Keamanan Sistem (CNG4O3)

Transcription

Keamanan Sistem (CNG4O3)
Keamanan Sistem (CNG4O3)
2014-2
02 – Keamanan Informasi
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
The Computing Technology
Industry Association (CompTIA)
Security+ certification is a
vendor-neutral credential
internationally recognized as
validating a foundation level of
security skills and knowledge
11.
12.
13.
14.
Introduction to Security
Malware and Social Engineering
Attacks
Application and Network Attacks
Vulnerability Assessment and
Mitigating Attacks
Host, Application, and Data
Security
Network Security
Administering a Secure Network
Wireless Network Security
Access Control Fundamentals
Authentication and Account
Management
Basic Cryptography
Advanced Cryptography
Business Continuity
Risk Mitigation
http://www.symantec.com/security_response/publications/threatreport.jsp
http://www.idsirtii.or.id/tahunan/tahun/2013.html
Information Security positions
InfoSec managerial positions
• include the administration and
management of plans, policies, and people.
InfoSec technical positions
• concerned with the design, configuration,
installation, and maintenance of technical
security equipment
Solution to securing computers:
•using a better software product
•creating a stronger password
http://www.innovationexcellence.com/blog/2012/10/25/understanding-complexity-and-what-to-do-about-it/
“Security” ≈
the necessary steps to protect a
person or property from harm.
• That harm may come primarily from two different
sources:
• A direct action that is intended to inflict damage or
suffering.
• An indirect and nonintentional action.
Security usually includes …
preventive
measures
preemptive
attacks (in
some
instances)
rapid
response
“Information Security” ≈
the tasks of securing information that
is in a digital format
manipulated by a microprocessor
stored on a storage device
transmitted over a network
Information Security
creates a defense that
attempts to ward off attacks
and prevents the collapse of
the system when a
successful attack occurs
3 primary protections
another set of protections
Authenti
cation
Authoriz
ation
Accounti
ng
information security is that which protects
the integrity, confidentiality, and availability
of information on the devices that store,
manipulate, and transmit the information
through products, people, and procedures.
Terminologies
• “How much risk can we tolerate?”
• Risk = Threat x Vulnerability x Cost
• Three options when dealing with
risks:
• accept the risk
• diminish the risk
• transfer the risk
http://www.oncallinternational.com/blog/travel-risk-management-5-steps-protecting-traveling-employees/
Who Are the Attackers?
• Hackers: {white-hat, black-hat} “attackers”
• Script kiddies: using automated attack software
• Computer spy: hired to attack a specific computer or
system that contains sensitive information
• Insiders: mostly sabotage and theft of intellectual
property
• Cybercriminals: network of attackers, identity thieves,
spammers, and financial fraudsters
• Cyberterrorists: attack a nation’s network and
computer infrastructure to cause panic among citizens
Steps of an Attack
(typical)
Five fundamental security
principles
Layering
Diversity
Limiting
Simplicity
Obscurity
Layering
http://www.ackengineeringltd.com/security.php
http://patientsafetyed.duhs.duke.edu/module_e/swiss_cheese.html
http://www.planetware.com/london/tower-of-london-eng-l-tl.htm
Limiting
• Limiting access to information reduces the threat
against it.
• What level of access should users have?
The best answer is the least amount necessary to
do their jobs, and no more.
http://www.tntmagazine.com/london/events/a-royal-summer-the-arrival-of-prince-george-the-opening-of-buckingham-palace-and-more-london-events-to-get-you-swept-up-in-royal-fever/page/2
Diversity
• The layers must also be different (diverse)
• If attackers penetrate one layer, they cannot use
the same techniques to break through all other
layers
http://www.loveindonesia.com/news/en/news/detail/7791/benteng-aleppo-saksi-kehebatan-arsitektur-islam-1
Obscurity
• Security by obscurity: obscuring to the outside
world what is on the inside makes attacks that
much more difficult.
• not revealing the type of computer, version of
operating system, or brand of software that is used
http://thedailyomnivore.net/2013/01/28/security-through-obscurity/
Simplicity
• Complex security systems can be hard to
understand, troubleshoot, and even feel secure
about.
• As much as possible, a secure system should be
simple for those on the inside to understand and
use.
• Challenge: keeping a system simple from the inside,
but complex on the outside
Hands-On: Use an EULA Analyzer
• Find an end-user license agreements of any program.
Exp: Microsoft Windows’ EULA.
• Go to: www.spywareguide.com/analyze/analyzer.php
• Copy & paste the EULA text under “Paste license here:”
• Be sure that “Detailed analysis” is selected
• After the analysis is completed, scroll down through the
document and note the instances of Reference to
tracking or monitoring. Do you agree with these
conditions?
• Play around with other EULA.

Similar documents

Keamanan Sistem (CNG4O3)

Keamanan Sistem (CNG4O3) Buffer Overflow Attacks • A process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer. • This extra data overflows into the adjacent memory locations and, under...

More information