SlideShare ist ein Scribd-Unternehmen logo
1 von 14
3/10/2012




               Basic Computer

Introduction




               Computer System

       • Hardware
       • Software
       • Brainware




                                        1
3/10/2012




            Hardware

• Input
  – Keyboard
  – Mouse
  – Light pen, etc.
• Process
  – CPU (Motherboard, Hard drive, Memory,
    Processor, etc.)
• Output
  – Monitor
  – Printer
  – LCD Screen etc.




            Software

• Operating System
  – Microsoft Windows
  – Unix
  – Linux
• Application
  – Microsoft Office
  – Anti virus
  – Games
• Database
  – RDBMS
  – SQL Express, MySQL, etc.




                                                   2
3/10/2012




       Tipe Computer

•   Mainframe (Server Farm)
•   Server Computer
•   Personal Computer
•   Laptop / notebook
•   Tablet PC
•   Smartphone




    Jaringan Komputer

Sejumlah komputer dan peralatan
lainnya yang saling terhubung agar
pengguna dapat saling berbagi data
atau sumber daya lainnya.

• LAN (Local Area Network)
• WAN (Area Network)
• Internet




                                            3
3/10/2012




       Internet Terms

•   World Wide Web (www)
•   Web Page
•   Web Site
•   Web Browser
•   Uniform Resource Locator (URL)
•   Hyperlink
•   HyperText Transfer Protocol (http)




    More Internet Terms

•   Cookies
•   Search Engine
•   E- commerce
•   Portal




                                                4
3/10/2012




                Computer Security

 Introduction




What is Computer Security?


                   Keamanan komputer
                   adalah perlindungan
                terhadap sistem komputer
                 dan data yang disimpan
                   atau yang digunakan




                                                  5
3/10/2012




Why is Computer Security
       Important?
• Memungkinkan pengguna untuk
  melaksanakan pekerjaan,
  pendidikan dan penelitian.
• Mendukung proses bisnis yang kritis
• Melindungi informasi yang pribadi
  dan sensitif.




      Pertanyaan?

      Mengapa kita perlu
      mempelajari tentang
     Keamanan Komputer?

  Karena Keamanan Komputer
   bukanlah hanya masalah IT
             saja!




                                               6
3/10/2012




Standard keamanan yang baik

  Aturan 90/10:
  • 10% dari penjaga keamanan adalah
    bersifat teknis
  • 90% dari penjaga keamanan
    tergantung dari pengguna.




       Apa artinya ?

      Siapapun yang menggunakan
       komputer harus memahami
   bagaimana mereka harus menjaga
   komputer dan data yang ada agar
    tetap selalu dalam kondisi aman.

  Keamanan IT merupakan tanggung
       jawab semua orang.




                                              7
3/10/2012




Ancaman Keamanan Dunia Maya

   • Gunakan password yang tidak mudah
     ditebak orang lain.
   • Pastikan Sistem Operasi komputer yang
     ada terlindungi dengan “patches” dan
     “updates”.
   • Pastikan komputer yang digunakan
     dilindungi dengan anti virus dan anti
     spyware yang “update”
   • Jangan meng”click” koneksi yang tidak
     dikenal atau “attachment” yang tidak
     diketahui sumbernya.




Ancaman Keamanan Dunia Maya

   • Jangan mengunduh file atau program
     yang tidak dikenal ke komputer anda.

   • Ingat bahwa informasi dan password yang
     dikirimkan tanpa di enkripsi dengan mudah
     dapat diketahui oleh hackers.
     – Gunakan halaman web dengan https
     – Hindari pengiriman email atai instant messanger
       jika peduli dengan “privacy”




                                                                8
3/10/2012




    Security Objectives

  • Pelajari praktek keamanan komputer
    yang baik
  • Jadikan hal ini menjadi hal yang rutin
    setiap harinya. Anjurkan orang lain
    untuk melakukan hal yang sama.
  • Laporkan sesuatu yang tidak biasa
    kepada yg bertanggung jawab bila
    kita mencurigai adanya pelanggaran
    keamanan.




