SlideShare a Scribd company logo
1 of 13
KEAMANAN
KOMPUTER

KAJK 2011
Pendahuluan
• Informasi menentukan hampir setiap elemen dalam
  kehidupan
• Dunia modern melibatkan pengumpulan, penukaran
  pembuatan dan pengaksesan informasi
  (information-based society)
• Dimungkinkan dengan adanya teknologi komputer
  dan telekomunikasi
• Masalah keamanan merupakan aspek terpenting
  pada sebuah sistem informasi
Pendahuluan.....
• Keamanan kurang mendapatkan
  perhatian dari perancang dan
  pengelola sistem
• Apabila menggangu performa
  sistem, keamanan tidak
  dipedulikan/ditiadakan
Aspek Keamanan
• Authentication
    – any process by which you verify that
      someone is who they claim they are
    – authentication is commonly done
      through the use of logon passwords
• Integrity
    – is the assurance that information can
      only be accessed or modified by
      those authorized to do so
•
Aspek keamanan...
• Nonrepudiation
  – assurance that someone cannot deny something
  – a digital signature is used not only to ensure that a
    message or document has been electronically signed by
    the person that purported to sign the document, but
    also, since a digital signature can only be created by
    one person, to ensure that a person cannot later deny
    that they furnished the signature.
• Authority
  – finding out if the person, once identified, is permitted to
    have the resource
  – In multi-user computer systems, a system administrator
    defines for the system which users are allowed access
    to the system and what privileges of use(such as access
    to which file directories, hours of access, amount of
    allocated storage space)
Aspek keamanan...
• Confidentiality
  – set of rules or a promise that limits access or
    places restrictions on certain types of
    information.
• Privacy
  –   What personal information can be shared
   with whom
  – Whether messages can be exchanged
   without anyone else seeing them
  – Whether and how one can send messages
   anonymously
• Availability
  – Present and ready to use, accessible
Aspek keamanan...
  – Nines terms




• Acces control
  – a system which enables an authority to
    control access to areas and resources in
    a given physical facility or computer-
    based information system
Aspek Ancaman
Keamanan
• Interruption
  – Data dirusak dan dihapus
  – Ancaman availability
• Interception
  – Informasi disadap oleh orang yang
    tidak berhak
  – Ancaman terhadap privacy
Aspek Ancaman
             Keamanan.......
• Modification
  – Mengubah informasi
  – Ancaman terhadap integrity
• Fabrication
  – Meniru/memalsukan informasi
  – Ancaman terhadap integrity
Metodologi Keamanan
Pendekatan
Pendeteksian Serangan
• Anomaly detection
  – Prilaku tak lazim
  – Serangan berbeda dengan aktifitas
    normal
• Misuse detection
  – Analisa terhadap aktivitas sistem
  – Mencari even yang cocok dengan
    pola serangan
  – Pola prilaku serangan disebut
    signatures
Pendeteksian Serangan
• Network monitoring
  – Menggunakan protokol SNMP
  – Contoh program: snmp collector,
    etherboy
• Intrusion detection system
  – Pengenalan penyusup
  – Log aktivitas dibandingkan dengan pola
    serangan
  – Warning ke admin
  – Tidak mencegah hanya mencatat
    serangan
Pencegahan Serangan
• Desain sistem
• Aplikasi yang dipakai
• Manajemen
  – SOP
  – Security policy
     •   Penjelasan
     •   Tanggung jawab pihak terlibat
     •   Bahasa
     •   Otoritas yang menetapkan
     •   Perkecualian
     •   Penilaian ulang

More Related Content

What's hot

What's hot (20)

Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network security
Network securityNetwork security
Network security
 
Network Security
Network Security Network Security
Network Security
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Security threats
Security threatsSecurity threats
Security threats
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
 

Viewers also liked (20)

2. security system attack
2. security system attack2. security system attack
2. security system attack
 
Sistem keamanan komputer
Sistem keamanan komputerSistem keamanan komputer
Sistem keamanan komputer
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Sistem keamanan komputer#1
Sistem keamanan komputer#1Sistem keamanan komputer#1
Sistem keamanan komputer#1
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Tkj kk h sistem keamanan jaringan komputer_sukimin suhlian
Tkj kk h sistem keamanan jaringan komputer_sukimin suhlianTkj kk h sistem keamanan jaringan komputer_sukimin suhlian
Tkj kk h sistem keamanan jaringan komputer_sukimin suhlian
 
