• Tidak ada hasil yang ditemukan

TIK 03-Computer Communication and Security

N/A
N/A
Protected

Academic year: 2017

Membagikan "TIK 03-Computer Communication and Security"

Copied!
44
0
0

Teks penuh

(1)

Chapter 3

(2)

Chapter 3 Objectives

Communications and Network terminology and applications Various communications devices, media, and procedures

Type of Computer Networks

Describe the types of

computer-network & Internet security risks

(3)

Communications

What are computer

communications

?

(4)

Communications

• What is needed for successful communications?

•Initiates instruction to transmit data, instructions, or information. Commonly in software forms

Sending device

•Connects the sending device to the communications channel Communications device

•Media on which data, instructions, or information travel

Communications channel

•Connects the communications channel to the receiving device Communications device

•Accepts transmission of data, instructions, or information

(5)

Communication Software

What is

communications software

?

Programs that help users establish connection to Internet, other network,

or another computer Programs that help users manage transmission of data, instructions,

and information

(6)

Communication Devices

What are examples of communications

devices?

Common types are [dial-up modems, ISDN & DSL modems, broadband/cable modems] For

Internet Communication, and [network cards, wireless access points, routers, and

(7)

Communication Devices

What is a

modem

?

• Converts digital signals to analog signals and vice versa

• Notebook computers often use PC Card modem

Dial Up Modems

Cable and Wireless Broadband Modems

(8)

Communications Devices

What is a

network card

?

– Adapter card, PC Card, or compact flash card that enables computer or

device to access network

(9)

Communications Devices

What is a

wireless access

point

?

– Central communications device that allows

(10)

Communications Devices

What is a

router

?

– Connects computers and transmits data to correct destination on network

– Routers forward data on Internet using fastest

(11)
(12)

Communications Devices

What is a

switch/hub

?

– Device that provides

(13)

Communications Channel

What is a

channel

?

– Transmission media on which data travels in communications system

Transmission media

are materials

capable of carrying one or more signals

Bandwidth is amount of data

(14)

Transmission Media

Physical

• Optical Fiber

• Twisted Pair Cables

• Coaxial Cable

Wireless

• Communications Sattelite

• Microwave Radio

• Cellular Radio (2G, 2,5G, 3G, etc)

• Broadcast Radio (Wi-fi, Bluetooth)

(15)

Computer Network

What is a

network

?

– Collection of computers and devices connected via communications devices and

(16)

Computer Network

What is a

local area

network (LAN)

?

– Network in limited

geographical area such as home or office

building

– Metropolitan area network (MAN)

(17)

Computer Network

How to Join a computer into a LAN

(18)

Computer Network

What is a

wide area

network (WAN)

?

– Network that covers large geographic area using many types of media

– I ter et is world’s

(19)

Computer Network

What is a

client/server

network

?

– One or more computers act as server and other

(20)

Computer Network

What is an

Intranet

?

Internal network that uses Internet technologies

Makes information accessible to employees

Typically includes connection to Internet

Extranet allows customers or suppliers to access

(21)
(22)

Computer Security Risks

What is a

computer security risk

?

– Action that causes loss of or damage to computer system

– Mostly happened when computer connected into a network

(23)

Computer Viruses, Worms, and Trojan Horses

What are

viruses, worms

, and

Trojan horses

?

Virus is a potentially damaging computer program Worm copies itself repeatedly, using up resources and possibly shutting down computer or network

Trojan horse hides within

or looks like legitimate program

until triggered

Payload (destructive event) that is delivered when you open file, run infected program, or

boot computer with infected disk

in disk drive

(24)

How can a virus spread through an

e-mail

message?

Step 1. Unscrupulous programmers create a virus program. They hide the virus in a Word document and attach the Word document to an e-mail message.

Step 2. They use the Internet to send the e-mail message to thousands of users around the world.

Step 3b. Other users do not recognize the name of the sender of the e-mail message. These users do not open the e-mail message. Instead they delete the e-mail message.

These users’ computers are not

infected with the virus.

Step 3a. Some users open the attachment and their computers become infected with the virus.

(25)

What are some tips for preventing virus,

worm, and Trojan horse infections?

Install a personal firewall program If the antivirus

program flags an e-mail attachment as infected, delete

the attachment immediately

Never download or install suspicious

software from untrusted sources

Never open an e-mail attachment

unless you are expecting it and

it is from a trusted source Install an antivirus

program on all of your computers

Check all downloaded programs for viruses, worms, or Trojan horses

(26)

DOS & Backdoor

What is a

denial of service (DOS)

attack and

back door

?

A denial of service attack is an assault which disrupts computer access to an Internet service

such as the Web or e-mail

A back door is a program or set of instructions in a program that allow users to bypass security controls when accessing a computer

(27)

Spoofing

What is

spoofing

?