Aturan bagi pelanggar Keamanan

  • Resiko keamanan terhadap integritas
    informasi yang pribadi dan rahasia.
  • Kehilangan informasi bisnis yang
    berharga.
  • Kehilangan kepercayaan publik,
    memalukan, publikasi yang buruk,
    peliputan media dan laporan berita.
  • Biaya yang tinggi bila terjadi
    pelanggaran informasi pribadi,keuangan
    dan kesehatan.
  • Peraturan indisipliner diberlakukan bagi
    karyawan yg tidak mematuhi aturan.




                                                      9
3/10/2012




               Internet Security

Introduction




               Internet Privacy

        Privacy on the Internet is a growing
         concern, especially as more and
         more people are using it for their
             professional and personal
             business, socializing, and
                   entertainment.




                                                     10
3/10/2012




Social Networking and Blogs
   • Do not reveal personal details or confidential info
     online. Assume that anything you post to these
     websites is public and could potentially be used
     against you.
       – A good rule of thumb is to only post information you
         would be willing to write on a banner that is displayed
         in a public place.
       – Seemingly innocent information about your interests,
         family, or history could be used by hackers for identity
         theft, or by stalkers or social engineers.
   • Also keep in mind that once you post something
     online, it can be very difficult to take it back. Even
     if you delete the information, copies can still exist on
     other computers, web sites, or in search engines.




 Internet Privacy Cautions
   •   Always remember: The Internet is not private.
       – Don’t give out personal or sensitive information to anyone
         you don’t know or who doesn’t have a legitimate need for it.
       – Don’t provide personal, sensitive or confidential information to
         Internet sites, surveys or forms unless you are using a
         trusted, secure web page.
           • Get to these web sites by typing the web address in directly. Don’t
             click on links in unsolicited e-mails or cut and paste links from these
             e-mails.
           • Remember that links and web sites that look legitimate can really be
             bogus sites designed to steal information
       – At a minimum, look for “https” in the URL and the little
         padlock that appears in the corner on most browser windows
         to indicate that there is a secure connection.
   •   Be certain you don’t put sensitive information in
       locations that are accessible from the Internet.
       – Even unlinked web pages can be found by search engines.




                                                                                             11
3/10/2012




    Internet Security

The Internet can be a hazardous
place:

  Without up to date system and
security software, any computer is
   vulnerable to takeover and
            corruption.




    Internet Security


• Thousands of attacks or try to attack
  per minute bombard our office
  network.

• An unprotected computer can
  become infected or compromised
  within a few seconds after it is
  connected to the network.




                                                12
3/10/2012




Internet Security Cautions
 • Just opening a malicious web page can infect a
   poorly protected computer. Make sure you know
   where you’re going before clicking on a link.
    – Use only known, trusted, secure websites when you
      enter sensitive or personal information online
    – Instead of clicking on a link, look up the company (e.g.
      Google it) and go to their website independently.
 • Beware of scams, even on well-known sites such as
   eBay and craigslist.
 • To help avoid viruses, don’t use Internet Explorer
   unless you have a specific business need to do so.
   More secure alternatives may include Firefox and
   Safari, or ask your computing coordinator.




    Instant Messaging

 • This area of the Internet is not private.
 • Do not reveal personal details or
   sensitive information via IM or on
   social networking sites.
 • Use separate passwords for IM, since
   it is generally insecure.
 • Don’t open files sent to you via IM or
   P2P programs. many anti-virus
   programs cannot detect viruses in
   IM/P2P/chat files so viruses and other
   malicious code can be spread this way.




                                                                       13
3/10/2012




End of Slides



Terima Kasih
franklinsondakh@gmail.com
  Mobile: 0812 -8475-0036
     Pin BB: 269D06E3




                                  14

Weitere ähnliche Inhalte

Was ist angesagt?

IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlinexlilmermaidx
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)Vinayak Hegde
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Deepak Khari
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTsIT Tech
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)Apurv Singh Gautam
 
I shieldplus
I shieldplusI shieldplus
I shieldplusamlizan
 
October 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_monthOctober 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_monthEvelyn Berrier
 

Was ist angesagt? (20)

IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTs
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
 
I shieldplus
I shieldplusI shieldplus
I shieldplus
 
October 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_monthOctober 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_month
 

Andere mochten auch

Portafolio 2012 laúd s.a.s.
Portafolio 2012 laúd s.a.s.Portafolio 2012 laúd s.a.s.
Portafolio 2012 laúd s.a.s.Laud Eventos
 
Carta de la julieta a la colometa ( grup viquipuig)
Carta de la julieta a la colometa ( grup viquipuig)Carta de la julieta a la colometa ( grup viquipuig)
Carta de la julieta a la colometa ( grup viquipuig)respine2
 
新浪云计算公开课第一期:Let’s run @ sae(丛磊)
新浪云计算公开课第一期:Let’s run @ sae(丛磊)新浪云计算公开课第一期:Let’s run @ sae(丛磊)
新浪云计算公开课第一期:Let’s run @ sae(丛磊)锐 张
 

Andere mochten auch (9)

Catalogo burest
Catalogo burestCatalogo burest
Catalogo burest
 
2012 marnixring
2012   marnixring2012   marnixring
2012 marnixring
 
Tecnologia educ.1
Tecnologia educ.1Tecnologia educ.1
Tecnologia educ.1
 
Portafolio 2012 laúd s.a.s.
Portafolio 2012 laúd s.a.s.Portafolio 2012 laúd s.a.s.
Portafolio 2012 laúd s.a.s.
 
Pikondoa
PikondoaPikondoa
Pikondoa
 
Carta de la julieta a la colometa ( grup viquipuig)
Carta de la julieta a la colometa ( grup viquipuig)Carta de la julieta a la colometa ( grup viquipuig)
Carta de la julieta a la colometa ( grup viquipuig)
 
Weblesson
WeblessonWeblesson
Weblesson
 
新浪云计算公开课第一期:Let’s run @ sae(丛磊)
新浪云计算公开课第一期:Let’s run @ sae(丛磊)新浪云计算公开课第一期:Let’s run @ sae(丛磊)
新浪云计算公开课第一期:Let’s run @ sae(丛磊)
 
Apresentacao Amigos da Escola
Apresentacao Amigos da EscolaApresentacao Amigos da Escola
Apresentacao Amigos da Escola
 

Ähnlich wie 001 ho basic computer

Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyersdarrentthurston
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPTpriya785691
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16TechSoup
 

Ähnlich wie 001 ho basic computer (20)

Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 
Online reputation
Online reputationOnline reputation
Online reputation
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyers
 
Cyber security
Cyber security Cyber security
Cyber security
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
CYBER SAFETY PPT
CYBER SAFETY PPTCYBER SAFETY PPT
CYBER SAFETY PPT
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Secure End User
Secure End UserSecure End User
Secure End User
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
 

Mehr von Franklin Sondakh

02 Internal Quality Audit Training
02 Internal Quality Audit Training02 Internal Quality Audit Training
02 Internal Quality Audit TrainingFranklin Sondakh
 
004 ho introduction to crm
004 ho introduction to crm004 ho introduction to crm
004 ho introduction to crmFranklin Sondakh
 
003 ho computer basic troubleshooting
003 ho computer basic troubleshooting003 ho computer basic troubleshooting
003 ho computer basic troubleshootingFranklin Sondakh
 
002 ho email etiquette and security
002 ho email etiquette and security002 ho email etiquette and security
002 ho email etiquette and securityFranklin Sondakh
 

Mehr von Franklin Sondakh (6)

