloggers like this: