SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
Pendahuluan




2011-2012-3     Anung Ariwibowo   1
     12 Perkuliahan dalam 4 pekan
         3 pertemuan setiap pekan
         Senin, Rabu, Jumat
         08.00 – 10.30 WIB

      Kehadiran
             Paling lambat 15 menit (Mahasiswa, Dosen)
             70% minimum (Mahasiswa)




2011-2012-3                    Anung Ariwibowo            2
     Komponen Penilaian
         10% Kuis (9 + Pre-test)
         20% Tugas (4)
         30% UTS (Open book)
         40% UAS (Open book)
         5% Bonus (Aktifitas, pengumpulan dini, kreatifitas)




2011-2012-3                 Anung Ariwibowo                     3
     Stallings, "Cryptography and Network
       Security"http://williamstallings.com/Cryptography/
      Schneier, "Applied Cryptography"
       http://www.schneier.com/book-applied.html
      Slides
       tjerdastangkas.blogspot.com/search/label/ikh323




2011-2012-3               Anung Ariwibowo                   4
     Kriptografi dan Sistem Keamanan Komputer
      Standar Sistem Keamanan
      Enkripsi Kunci Simetrik
      Number Theory
      Enkripsi Kunci Publik
      Autentikasi Pesan dan Fungsi Hash




2011-2012-3            Anung Ariwibowo            5
     Berapa lama waktu yang dibutuhkan?
         Jumlah simbol: 26 + 26 + 10
         Panjang password: 10 karakter
         Kombinasi: 6210
         Kecepatan pengolahan: 1×109 per detik
         Waktu:       10
                    62
                       9 1
                             83,929,936.59 s  971.41 hari
                  110 s




2011-2012-3                Anung Ariwibowo                    6
     Rekam Medikal harus didistribusikan, sambil
       tetap menjaga privasi pasien
      What if layanan Google terhenti karena
       serangan hacker?
             Bagaimana admin Google memonitor kehandalan
              sistem terhadap peretas?




2011-2012-3                   Anung Ariwibowo               7
     The protection afforded to an automated
       information system in order to attain the
       applicable objectives of preserving the
       integrity, availability, and confidentiality of
       information system resources (includes
       hardware, software, firmware,
       information/data, and telecommunications).
       (NIST Computer Security Handbook, 1995)



2011-2012-3              Anung Ariwibowo                 8
     Data
             Informasi yang disimpan dalam sistem komputer
              tetap utuh
      System
             Sistem yang menyediakan layanan informasi tetap
              utuh dan berfungsi dengan baik




2011-2012-3                    Anung Ariwibowo                  9
     Sistem komputer yang digunakan tetap
       tersedia dan bsia diakses kapan pun
      Data Confidentiality
      Privacy




2011-2012-3            Anung Ariwibowo        10
     Tidak sesederhana itu
             Seni berperang adalah bagaimana kita
              mempersiapkan diri jika ada serangan (Sun Tzu)
      Mengembangkan mekanisme keamanan tidak
       mudah
             Setiap benteng selalu ada titik lemahnya (Sun Tzu)
      Perlu mempertimbangkan banya segi dan
       aspek
             Bandingkan dengan pengembangan peranti lunak


2011-2012-3                     Anung Ariwibowo                    11
     Ada banyak celah untuk ditutup (admin)
      Hanya perlu satu celah untuk disusup (hacker)
      User's point of view
         Investasi
         Backup
         Prevensi

      Pemantauan dan Administrasi
             Sumber daya manusia
             Sumber daya waktu


2011-2012-3                  Anung Ariwibowo           12
     Tidak sesederhana itu
      Rangkaian kuliah bertopik "Security"
      ..and you have to suffer listening to these talks!
         seriously kidding,
         jokingly serious




2011-2012-3                    Anung Ariwibowo              13
     PD II
         Alan Turing, John von Neumann
         Mesin Turing
         Enigma
         Cryptography
         Machine Translation