Chapter 1 pendahuluan
Chapter 1 pendahuluanChapter 1 pendahuluan
Chapter 1 pendahuluan
 
Cloud Storage System
Cloud Storage SystemCloud Storage System
Cloud Storage System
 
3 hardware
3 hardware3 hardware
3 hardware
 
Perangkat Output Komputer
Perangkat Output KomputerPerangkat Output Komputer
Perangkat Output Komputer
 
Perangkat proses dan pendingin
Perangkat proses dan pendinginPerangkat proses dan pendingin
Perangkat proses dan pendingin
 
Tools photoshop
Tools photoshopTools photoshop
Tools photoshop
 
Perangkat Input Komputer
Perangkat Input KomputerPerangkat Input Komputer
Perangkat Input Komputer
 
PERSAHABATAN
PERSAHABATANPERSAHABATAN
PERSAHABATAN
 
Katak Kecil, Hiduplah
Katak Kecil, HiduplahKatak Kecil, Hiduplah
Katak Kecil, Hiduplah
 
03 sistem bus dan port rear panel
03 sistem bus dan port rear panel03 sistem bus dan port rear panel
03 sistem bus dan port rear panel
 
Proposal Tahu Bunting by Afni Faujiah
Proposal Tahu Bunting by Afni FaujiahProposal Tahu Bunting by Afni Faujiah
Proposal Tahu Bunting by Afni Faujiah
 
Sistem Keamanan Komputer.PDF
Sistem Keamanan Komputer.PDFSistem Keamanan Komputer.PDF
Sistem Keamanan Komputer.PDF
 
Media penyimpan 3
Media penyimpan    3Media penyimpan    3
Media penyimpan 3
 
GANGGUAN SISTEM REPRODUKTIF WANITA - KARSINOMA SERVIKS dan VAGINA
GANGGUAN SISTEM REPRODUKTIF WANITA -  KARSINOMA SERVIKS dan VAGINAGANGGUAN SISTEM REPRODUKTIF WANITA -  KARSINOMA SERVIKS dan VAGINA
GANGGUAN SISTEM REPRODUKTIF WANITA - KARSINOMA SERVIKS dan VAGINA
 

Similar to keamanan komputer / computer security

basic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptbasic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptPawachMetharattanara
 
informations_security_presentations.pptx
informations_security_presentations.pptxinformations_security_presentations.pptx
informations_security_presentations.pptxFAKHARZAMANPROUD
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentalsManesh T
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im finalcavapyta
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im finalcavapyta
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer SystemManesh T
 
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...NISHASOMSCS113
 
Information security introduction
Information security introductionInformation security introduction
Information security introductionG Prachi
 
security introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptxsecurity introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptxnagwaAboElenein
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdfKIYALIBAN1
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Securityvishnukp34
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.pptmiki304759
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityAparnaSunil24
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVEric Vanderburg
 

Similar to keamanan komputer / computer security (20)

basic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.pptbasic-security-concepts-what-is-security48.ppt
basic-security-concepts-what-is-security48.ppt
 
informations_security_presentations.pptx
informations_security_presentations.pptxinformations_security_presentations.pptx
informations_security_presentations.pptx
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
dokumen.tips_1-cryptography-and-network-security-third-edition-by-william-sta...
 
Information security introduction
Information security introductionInformation security introduction
Information security introduction
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Ch01
Ch01Ch01
Ch01
 
security introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptxsecurity introduction and overview lecture1 .pptx
security introduction and overview lecture1 .pptx
 
CyberSecurity101.pdf
CyberSecurity101.pdfCyberSecurity101.pdf
CyberSecurity101.pdf
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
Intruders
IntrudersIntruders
Intruders
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.ppt
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
Ch1 cse
Ch1 cseCh1 cse
Ch1 cse
 

More from Hendra Fillan

Asp security dan master page asp.net
Asp security dan master page asp.netAsp security dan master page asp.net
Asp security dan master page asp.netHendra Fillan
 
kejahatan komputer / cybercrime
kejahatan komputer / cybercrimekejahatan komputer / cybercrime
kejahatan komputer / cybercrimeHendra Fillan
 
Enkripsi data pada Keamanan Administrasi dan jaringan komputer
Enkripsi data pada Keamanan Administrasi dan jaringan komputerEnkripsi data pada Keamanan Administrasi dan jaringan komputer
Enkripsi data pada Keamanan Administrasi dan jaringan komputerHendra Fillan
 