01 iso 9001 2008
01 iso 9001 200801 iso 9001 2008
01 iso 9001 2008
 
02 Internal Quality Audit Training
02 Internal Quality Audit Training02 Internal Quality Audit Training
02 Internal Quality Audit Training
 
004 ho introduction to crm
004 ho introduction to crm004 ho introduction to crm
004 ho introduction to crm
 
003 ho computer basic troubleshooting
003 ho computer basic troubleshooting003 ho computer basic troubleshooting
003 ho computer basic troubleshooting
 
002 ho email etiquette and security
002 ho email etiquette and security002 ho email etiquette and security
002 ho email etiquette and security
 
000 training opening
000 training opening000 training opening
000 training opening
 

Kürzlich hochgeladen

Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Phases of negotiation .pptx
 Phases of negotiation .pptx Phases of negotiation .pptx
Phases of negotiation .pptxnandhinijagan9867
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 

Kürzlich hochgeladen (20)

Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Phases of negotiation .pptx
 Phases of negotiation .pptx Phases of negotiation .pptx
Phases of negotiation .pptx
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 

001 ho basic computer

  • 1. 3/10/2012 Basic Computer Introduction Computer System • Hardware • Software • Brainware 1
  • 2. 3/10/2012 Hardware • Input – Keyboard – Mouse – Light pen, etc. • Process – CPU (Motherboard, Hard drive, Memory, Processor, etc.) • Output – Monitor – Printer – LCD Screen etc. Software • Operating System – Microsoft Windows – Unix – Linux • Application – Microsoft Office – Anti virus – Games • Database – RDBMS – SQL Express, MySQL, etc. 2
  • 3. 3/10/2012 Tipe Computer • Mainframe (Server Farm) • Server Computer • Personal Computer • Laptop / notebook • Tablet PC • Smartphone Jaringan Komputer Sejumlah komputer dan peralatan lainnya yang saling terhubung agar pengguna dapat saling berbagi data atau sumber daya lainnya. • LAN (Local Area Network) • WAN (Area Network) • Internet 3
  • 4. 3/10/2012 Internet Terms • World Wide Web (www) • Web Page • Web Site • Web Browser • Uniform Resource Locator (URL) • Hyperlink • HyperText Transfer Protocol (http) More Internet Terms • Cookies • Search Engine • E- commerce • Portal 4
  • 5. 3/10/2012 Computer Security Introduction What is Computer Security? Keamanan komputer adalah perlindungan terhadap sistem komputer dan data yang disimpan atau yang digunakan 5
  • 6. 3/10/2012 Why is Computer Security Important? • Memungkinkan pengguna untuk melaksanakan pekerjaan, pendidikan dan penelitian. • Mendukung proses bisnis yang kritis • Melindungi informasi yang pribadi dan sensitif. Pertanyaan? Mengapa kita perlu mempelajari tentang Keamanan Komputer? Karena Keamanan Komputer bukanlah hanya masalah IT saja! 6
  • 7. 3/10/2012 Standard keamanan yang baik Aturan 90/10: • 10% dari penjaga keamanan adalah bersifat teknis • 90% dari penjaga keamanan tergantung dari pengguna. Apa artinya ? Siapapun yang menggunakan komputer harus memahami bagaimana mereka harus menjaga komputer dan data yang ada agar tetap selalu dalam kondisi aman. Keamanan IT merupakan tanggung jawab semua orang. 7
  • 8. 3/10/2012 Ancaman Keamanan Dunia Maya • Gunakan password yang tidak mudah ditebak orang lain. • Pastikan Sistem Operasi komputer yang ada terlindungi dengan “patches” dan “updates”. • Pastikan komputer yang digunakan dilindungi dengan anti virus dan anti spyware yang “update” • Jangan meng”click” koneksi yang tidak dikenal atau “attachment” yang tidak diketahui sumbernya. Ancaman Keamanan Dunia Maya • Jangan mengunduh file atau program yang tidak dikenal ke komputer anda. • Ingat bahwa informasi dan password yang dikirimkan tanpa di enkripsi dengan mudah dapat diketahui oleh hackers. – Gunakan halaman web dengan https – Hindari pengiriman email atai instant messanger jika peduli dengan “privacy” 8