      Tindakan pencegahan
             Let's make them hard to peek in
      Mencegah informasi diketahui pihak lain

2011-2012-3                     Anung Ariwibowo   14
     Komunikasi
         Pengirim
         Penerima
         Pendengar

      Pengirim-penerima menggunakan bahasa yang
       sama
      Membuat 'bahasa'
             sulit dipahami Pendengar
             mudah dikomunikasikan antara Pengirim-Penerima


2011-2012-3                   Anung Ariwibowo                  15
     Stallings, "Cryptography and Network
       Security"http://williamstallings.com/Cryptography/
      Schneier, "Applied Cryptography"
       http://www.schneier.com/book-applied.html
      Slides
       tjerdastangkas.blogspot.com/search/label/ikh323




2011-2012-3               Anung Ariwibowo                   16

Mais conteúdo relacionado

Destaque

jukran sismintir, nomor 162.a tahun 2011
jukran sismintir, nomor 162.a tahun 2011jukran sismintir, nomor 162.a tahun 2011
jukran sismintir, nomor 162.a tahun 2011Dwi Hadi
 
Ogunte intro feb2013
Ogunte intro feb2013Ogunte intro feb2013
Ogunte intro feb2013Ogunte CIC
 
Ironhack presentation
Ironhack presentationIronhack presentation
Ironhack presentationpristella84
 
Argus & Associates Brochure
Argus & Associates BrochureArgus & Associates Brochure
Argus & Associates Brochureargusgos
 
Activist Angels - Leadership Development Programme
Activist Angels - Leadership Development ProgrammeActivist Angels - Leadership Development Programme
Activist Angels - Leadership Development ProgrammeOgunte CIC
 
Talleres halloween 2012
Talleres halloween 2012Talleres halloween 2012
Talleres halloween 2012XXX XXX
 
Focus 1 - construirea unui software functional, utilizabil si intuitiv
Focus 1 - construirea unui software functional, utilizabil si intuitivFocus 1 - construirea unui software functional, utilizabil si intuitiv
Focus 1 - construirea unui software functional, utilizabil si intuitivValentin Bora
 
Week 7 Cc 1
Week 7 Cc 1Week 7 Cc 1
Week 7 Cc 1oiwan
 
Crowdology Consumer Panelv2
Crowdology Consumer Panelv2Crowdology Consumer Panelv2
Crowdology Consumer Panelv2Lisa_Bella
 
Coquitlam burnaby pns.jan2013
Coquitlam burnaby pns.jan2013Coquitlam burnaby pns.jan2013
Coquitlam burnaby pns.jan2013Faye Brownlie
 
Sunshine coast literacy_jan_2015
Sunshine coast literacy_jan_2015Sunshine coast literacy_jan_2015
Sunshine coast literacy_jan_2015Faye Brownlie
 
Pa Bio 10 29 08
Pa Bio 10 29 08Pa Bio 10 29 08
Pa Bio 10 29 08thess1121
 
Visita de plastichín 2015
Visita de plastichín 2015Visita de plastichín 2015
Visita de plastichín 2015XXX XXX
 
Investment decisions for pension funds by intangible value capital
Investment decisions for pension funds by intangible value capitalInvestment decisions for pension funds by intangible value capital
Investment decisions for pension funds by intangible value capitalJAYARAMAN IYER
 

Destaque (20)

jukran sismintir, nomor 162.a tahun 2011
jukran sismintir, nomor 162.a tahun 2011jukran sismintir, nomor 162.a tahun 2011
jukran sismintir, nomor 162.a tahun 2011
 
Ogunte intro feb2013
Ogunte intro feb2013Ogunte intro feb2013
Ogunte intro feb2013
 
Ironhack presentation
Ironhack presentationIronhack presentation
Ironhack presentation
 
Argus & Associates Brochure
Argus & Associates BrochureArgus & Associates Brochure
Argus & Associates Brochure
 