Aplikasi objek periwisata
Aplikasi objek periwisataAplikasi objek periwisata
Aplikasi objek periwisataHendra Fillan
 
Aplikasi jual beli online
Aplikasi jual beli onlineAplikasi jual beli online
Aplikasi jual beli onlineHendra Fillan
 

More from Hendra Fillan (6)

Asp security dan master page asp.net
Asp security dan master page asp.netAsp security dan master page asp.net
Asp security dan master page asp.net
 
kejahatan komputer / cybercrime
kejahatan komputer / cybercrimekejahatan komputer / cybercrime
kejahatan komputer / cybercrime
 
Transaction
TransactionTransaction
Transaction
 
Enkripsi data pada Keamanan Administrasi dan jaringan komputer
Enkripsi data pada Keamanan Administrasi dan jaringan komputerEnkripsi data pada Keamanan Administrasi dan jaringan komputer
Enkripsi data pada Keamanan Administrasi dan jaringan komputer
 
Aplikasi objek periwisata
Aplikasi objek periwisataAplikasi objek periwisata
Aplikasi objek periwisata
 
Aplikasi jual beli online
Aplikasi jual beli onlineAplikasi jual beli online
Aplikasi jual beli online
 

keamanan komputer / computer security

  • 2. Pendahuluan • Informasi menentukan hampir setiap elemen dalam kehidupan • Dunia modern melibatkan pengumpulan, penukaran pembuatan dan pengaksesan informasi (information-based society) • Dimungkinkan dengan adanya teknologi komputer dan telekomunikasi • Masalah keamanan merupakan aspek terpenting pada sebuah sistem informasi
  • 3. Pendahuluan..... • Keamanan kurang mendapatkan perhatian dari perancang dan pengelola sistem • Apabila menggangu performa sistem, keamanan tidak dipedulikan/ditiadakan
  • 4. Aspek Keamanan • Authentication – any process by which you verify that someone is who they claim they are – authentication is commonly done through the use of logon passwords • Integrity – is the assurance that information can only be accessed or modified by those authorized to do so •
  • 5. Aspek keamanan... • Nonrepudiation – assurance that someone cannot deny something – a digital signature is used not only to ensure that a message or document has been electronically signed by the person that purported to sign the document, but also, since a digital signature can only be created by one person, to ensure that a person cannot later deny that they furnished the signature. • Authority – finding out if the person, once identified, is permitted to have the resource – In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use(such as access to which file directories, hours of access, amount of allocated storage space)
  • 6. Aspek keamanan... • Confidentiality – set of rules or a promise that limits access or places restrictions on certain types of information. • Privacy – What personal information can be shared with whom – Whether messages can be exchanged without anyone else seeing them – Whether and how one can send messages anonymously • Availability – Present and ready to use, accessible
  • 7. Aspek keamanan... – Nines terms • Acces control – a system which enables an authority to control access to areas and resources in a given physical facility or computer- based information system
  • 8. Aspek Ancaman Keamanan • Interruption – Data dirusak dan dihapus – Ancaman availability • Interception – Informasi disadap oleh orang yang tidak berhak – Ancaman terhadap privacy
  • 9. Aspek Ancaman Keamanan....... • Modification – Mengubah informasi – Ancaman terhadap integrity • Fabrication – Meniru/memalsukan informasi – Ancaman terhadap integrity
  • 11. Pendekatan Pendeteksian Serangan • Anomaly detection – Prilaku tak lazim – Serangan berbeda dengan aktifitas normal • Misuse detection – Analisa terhadap aktivitas sistem – Mencari even yang cocok dengan pola serangan – Pola prilaku serangan disebut signatures
  • 12. Pendeteksian Serangan • Network monitoring – Menggunakan protokol SNMP – Contoh program: snmp collector, etherboy • Intrusion detection system – Pengenalan penyusup – Log aktivitas dibandingkan dengan pola serangan – Warning ke admin – Tidak mencegah hanya mencatat serangan
  • 13. Pencegahan Serangan • Desain sistem • Aplikasi yang dipakai • Manajemen – SOP – Security policy • Penjelasan • Tanggung jawab pihak terlibat • Bahasa • Otoritas yang menetapkan • Perkecualian • Penilaian ulang