12015/10/20 Muhammad Salman University of Indonesia.

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

Chapter 7: Physical & Environmental Security
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Chapter 9: Privacy, Crime, and Security
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
1 Pertemuan 23 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Lecture 11 Reliability and Security in IT infrastructure.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore
Protecting ICT Systems
Securing Information Systems
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
1.1 System Performance Security Module 1 Version 5.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 9 1 Chapter 9: Fundamental Security IT Essentials: PC Hardware and.
IT Essentials: PC Hardware and Software v4.0
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Security Architecture
Computer & Network Security
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
Module 6: Designing Security for Network Hosts
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 9 1 Chapter 9: Security IT Essentials: PC Hardware and Software v4.0.
Storage, Communication & Disposal of data & information Threats to data & Information Deliberate, accidental & technical failure.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer Security Sample security policy Dr Alexei Vernitski.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Add video notes to lecture
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Objectives Telecommunications and Network Physical and Personnel
Part 3.
Presentation transcript:

12015/10/20 Muhammad Salman University of Indonesia

Web course  Course materials & resources: Keamanan dan Kehandalan Jaringan  Discussion & Sharing Network Security & Reliability 2015/10/20

Question 2015/10/20

Question 2015/10/20

Sample Case: How to secure your house?

2015/10/20 Accesability vs Security

2015/10/20

“Everything is in harmony. Once we stand above atmosphere… everything is quite, peace, balance… and in perfect harmony Once we sit on the earth, everything might be in chaos..” - MATRIX REVOLUTION

2015/10/20

Question 2015/10/20

Assets Identification Operating System Office Automation Training Material Stock Control Records Software Information People Physical Paper Document Services Image & Reputation Finance Manager Warehouse Operator Supplier Contract Personnel Files Storage Cabinet Laptop Computers UPS for Server Electrical Supply Web Site Brochure

Threat Categorization Deliberate Attack 1 1 Environment 2 2 Accidental 3 3 Earthquakes Floods Lightning Storm Tornadoes Deterioration Service Failure Hardware Failure Human Error Design Failure Misroute Message Transmission Error Traffic Overload Network Failure Malicious Software Illegal Use of Software Theft Infiltration

The Importance of Security  Private information, company secrets, financial data, computer equipment, and items of national security are placed at risk if proper security procedures are not followed.  A technician’s primary responsibilities include data and network security.

2015/10/20 Primary Goals of a Good Security System  Protect Confidentiality private information is kept private  Ensure Data Integrity prevent data from from being inappropriately changed or deleted  Ensure Data Availability services are available and uninterrupted data can be accessed data can be restored quickly

Security is Strengthened in Layers Network

2015/10/20 Privacy Integrity Authentication Nonrepudiation Interception Spoofing ModificationProof of parties involved Multiple Security Issues to be Solved

Discussion 2015/10/20

Issue #1: Social Engineering  Never give out a password  Always ask for the ID of the unknown person  Restrict access of unexpected visitors  Escort all visitors through the facility

Issue #2: Computer Disposal and Recycling  Erase all hard drives, then use a third-party tool to fully erase all data.  The only way to fully ensure that data cannot be recovered from a hard drive is to carefully shatter the platters with a hammer and safely dispose of the pieces.  To destroy software media (floppy disks and CDs), use a shredding machine designed for shredding these materials.

Issue #3: 70% Unreported 2015/10/20

Issue #4: Attacker  Hacker vs Cracker  White Hat vs Black Hat  Ethical Hacker

Issue #5: Motivations  Political reason  “Robin Hood”  Script kiddies  Insider  Espionage  ….

Issue #6: Wireless Vulnerability Attackers gain access to a network by being within range of an unprotected wireless network. When installing wireless services, you should apply wireless security techniques immediately in order to prevent unwanted access to the network.

Issue #7: Cybercrime Police

Issue #8: Copyright  Video and Music illegal distribution  Ownership and Intellectual Property  The music, film and video industries are global creative businesses which depend crucially on protection and enforcement of our intellectual property rights

2015/10/20 Last but not least…

2015/10/20 Example: Image Manipulation  Can you tell which one is fake?

2015/10/20 Another example:

2015/10/20 One more example:

2015/10/20

Next Week 2015/10/20