Activist Angels - Leadership Development Programme
Activist Angels - Leadership Development ProgrammeActivist Angels - Leadership Development Programme
Activist Angels - Leadership Development Programme
 
Talleres halloween 2012
Talleres halloween 2012Talleres halloween 2012
Talleres halloween 2012
 
Art renaixement
Art renaixementArt renaixement
Art renaixement
 
Presentation 12.19
Presentation 12.19Presentation 12.19
Presentation 12.19
 
Focus 1 - construirea unui software functional, utilizabil si intuitiv
Focus 1 - construirea unui software functional, utilizabil si intuitivFocus 1 - construirea unui software functional, utilizabil si intuitiv
Focus 1 - construirea unui software functional, utilizabil si intuitiv
 
Mcm ottobre 11
Mcm ottobre 11Mcm ottobre 11
Mcm ottobre 11
 
Week 7 Cc 1
Week 7 Cc 1Week 7 Cc 1
Week 7 Cc 1
 
ikh311-01
ikh311-01ikh311-01
ikh311-01
 
ikh311-02
ikh311-02ikh311-02
ikh311-02
 
Crowdology Consumer Panelv2
Crowdology Consumer Panelv2Crowdology Consumer Panelv2
Crowdology Consumer Panelv2
 
Pei 2010 2014
Pei 2010 2014Pei 2010 2014
Pei 2010 2014
 
Coquitlam burnaby pns.jan2013
Coquitlam burnaby pns.jan2013Coquitlam burnaby pns.jan2013
Coquitlam burnaby pns.jan2013
 
Sunshine coast literacy_jan_2015
Sunshine coast literacy_jan_2015Sunshine coast literacy_jan_2015
Sunshine coast literacy_jan_2015
 
Pa Bio 10 29 08
Pa Bio 10 29 08Pa Bio 10 29 08
Pa Bio 10 29 08
 
Visita de plastichín 2015
Visita de plastichín 2015Visita de plastichín 2015
Visita de plastichín 2015
 
Investment decisions for pension funds by intangible value capital
Investment decisions for pension funds by intangible value capitalInvestment decisions for pension funds by intangible value capital
Investment decisions for pension funds by intangible value capital
 

Semelhante a ikh323-01

10 aspek keamanan_open_source
10 aspek keamanan_open_source10 aspek keamanan_open_source
10 aspek keamanan_open_sourceRusmanto Maryanto
 
Network security
Network securityNetwork security
Network securityeno caknow
 
Network security
Network securityNetwork security
Network securityEno Caknow
 
SIM, Aprilia Wahyu Perdani, Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...
SIM, Aprilia Wahyu Perdani, Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...SIM, Aprilia Wahyu Perdani, Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...
SIM, Aprilia Wahyu Perdani, Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...aprilia wahyu perdani
 
CISSP Security Management Practices 2005.pdf
CISSP Security Management Practices 2005.pdfCISSP Security Management Practices 2005.pdf
CISSP Security Management Practices 2005.pdfAgusThea5
 
Amudi pandapotan saragih,hapzi ali,keamanan sistem informasi forum 6 minggu 1...
Amudi pandapotan saragih,hapzi ali,keamanan sistem informasi forum 6 minggu 1...Amudi pandapotan saragih,hapzi ali,keamanan sistem informasi forum 6 minggu 1...
Amudi pandapotan saragih,hapzi ali,keamanan sistem informasi forum 6 minggu 1...Amudi Pandapotan Saragih
 
Artikel literature review sandy rahman hidayat 43219010020_tb 2
Artikel literature review sandy rahman hidayat 43219010020_tb 2Artikel literature review sandy rahman hidayat 43219010020_tb 2
Artikel literature review sandy rahman hidayat 43219010020_tb 2SandyRahmanHidayat
 
Safety and security computer
Safety and security computerSafety and security computer
Safety and security computerPeniRizkiUtami
 
