Presentation is loading. Please wait.

Presentation is loading. Please wait.

12015/10/20 Muhammad Salman University of Indonesia.

Similar presentations


Presentation on theme: "12015/10/20 Muhammad Salman University of Indonesia."— Presentation transcript:

1 12015/10/20 Muhammad Salman University of Indonesia

2 Web course  Course materials & resources: www.scele.ui.ac.id Keamanan dan Kehandalan Jaringan  Discussion & Sharing knowledge: @Facebook Network Security & Reliability 2015/10/20

3 Question 2015/10/20

4 Question 2015/10/20

5 Sample Case: How to secure your house?

6 2015/10/20 Accesability vs Security

7 2015/10/20

8 “Everything is in harmony. Once we stand above atmosphere… everything is quite, peace, balance… and in perfect harmony Once we sit on the earth, everything might be in chaos..” - MATRIX REVOLUTION

9 2015/10/20

10 Question 2015/10/20

11 Assets Identification Operating System Office Automation Training Material Stock Control Records Software Information People Physical Paper Document Services Image & Reputation Finance Manager Warehouse Operator Supplier Contract Personnel Files Storage Cabinet Laptop Computers UPS for Server Electrical Supply Web Site Brochure

12 Threat Categorization Deliberate Attack 1 1 Environment 2 2 Accidental 3 3 Earthquakes Floods Lightning Storm Tornadoes Deterioration Service Failure Hardware Failure Human Error Design Failure Misroute Message Transmission Error Traffic Overload Network Failure Malicious Software Illegal Use of Software Theft Infiltration

13 The Importance of Security  Private information, company secrets, financial data, computer equipment, and items of national security are placed at risk if proper security procedures are not followed.  A technician’s primary responsibilities include data and network security.

14 2015/10/20 Primary Goals of a Good Security System  Protect Confidentiality private information is kept private  Ensure Data Integrity prevent data from from being inappropriately changed or deleted  Ensure Data Availability services are available and uninterrupted data can be accessed data can be restored quickly

15 Security is Strengthened in Layers Network

16 2015/10/20 Privacy Integrity Authentication Nonrepudiation Interception Spoofing ModificationProof of parties involved Multiple Security Issues to be Solved

17 Discussion 2015/10/20

18 Issue #1: Social Engineering  Never give out a password  Always ask for the ID of the unknown person  Restrict access of unexpected visitors  Escort all visitors through the facility

19 Issue #2: Computer Disposal and Recycling  Erase all hard drives, then use a third-party tool to fully erase all data.  The only way to fully ensure that data cannot be recovered from a hard drive is to carefully shatter the platters with a hammer and safely dispose of the pieces.  To destroy software media (floppy disks and CDs), use a shredding machine designed for shredding these materials.

20 Issue #3: 70% Unreported 2015/10/20

21 Issue #4: Attacker  Hacker vs Cracker  White Hat vs Black Hat  Ethical Hacker

22 Issue #5: Motivations  Political reason  “Robin Hood”  Script kiddies  Insider  Espionage  ….

23 Issue #6: Wireless Vulnerability Attackers gain access to a network by being within range of an unprotected wireless network. When installing wireless services, you should apply wireless security techniques immediately in order to prevent unwanted access to the network.

24 Issue #7: Cybercrime Police

25 Issue #8: Copyright  Video and Music illegal distribution  Ownership and Intellectual Property  The music, film and video industries are global creative businesses which depend crucially on protection and enforcement of our intellectual property rights

26 2015/10/20 Last but not least…

27 2015/10/20 Example: Image Manipulation  Can you tell which one is fake?

28 2015/10/20 Another example:

29 2015/10/20 One more example:

30 2015/10/20

31 Next Week 2015/10/20


Download ppt "12015/10/20 Muhammad Salman University of Indonesia."

Similar presentations


Ads by Google