Makes a network or Internet

Transmission appear legitimate IP spoofing occurs when an intruder computer fools a network into believing

its IP address is from a trusted source

Perpetrators of IP spoofing trick their victims into interacting

(28)

Solutions

Best way to prevent

spoofing

and

DOS

is to

build a

firewall

(29)

Solutions

What is

firewall

?

(30)

Solutions

What is

personal firewall

?

– Program that protects personal computer and its data from unauthorized intrusions

– Monitors transmissions to and from computer

(31)

Unauthorized Access and Use

Unauthorized Access

– Use of a computer or network without permission.

– By connecting to it and then logging in as a legitimate user.

– Do not cause damages.

– Merely access the data, valuable information or programs in the computer.

– In some manners, can be categorized as

(32)

Unauthorized Use

– Use of a computer or its data for unapproved or illegal activities.

– Ex: gaining access to a bank computer and

performing an unauthorized bank transfer etc.

(33)

Solutions

How to prevent unauthorized access and use?

(34)

Solutions (Cont.)

How to make good passwords?

GOOD

Example:

@k|_|-@n@6-4L4Y

Longer, alay-er, better

NEVER USE IT

Your birth-day

Your mother/dad/lover name

Very predictable words

Plain, not combinated characters is weak against

(35)

Solutions (Cont.)

How to prevent unauthorized access and use?

– Disable file and printer sharing on Internet connection

– enable just

when you need it

(36)

Solutions (Cont.)

How to ake i for atio thief life’s u h

harder?

– Use encryption

• Safeguards against information theft

• Process of converting plaintext (readable data) into

ciphertext (unreadable characters)

• Use key to generate cipherkey as combinations

• To read the data, the recipient must decrypt, or

decipher, the data

(37)

Internet Security Risk

• Information Sniffing, How?

• H or L can get all sensitive un-encrypted information

(38)

Username, Passwords,

Credit card’s details

Internet Security Risk

• Website phising, How?

https://ib.bankmandiri.co.id/retail/Login.do?action=form https://ib.bangmandiri.co.id/retail/Login.do?action=form

Impersonated Login Page

Ba k Ma diri’s

Server Username, Passwords,

Credit card’s details

Cra ker’s Co puter

(39)

Internet Security Risk

• Website phising commonly spread using emails and social media

(40)

Internet Security Risk

• Social engineering is an non-technical, outside hacker's use of psychological tricks on

legitimate users of a computer system, in order to gain the information (usernames and passwords) one needs to gain access to the system.

• It utilizes two human weakness:

– no one wants to be considered ignorant

(41)

Solutions

Web browsers provide secure data

transmission

Many Web browsers use encryption

Secure site Choose Web site that

uses encryption to secure data

Valid Digital certificate Guarantees Web site

(42)

Solutions

Provides encryption of

all data that passes

between client and

Internet server

– Web addresses

egi i g with https

(43)

Solutions

• Protect yourselves from social engineering

– Be educated, aware, and a little bit paranoid.

– Never give out:

• Usernames / ID numbers

• Passwords / PIN numbers

• System information

• Credit card numbers

• Schedules

• Other Sensitive data

(44)

Referensi

Dokumen terkait

Kesimpulan dari permasalahan yang ditulis penulis diatas adalah bahwa website yang penulis buat ini sudah membantu masyarakat yang mempunyai permasalahan pada pembelian listrik

Nawawi Hadari, 2001, Penelitian Terapan, Gajah Mada Univercity

Mechanisms of induced systemic resistance of plants by bacteria isolates generally involve production of bacterial metabolites such as : hydrogen cyanide (HCN),

belajar. Pada saat sekarang ini banyak sekali pilihan metode pembelajaran, model pembelajaran, pendekatan pembelajaran maupun teknik- teknik pembelajaran yang dapat

Metode Penelitian Pendidikan : Pendekatan Kuantitatif, Kualitatif dan R&D Bandung: Alfabeta.. Suwarsono dan So,

Kontruksi ULP Kota Padang Panjang yang ditunjuk berdasarkan Surat Perintah Tugas Nomor:503/30/SPT/ULP- PP/IV/2013 tanggal 8 Mei 2013, mengumumkan Pemenang Pekerjaan Belanja

Kolaka Timur yang termuat dalam Berita Acara Hasil Pengadaan Langsung Nomor : 20.8/PP-PU/BMSDA/VIII/2015 tanggal 13 Agustus 2015 , yang ditetapkan sebagai penyedia pengadaan

Clinical Profile of Extrapulmonary Tuberculosis Among TB-HIV Patients in Cipto Mangunkusumo Hospital.. Gurmeet Singh 1 , Anna Uyainah 1 , Evy Yunihastuti 2 , Darma