Snati2011 Penelitian cloud computing - nanang
Snati2011 Penelitian cloud computing - nanangSnati2011 Penelitian cloud computing - nanang
Snati2011 Penelitian cloud computing - nanangNanang Sasongko
 
Information System Security
Information System SecurityInformation System Security
Information System SecurityNovizul Evendi
 
Paper - Hamsah (2019120020) & Nurholis (2019121025).pdf
Paper - Hamsah (2019120020) & Nurholis (2019121025).pdfPaper - Hamsah (2019120020) & Nurholis (2019121025).pdf
Paper - Hamsah (2019120020) & Nurholis (2019121025).pdfHamsah2019
 
Sim, ratih safitri, hapzi ali, keamanan sistem informasi, universitas mercu b...
Sim, ratih safitri, hapzi ali, keamanan sistem informasi, universitas mercu b...Sim, ratih safitri, hapzi ali, keamanan sistem informasi, universitas mercu b...
Sim, ratih safitri, hapzi ali, keamanan sistem informasi, universitas mercu b...Ratih Safitri
 
Sim, ratih safitri, hapzi ali, keamanan sistem informasi, universitas mercu b...
Sim, ratih safitri, hapzi ali, keamanan sistem informasi, universitas mercu b...Sim, ratih safitri, hapzi ali, keamanan sistem informasi, universitas mercu b...
Sim, ratih safitri, hapzi ali, keamanan sistem informasi, universitas mercu b...Ratih Safitri
 

Semelhante a ikh323-01 (20)

ikh323-02
ikh323-02ikh323-02
ikh323-02
 
10 aspek keamanan_open_source
10 aspek keamanan_open_source10 aspek keamanan_open_source
10 aspek keamanan_open_source
 
KEAMANAN KOMPUTER
KEAMANAN KOMPUTERKEAMANAN KOMPUTER
KEAMANAN KOMPUTER
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
SIM, Aprilia Wahyu Perdani, Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...
SIM, Aprilia Wahyu Perdani, Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...SIM, Aprilia Wahyu Perdani, Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...
SIM, Aprilia Wahyu Perdani, Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...
 
Keamanan Komputer
Keamanan KomputerKeamanan Komputer
Keamanan Komputer
 
CISSP Security Management Practices 2005.pdf
CISSP Security Management Practices 2005.pdfCISSP Security Management Practices 2005.pdf
CISSP Security Management Practices 2005.pdf
 
Pertemuan 9 keamanan komputer
Pertemuan 9   keamanan komputerPertemuan 9   keamanan komputer
Pertemuan 9 keamanan komputer
 
Amudi pandapotan saragih,hapzi ali,keamanan sistem informasi forum 6 minggu 1...
Amudi pandapotan saragih,hapzi ali,keamanan sistem informasi forum 6 minggu 1...Amudi pandapotan saragih,hapzi ali,keamanan sistem informasi forum 6 minggu 1...
Amudi pandapotan saragih,hapzi ali,keamanan sistem informasi forum 6 minggu 1...
 
Keamanan si (ugm)
Keamanan si (ugm)Keamanan si (ugm)
Keamanan si (ugm)
 
Keamanan Komputer [Pengantar Keamanan Komputer]
Keamanan Komputer [Pengantar Keamanan Komputer]Keamanan Komputer [Pengantar Keamanan Komputer]
Keamanan Komputer [Pengantar Keamanan Komputer]
 
Artikel literature review sandy rahman hidayat 43219010020_tb 2
Artikel literature review sandy rahman hidayat 43219010020_tb 2Artikel literature review sandy rahman hidayat 43219010020_tb 2
Artikel literature review sandy rahman hidayat 43219010020_tb 2
 
Safety and security computer
Safety and security computerSafety and security computer
Safety and security computer
 
Snati2011 Penelitian cloud computing - nanang
Snati2011 Penelitian cloud computing - nanangSnati2011 Penelitian cloud computing - nanang
Snati2011 Penelitian cloud computing - nanang
 
Information System Security
Information System SecurityInformation System Security
Information System Security
 
