• Tidak ada hasil yang ditemukan

cybersecurity.ppt 1996KB Jun 23 2011 12:05:48 PM

N/A
N/A
Protected

Academic year: 2017

Membagikan "cybersecurity.ppt 1996KB Jun 23 2011 12:05:48 PM"

Copied!
17
0
0

Teks penuh

(1)
(2)

Cyber security and information assurance refer to measures for protecting computer systems, networks, and information

(3)

 Cyber security often refers to safety of the

infrastructure and computer systems with a strong emphasis on the technology

 Information assurance tends to have a

boarder focus with emphasis on information management and business practices

 The two areas overlap strongly and the

(4)

Information assurance (IA) is the practice of managing information-related risks. More specifically, IA practitioners seek to protect and defend information and information

systems by ensuring confidentiality, data integrity, authentication, availability, and non-repudiation. IA measures include

(5)

Confidentiality has been defined by the International Organization for

Standardization (ISO) as "ensuring that information is accessible only to those

authorized to have access" and is one of the cornerstones of information security.

Confidentiality is one of the design goals for many cryptosystems, made possible in

(6)

Data integrity means that the data is "whole" or complete, and is identically maintained

during any operation (such as transfer, storage or retrieval). Data integrity is the assurance

that data is consistent and correct. Loss of integrity can result from:

 Malicious altering, such as an attacker altering an account number in a bank transaction, or forgery of an identity document

(7)

Authentication is a security measure designed to establish the validity of a transmission, message, document or originator, or a means of verifying an

individual's authorization to receive specific categories of information.

Authentication technologies include:

 passwords, digital signatures, keys and

(8)

Availability means that the information, the computing systems used to process the

information, and the security controls used to protect the information are all available and functioning correctly when the

information is needed = timely, reliable

(9)

Non-repudiation is the assurance the sender of data is provided with proof of

delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data.

Technologies include:

(10)

 The global recession will lead to a rise of cybercrime worldwide according to 2009

cybercrime forecasts from leading IT security firms.

 Approximately 1.5 million pieces of unique

malware will have been identified by the end of the year, more than in the previous five years combined.

 The optimal way to prevent malicious files from infecting PCs and corporate networks is active real-time content inspection technologies.

(11)

 The United States has bypassed China as

the biggest purveyor of malware as well as sends the most spam worldwide, says

Sophos Security Threat Report: 2009.

 Not only is the USA relaying the most spam

because too many of its computers have been compromised and are under the

control of hackers, but it's also carrying the most malicious webpages.

(12)

 Cybercriminals will continue to exploit the

best Web 2.0 technologies, such as Trojan technologies.

 Cybercriminals are increasingly relying on

Adobe PDF and Flash files, normally considered safe, to infect victims with malware.

 Hackers have been breaking into Facebook

and MySpace and implanting malware to distribute to a victim's social network.

(13)

 Increasing complexity of IT systems and networks  Convergence of IT and communication systems  Expanding wireless connectivity and multiplicity

of wireless devices

 Increasing amount of digital information collected  Increasing connectivity and accessibility of digital

information systems

 Globalization of IT and information systems  Increased web access to a wide range of web

services and web applications

 Increase in all forms of digital commerce

 Trends towards data-marts and hosted data

(14)

 Network security  Disaster recovery

 Information system security technologies  Wireless system security

 Internet security

 Legal issues, standards and compliance  Cybercrime

 Information management

 Information audit and risk analysis  Digital forensics

(15)

 Types of intrusion and intrusion detection

systems

 Firewalls and access control

 Cryptography

 Digital certificates

 Biometrics

 Digital authentication and Public Key

Infrastructure (PKI)

(16)

 Cryptography systems

 Identification and authentication systems

 Operating system security

 E-commerce security tools and strategies

 Firewalls and proxy servers

 Anti-malware and anti-spyware technology

 Anti-piracy techniques

(17)

 en.wikipedia.org/wiki/Cyber_security

 en.wikipedia.org/wiki/Information_assurance

 www.cssia.org/

 www.afei.org/news/NCES/NCES_Information_Assurance.pdf

 www.nitrd.gov/pubs/csia/csia_federal_plan.pdf

 www.sis.uncc.edu/LIISP/slides00/GAIL.pdf

 www.cnss.gov/Assets/pdf/cnssi_4009.pdf

 www2.cs.uidaho.edu/~oman/CS336_F08_syllabus.pdf

 www.coastline.edu/degrees/page.cfm?LinkID=786

Referensi

Dokumen terkait

Demokrasi ini harus meliputi adanya pembagian kekuasaan lebih luas, ter- bukanya akses kepada sarana-sarana produksi dan distribusi bagi rakyat, terbukanya akses bagi rakyat untuk

Mechanisms of induced systemic resistance of plants by bacteria isolates generally involve production of bacterial metabolites such as : hydrogen cyanide (HCN),

Penelitian ini bertujuan untuk mengetahui aktivitas antioksidan melalui metode peredaman radikal bebas dari fraksi flavonoid yang tidak mengandung

GAMBARAN KADAR BIOMARKER HUMAN SOLUBLE TUMOR NECROSIS FACTOR RECEPTOR II ( STNF RII) PADA PENDERITA MALARIA.. Gerson Ryanto 1 ,

tenaga kerja yang secara langsung terlibat dalam proses produksi perusahaan dan biayanya dikaitkan pada biaya produksi atau pada barang yang dihasilkan. Tenaga kerja

Dengan mengkaji sifat- sifat grup dan graf, khususnya graf Cayley, serta automorfisma pada grup dan graf, dapat ditunjukkan bahwa grup merupakan grup yang abelian

Hasil analisis non linier menunjukkan bahwa nilai regresi pada Tabel 1, dimana untuk nilai A sebagai bobot dewasa tubuh (asimtot) yang ditunjukkan oleh kurva Logistic

Tujuan penelitian ini ialah: (1) Mendeskripsikan penerapan model pembelajaran snowball throwing untuk meningkatkan hasil belajar IPA materi energi dan kegunaannya