  • 9. 3/10/2012 Security Objectives • Pelajari praktek keamanan komputer yang baik • Jadikan hal ini menjadi hal yang rutin setiap harinya. Anjurkan orang lain untuk melakukan hal yang sama. • Laporkan sesuatu yang tidak biasa kepada yg bertanggung jawab bila kita mencurigai adanya pelanggaran keamanan. Aturan bagi pelanggar Keamanan • Resiko keamanan terhadap integritas informasi yang pribadi dan rahasia. • Kehilangan informasi bisnis yang berharga. • Kehilangan kepercayaan publik, memalukan, publikasi yang buruk, peliputan media dan laporan berita. • Biaya yang tinggi bila terjadi pelanggaran informasi pribadi,keuangan dan kesehatan. • Peraturan indisipliner diberlakukan bagi karyawan yg tidak mematuhi aturan. 9
  • 10. 3/10/2012 Internet Security Introduction Internet Privacy Privacy on the Internet is a growing concern, especially as more and more people are using it for their professional and personal business, socializing, and entertainment. 10
  • 11. 3/10/2012 Social Networking and Blogs • Do not reveal personal details or confidential info online. Assume that anything you post to these websites is public and could potentially be used against you. – A good rule of thumb is to only post information you would be willing to write on a banner that is displayed in a public place. – Seemingly innocent information about your interests, family, or history could be used by hackers for identity theft, or by stalkers or social engineers. • Also keep in mind that once you post something online, it can be very difficult to take it back. Even if you delete the information, copies can still exist on other computers, web sites, or in search engines. Internet Privacy Cautions • Always remember: The Internet is not private. – Don’t give out personal or sensitive information to anyone you don’t know or who doesn’t have a legitimate need for it. – Don’t provide personal, sensitive or confidential information to Internet sites, surveys or forms unless you are using a trusted, secure web page. • Get to these web sites by typing the web address in directly. Don’t click on links in unsolicited e-mails or cut and paste links from these e-mails. • Remember that links and web sites that look legitimate can really be bogus sites designed to steal information – At a minimum, look for “https” in the URL and the little padlock that appears in the corner on most browser windows to indicate that there is a secure connection. • Be certain you don’t put sensitive information in locations that are accessible from the Internet. – Even unlinked web pages can be found by search engines. 11
  • 12. 3/10/2012 Internet Security The Internet can be a hazardous place: Without up to date system and security software, any computer is vulnerable to takeover and corruption. Internet Security • Thousands of attacks or try to attack per minute bombard our office network. • An unprotected computer can become infected or compromised within a few seconds after it is connected to the network. 12
  • 13. 3/10/2012 Internet Security Cautions • Just opening a malicious web page can infect a poorly protected computer. Make sure you know where you’re going before clicking on a link. – Use only known, trusted, secure websites when you enter sensitive or personal information online – Instead of clicking on a link, look up the company (e.g. Google it) and go to their website independently. • Beware of scams, even on well-known sites such as eBay and craigslist. • To help avoid viruses, don’t use Internet Explorer unless you have a specific business need to do so. More secure alternatives may include Firefox and Safari, or ask your computing coordinator. Instant Messaging • This area of the Internet is not private. • Do not reveal personal details or sensitive information via IM or on social networking sites. • Use separate passwords for IM, since it is generally insecure. • Don’t open files sent to you via IM or P2P programs. many anti-virus programs cannot detect viruses in IM/P2P/chat files so viruses and other malicious code can be spread this way. 13
  • 14. 3/10/2012 End of Slides Terima Kasih franklinsondakh@gmail.com Mobile: 0812 -8475-0036 Pin BB: 269D06E3 14