Paper - Hamsah (2019120020) & Nurholis (2019121025).pdf
Paper - Hamsah (2019120020) & Nurholis (2019121025).pdfPaper - Hamsah (2019120020) & Nurholis (2019121025).pdf
Paper - Hamsah (2019120020) & Nurholis (2019121025).pdf
 
Sim, ratih safitri, hapzi ali, keamanan sistem informasi, universitas mercu b...
Sim, ratih safitri, hapzi ali, keamanan sistem informasi, universitas mercu b...Sim, ratih safitri, hapzi ali, keamanan sistem informasi, universitas mercu b...
Sim, ratih safitri, hapzi ali, keamanan sistem informasi, universitas mercu b...
 
Sim, ratih safitri, hapzi ali, keamanan sistem informasi, universitas mercu b...
Sim, ratih safitri, hapzi ali, keamanan sistem informasi, universitas mercu b...Sim, ratih safitri, hapzi ali, keamanan sistem informasi, universitas mercu b...
Sim, ratih safitri, hapzi ali, keamanan sistem informasi, universitas mercu b...
 
Membuat desain sistem keamanan jaringa
Membuat desain sistem keamanan jaringaMembuat desain sistem keamanan jaringa
Membuat desain sistem keamanan jaringa
 

Mais de Anung Ariwibowo (20)

isd314-06-association-mining
isd314-06-association-miningisd314-06-association-mining
isd314-06-association-mining
 
ikp213-unifikasi
ikp213-unifikasiikp213-unifikasi
ikp213-unifikasi
 
ikp213-06-horn-clause
ikp213-06-horn-clauseikp213-06-horn-clause
ikp213-06-horn-clause
 
ikp213-01-pendahuluan
ikp213-01-pendahuluanikp213-01-pendahuluan
ikp213-01-pendahuluan
 
ikd312-05-sqlite
ikd312-05-sqliteikd312-05-sqlite
ikd312-05-sqlite
 
ikd312-05-kalkulus-relasional
ikd312-05-kalkulus-relasionalikd312-05-kalkulus-relasional
ikd312-05-kalkulus-relasional
 
ikd312-04-aljabar-relasional
ikd312-04-aljabar-relasionalikd312-04-aljabar-relasional
ikd312-04-aljabar-relasional
 
ikd312-03-design
ikd312-03-designikd312-03-design
ikd312-03-design
 
ikd312-02-three-schema
ikd312-02-three-schemaikd312-02-three-schema
ikd312-02-three-schema
 
ikp213-02-pendahuluan
ikp213-02-pendahuluanikp213-02-pendahuluan
ikp213-02-pendahuluan
 
ikh311-08
ikh311-08ikh311-08
ikh311-08
 
ikh311-07
ikh311-07ikh311-07
ikh311-07
 
ikh311-06
ikh311-06ikh311-06
ikh311-06
 
ikh311-05
ikh311-05ikh311-05
ikh311-05
 
ikp321-svn
ikp321-svnikp321-svn
ikp321-svn
 
ikh311-04
ikh311-04ikh311-04
ikh311-04
 
ikp321-05
ikp321-05ikp321-05
ikp321-05
 
imsakiyah-jakarta-1433-09
imsakiyah-jakarta-1433-09imsakiyah-jakarta-1433-09
imsakiyah-jakarta-1433-09
 
