Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
TABLE OF CONTENT
PROFILE GROUP
2…………………………………………………………………………
………………….. ii
PREFACE………………………………………………………………
……………………………………………. iii
TABLE OF
CONTENT………………………………………………………………
………………………… iv
CHAPTER 1
Background…………………………………………………………
……………………………………………. 1
Scope…………………………………………………………………
…………………………………………….. 1
CHAPTER 2
2.1 History Of Internet
Security…………………………………………………………………
……………… 2
2.2 Internet
Security…………………………………………………………………
……………………………… 3
2.3 Kinds of Security on the
internet…………………………………………………………………
………. 4
2.4 Types Of Internet
Security…………………………………………………………………
……………….. 7
CHAPTER 3
3.1 Hacker &
Cracker…………………………………………………………………
…………………………… 8
3.2
Spyware,Virus,Spam,etc………………………………………………
…………………………………….. 9
CHAPTER 4
Conclusion………………………………………………………………
………………………………………….. 11
CHAPTER 1
PREMILINARY
Background
Security issues are one of the important aspects of an information
system. Often security issues are on the last list of things
considered important. When disrupting system performance,
security is often reduced or even eliminated. Information in this
era has become a very important commodity. Some even say that
we have are in an “information-based society”. Ability to access
and providing information quickly and accurately becomes very
essential for a organizations, whether in the form of commercial
organizations (companies), universities, government agencies,
and individuals. It is possible with rapid development in computer
and telecommunication technology.
Scope
In this paper, the issues that will be discussed various matters
relating to the internet. Problems and handling of security in
cyberspace as well as efforts to reduce crime in cyberspace.
CHAPTER 2
What is protected :
Þ your data
Þ your resources
Þ Your reputation
To what :
Þ breakthroughs
Þ Denial Of Service
Þ Information Theft
Internet Security Objectives :
Þ Confidentiality
Þ Data Integrity
Þ Availability of data when we need it
Internet Security for users :
Þ Secure data
Þ Maintain data confidentiality
Users do :
Þ Downloading files
Þ receive and receive email
Tips on keeping the data intact :
Þ Do not trust any software downloaded
Þ Do not directly execute email attachments
Þ Always use antivirus software
1. Physical security
Physical security is no less important than cyber security because
crime in physical form can be fatal to a system. Physical security
is more emphasis on hardware. Examples of physical security is
to use a lock or padlock on the hardware used or tight guarding of
server hardware.
1. Network security
Network security is preventing unauthorized users from using
owned networks. An example of network security is to use a
firewall or proxy that is used to filter users who will use the
network.
III. Authorization access
Access authorization is the use of passwords or passwords if we
want to access something. Orientation has been widely applied to
various systems both in Personal Computer (PC) and in
handphone. The use of security access authorization is very
simple but can effectively ward off unauthorized users trying to
access a system.
1. Virus Protection
Virus is a security threat that we can not underestimate.Virus has
many characteristics and is able to destroy important data even
the existing system.Because of protection against this virus is
very important. One easy way to ward off viruses is to use
antivirus software and be careful if we move data from storage
media.
1. Handling of the congregation
Disaster management is planning the steps to be taken in the
event of a disaster that results in the destruction of a system and
the loss of important data.
CHAPTER 3
3.1 Hacker
Consists of a person or group of people who continuously strive to
penetrate the security system of the operating system of a computer.
Experienced hackers can quickly identify the security holes in a
computer network system.
The hacker’s habit is to keep searching for new knowledge or new
targets and they will inform each other.
Basically the real hackers intend to destroy data within the network.
3.2 Craker
A person or group of people who intentionally intend to undermine
and destroy integrity throughout a network of computer systems is
called a cracker and his actions
In general, the cracker after successfully entered into the computer
network will directly perform destruction and destruction of
important data to cause chaos for the users in using the computer.
These crew activities are easily recognizable and can be quickly
identified from the impact of their activities.
PIRACY
After browsing the internet for hours, you just realize something is
wrong with your browser. Maybe it could be like this. If you close
the browser and have tried to open the browser to browse again it
will appear a website that you do not know at all, you already feel
the website address you want to open properly and not
infrequently the website becomes the default home page address
in your browser. If this happens, no doubt your PC is exposed to
piracy.
SPAM
Spam1 is as “unsolicited email”, which is email We do not expect
this Spam can email that much to many person. The refill from
this email is a promotion. This spam problem is based on send an
email to one person and 1000 people are not much different.
Barrier for mass mailing is very low. This is different by doing
conventional marketing to send a postcard or letter will be much
different for one person and 1000 person.
WORM
You certainly still remember advertising in the television media a
few years ago, “Your child worms?”. Related to worms, this paper
discusses worms or foreign terms worm. Internet worms (Worms)
are autonomous intrusion agents capable of self-replication and
spread by exploiting security flaws in commonly used services.
Worm is a new phenomenon, first discovered in 1988. Worms
have become a deadly threat on the Internet, although most
cases that occur specifically are on a Windows-based system.
Several types of worms using the latest electronic mail (e-mail) as
a medium of dissemination.
VIRUS
The term computer virus is no stranger to today’s computer users.
Release, about 12 years ago, this term has been known by the
computer user community. New in 1988, appeared articles in the
mass media that heavily preach about new threats to computer
users who came to be known as ‘computer virus’. Viruses are on
a good computer program, a package like any other programs. It
is very basic on computer viruses and other programs. Viruses
are made by someone with a variety of purposes, especially virus
makers who want to pursue popularity and also just for the sake
of pleasure. Goodbye to create a virus with the aim of destroying
it will mess up the computer it’s infecting.
CHAPTER 4
CONCLUSION