2. 3/10/2012
Hardware
• Input
– Keyboard
– Mouse
– Light pen, etc.
• Process
– CPU (Motherboard, Hard drive, Memory,
Processor, etc.)
• Output
– Monitor
– Printer
– LCD Screen etc.
Software
• Operating System
– Microsoft Windows
– Unix
– Linux
• Application
– Microsoft Office
– Anti virus
– Games
• Database
– RDBMS
– SQL Express, MySQL, etc.
2
3. 3/10/2012
Tipe Computer
• Mainframe (Server Farm)
• Server Computer
• Personal Computer
• Laptop / notebook
• Tablet PC
• Smartphone
Jaringan Komputer
Sejumlah komputer dan peralatan
lainnya yang saling terhubung agar
pengguna dapat saling berbagi data
atau sumber daya lainnya.
• LAN (Local Area Network)
• WAN (Area Network)
• Internet
3
4. 3/10/2012
Internet Terms
• World Wide Web (www)
• Web Page
• Web Site
• Web Browser
• Uniform Resource Locator (URL)
• Hyperlink
• HyperText Transfer Protocol (http)
More Internet Terms
• Cookies
• Search Engine
• E- commerce
• Portal
4
5. 3/10/2012
Computer Security
Introduction
What is Computer Security?
Keamanan komputer
adalah perlindungan
terhadap sistem komputer
dan data yang disimpan
atau yang digunakan
5
6. 3/10/2012
Why is Computer Security
Important?
• Memungkinkan pengguna untuk
melaksanakan pekerjaan,
pendidikan dan penelitian.
• Mendukung proses bisnis yang kritis
• Melindungi informasi yang pribadi
dan sensitif.
Pertanyaan?
Mengapa kita perlu
mempelajari tentang
Keamanan Komputer?
Karena Keamanan Komputer
bukanlah hanya masalah IT
saja!
6
7. 3/10/2012
Standard keamanan yang baik
Aturan 90/10:
• 10% dari penjaga keamanan adalah
bersifat teknis
• 90% dari penjaga keamanan
tergantung dari pengguna.
Apa artinya ?
Siapapun yang menggunakan
komputer harus memahami
bagaimana mereka harus menjaga
komputer dan data yang ada agar
tetap selalu dalam kondisi aman.
Keamanan IT merupakan tanggung
jawab semua orang.
7
8. 3/10/2012
Ancaman Keamanan Dunia Maya
• Gunakan password yang tidak mudah
ditebak orang lain.
• Pastikan Sistem Operasi komputer yang
ada terlindungi dengan “patches” dan
“updates”.
• Pastikan komputer yang digunakan
dilindungi dengan anti virus dan anti
spyware yang “update”
• Jangan meng”click” koneksi yang tidak
dikenal atau “attachment” yang tidak
diketahui sumbernya.
Ancaman Keamanan Dunia Maya
• Jangan mengunduh file atau program
yang tidak dikenal ke komputer anda.
• Ingat bahwa informasi dan password yang
dikirimkan tanpa di enkripsi dengan mudah
dapat diketahui oleh hackers.
– Gunakan halaman web dengan https
– Hindari pengiriman email atai instant messanger
jika peduli dengan “privacy”
8
9. 3/10/2012
Security Objectives
• Pelajari praktek keamanan komputer
yang baik
• Jadikan hal ini menjadi hal yang rutin
setiap harinya. Anjurkan orang lain
untuk melakukan hal yang sama.
• Laporkan sesuatu yang tidak biasa
kepada yg bertanggung jawab bila
kita mencurigai adanya pelanggaran
keamanan.
Aturan bagi pelanggar Keamanan
• Resiko keamanan terhadap integritas
informasi yang pribadi dan rahasia.
• Kehilangan informasi bisnis yang
berharga.
• Kehilangan kepercayaan publik,
memalukan, publikasi yang buruk,
peliputan media dan laporan berita.
• Biaya yang tinggi bila terjadi
pelanggaran informasi pribadi,keuangan
dan kesehatan.
• Peraturan indisipliner diberlakukan bagi
karyawan yg tidak mematuhi aturan.
9
10. 3/10/2012
Internet Security
Introduction
Internet Privacy
Privacy on the Internet is a growing
concern, especially as more and
more people are using it for their
professional and personal
business, socializing, and
entertainment.
10
11. 3/10/2012
Social Networking and Blogs
• Do not reveal personal details or confidential info
online. Assume that anything you post to these
websites is public and could potentially be used
against you.
– A good rule of thumb is to only post information you
would be willing to write on a banner that is displayed
in a public place.
– Seemingly innocent information about your interests,
family, or history could be used by hackers for identity
theft, or by stalkers or social engineers.
• Also keep in mind that once you post something
online, it can be very difficult to take it back. Even
if you delete the information, copies can still exist on
other computers, web sites, or in search engines.
Internet Privacy Cautions
• Always remember: The Internet is not private.
– Don’t give out personal or sensitive information to anyone
you don’t know or who doesn’t have a legitimate need for it.
– Don’t provide personal, sensitive or confidential information to
Internet sites, surveys or forms unless you are using a
trusted, secure web page.
• Get to these web sites by typing the web address in directly. Don’t
click on links in unsolicited e-mails or cut and paste links from these
e-mails.
• Remember that links and web sites that look legitimate can really be
bogus sites designed to steal information
– At a minimum, look for “https” in the URL and the little
padlock that appears in the corner on most browser windows
to indicate that there is a secure connection.
• Be certain you don’t put sensitive information in
locations that are accessible from the Internet.
– Even unlinked web pages can be found by search engines.
11
12. 3/10/2012
Internet Security
The Internet can be a hazardous
place:
Without up to date system and
security software, any computer is
vulnerable to takeover and
corruption.
Internet Security
• Thousands of attacks or try to attack
per minute bombard our office
network.
• An unprotected computer can
become infected or compromised
within a few seconds after it is
connected to the network.
12
13. 3/10/2012
Internet Security Cautions
• Just opening a malicious web page can infect a
poorly protected computer. Make sure you know
where you’re going before clicking on a link.
– Use only known, trusted, secure websites when you
enter sensitive or personal information online
– Instead of clicking on a link, look up the company (e.g.
Google it) and go to their website independently.
• Beware of scams, even on well-known sites such as
eBay and craigslist.
• To help avoid viruses, don’t use Internet Explorer
unless you have a specific business need to do so.
More secure alternatives may include Firefox and
Safari, or ask your computing coordinator.
Instant Messaging
• This area of the Internet is not private.
• Do not reveal personal details or
sensitive information via IM or on
social networking sites.
• Use separate passwords for IM, since
it is generally insecure.
• Don’t open files sent to you via IM or
P2P programs. many anti-virus
programs cannot detect viruses in
IM/P2P/chat files so viruses and other
malicious code can be spread this way.
13