ikh311-03
ikh311-03ikh311-03
ikh311-03
 
ikp321-04
ikp321-04ikp321-04
ikp321-04
 

ikh323-01

  • 1. Pendahuluan 2011-2012-3 Anung Ariwibowo 1
  • 2. 12 Perkuliahan dalam 4 pekan  3 pertemuan setiap pekan  Senin, Rabu, Jumat  08.00 – 10.30 WIB  Kehadiran  Paling lambat 15 menit (Mahasiswa, Dosen)  70% minimum (Mahasiswa) 2011-2012-3 Anung Ariwibowo 2
  • 3. Komponen Penilaian  10% Kuis (9 + Pre-test)  20% Tugas (4)  30% UTS (Open book)  40% UAS (Open book)  5% Bonus (Aktifitas, pengumpulan dini, kreatifitas) 2011-2012-3 Anung Ariwibowo 3
  • 4. Stallings, "Cryptography and Network Security"http://williamstallings.com/Cryptography/  Schneier, "Applied Cryptography" http://www.schneier.com/book-applied.html  Slides tjerdastangkas.blogspot.com/search/label/ikh323 2011-2012-3 Anung Ariwibowo 4
  • 5. Kriptografi dan Sistem Keamanan Komputer  Standar Sistem Keamanan  Enkripsi Kunci Simetrik  Number Theory  Enkripsi Kunci Publik  Autentikasi Pesan dan Fungsi Hash 2011-2012-3 Anung Ariwibowo 5
  • 6. Berapa lama waktu yang dibutuhkan?  Jumlah simbol: 26 + 26 + 10  Panjang password: 10 karakter  Kombinasi: 6210  Kecepatan pengolahan: 1×109 per detik  Waktu: 10 62 9 1  83,929,936.59 s  971.41 hari 110 s 2011-2012-3 Anung Ariwibowo 6
  • 7. Rekam Medikal harus didistribusikan, sambil tetap menjaga privasi pasien  What if layanan Google terhenti karena serangan hacker?  Bagaimana admin Google memonitor kehandalan sistem terhadap peretas? 2011-2012-3 Anung Ariwibowo 7
  • 8. The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications). (NIST Computer Security Handbook, 1995) 2011-2012-3 Anung Ariwibowo 8
  • 9. Data  Informasi yang disimpan dalam sistem komputer tetap utuh  System  Sistem yang menyediakan layanan informasi tetap utuh dan berfungsi dengan baik 2011-2012-3 Anung Ariwibowo 9
  • 10. Sistem komputer yang digunakan tetap tersedia dan bsia diakses kapan pun  Data Confidentiality  Privacy 2011-2012-3 Anung Ariwibowo 10
  • 11. Tidak sesederhana itu  Seni berperang adalah bagaimana kita mempersiapkan diri jika ada serangan (Sun Tzu)  Mengembangkan mekanisme keamanan tidak mudah  Setiap benteng selalu ada titik lemahnya (Sun Tzu)  Perlu mempertimbangkan banya segi dan aspek  Bandingkan dengan pengembangan peranti lunak 2011-2012-3 Anung Ariwibowo 11
  • 12. Ada banyak celah untuk ditutup (admin)  Hanya perlu satu celah untuk disusup (hacker)  User's point of view  Investasi  Backup  Prevensi  Pemantauan dan Administrasi  Sumber daya manusia  Sumber daya waktu 2011-2012-3 Anung Ariwibowo 12
  • 13. Tidak sesederhana itu  Rangkaian kuliah bertopik "Security"  ..and you have to suffer listening to these talks!  seriously kidding,  jokingly serious 2011-2012-3 Anung Ariwibowo 13
  • 14. PD II  Alan Turing, John von Neumann  Mesin Turing  Enigma  Cryptography  Machine Translation  Tindakan pencegahan  Let's make them hard to peek in  Mencegah informasi diketahui pihak lain 2011-2012-3 Anung Ariwibowo 14
  • 15. Komunikasi  Pengirim  Penerima  Pendengar  Pengirim-penerima menggunakan bahasa yang sama  Membuat 'bahasa'  sulit dipahami Pendengar  mudah dikomunikasikan antara Pengirim-Penerima 2011-2012-3 Anung Ariwibowo 15
  • 16. Stallings, "Cryptography and Network Security"http://williamstallings.com/Cryptography/  Schneier, "Applied Cryptography" http://www.schneier.com/book-applied.html  Slides tjerdastangkas.blogspot.com/search/label/ikh323 2011-2012-3 Anung Ariwibowo 16