Pertemuan 16 Security Policies

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

1 Pertemuan 16 First & Second Conditionals Matakuliah: G0134 – Grammar III Tahun: 2005 Versi: revisi 1.
1 Pertemuan 12 Binary Search Tree Matakuliah: T0026/Struktur Data Tahun: 2005 Versi: 1/1.
1 Pertemuan 25 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 15 The Business Owner’s View Matakuliah: A0194/Pengendalian Rekayasa Ulang Informasi Tahun: 2005 Versi: 1/5.
1 Pertemuan 22 Expressions of Time and preference Matakuliah: G0134 – Grammar III Tahun: 2005 Versi: revisi 1.
1 Pertemuan 26 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 21 More Future Forms Matakuliah: G0134 – Grammar III Tahun: 2005 Versi: revisi 1.
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 23 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 26 Object Relational Database Management System (Lanjutan) Matakuliah: M0174/OBJECT ORIENTED DATABASE Tahun: 2005 Versi: 1/0.
1 Pertemuan 23 Object database design (Lanjutan bagian 2) Matakuliah: M0174/OBJECT ORIENTED DATABASE Tahun: 2005 Versi: 1/0.
1 Pertemuan 21 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 6 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 24 Object database design (Lanjutan bagian 3) Matakuliah: M0174/OBJECT ORIENTED DATABASE Tahun: 2005 Versi: 1/0.
1 Pertemuan 11 & 12 The Internet and the New Information Technology Infrastructure Matakuliah: J0454 / Sistem Informasi Manajemen Tahun: 2006 Versi: 1.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Pertemuan 20 Binomial Heap Matakuliah: T0026/Struktur Data Tahun: 2005 Versi: 1/1.
1 Pertemuan 14 Object Query Language (Lanjutan bagian 1) Matakuliah: M0174/OBJECT ORIENTED DATABASE Tahun: 2005 Versi: 1/0.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
1 Pertemuan 21 Audit Reporting Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
1 Pertemuan 3 Information at Risk Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 19 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 04 Pengamanan Akses Sistem Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Pertemuan 20 Time & Condition Clauses with Future reference Matakuliah: G0134 – Grammar III Tahun: 2005 Versi: revisi 1.
1 Pertemuan 9 Membuat dan mengelola sistem informasi Matakuliah: H0472 / Konsep Sistem Informasi Tahun: 2006 Versi: 1.
1 Pertemuan 8 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 10 Department Organization Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
1 Pertemuan 17 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Pertemuan 02 Aspek dasar keamanan Jaringan dan ketentuan baku OSI
1 Pertemuan 12 Software Protection Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 5 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
PART THREE E-commerce in Action Norton University E-commerce in Action.
1 Pertemuan 4 Information at Risk Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 18 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 14 Security Policies Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 12 Understanding Marketing Strategies on Internet Matakuliah: J0324/Sistem e-Bisnis Tahun: 2005 Versi: 02/02.
1 Pertemuan 03 Ancaman dan Serangan Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Pertemuan 10 Software Protection Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 26 Making It Happen Matakuliah: A0194/Pengendalian Rekayasa Ulang Informasi Tahun: 2005 Versi: 1/5.
Topic 5: Basic Security.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
By Liam Wright Manga comic group Japan SAFETY on your computer.
1 Pertemuan 8 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
MODEL COMPONENT Pertemuan Matakuliah: M Analisis dan Perancangan Sistem Informasi Lanjut Tahun:
1 Pertemuan 16 The Business Owner’s View Matakuliah: A0194/Pengendalian Rekayasa Ulang Informasi Tahun: 2005 Versi: 1/5.
1 Pertemuan 9 Software Protection Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Check By Phone Software - A Tool To Accept Checks Payments in Seconds Submitted By :
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
1 Pertemuan 23 Making It Happen Matakuliah: A0194/Pengendalian Rekayasa Ulang Informasi Tahun: 2005 Versi: 1/5.
Obtain and review client feedback. Creating evaluation or feedback tools Importance of client feedback  The use of client feedback is very useful to.
Pertemuan 04 Proxy/Cache
Pertemuan 20 The Business Views of the Technology Architecture
3.6 Fundamentals of cyber security
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
Pertemuan 22 The Business Views of the Technology Architecture
Matakuliah : T0553/Sistem Multimedia Tahun : 2005 Versi : 5
How to build a good reputation online
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
The new data protection rules
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Outline The concept of perimeter defense and networks Firewalls.
Presentation transcript:

Pertemuan 16 Security Policies Matakuliah :A0334/Pengendalian Lingkungan Online Tahun : 2005 Versi : 1/1 Pertemuan 16 Security Policies

Mahasiswa dapat menyatakan Security Policies Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : Mahasiswa dapat menyatakan Security Policies

Open Source in The Enterprise Outline Materi Security Testing So How Is Security Testing Carried Out? Open Source in The Enterprise

Security Testing How often do we hear in the news about customers finding faults in e-commerce websites and the negative publicity it brings? Yet we still find ourselves saying ‘if our e-commerce system isn’t working, our customers will soon let us know’. Relying on customers to test your system is the best way to lose them. Banking and e-commerce customers are often the first to notice when things go wrong, even before the website’s IT staff and long before directors and senior management.

E-commerce customers are often headline news for being unable to access their own accounts, being presented with other users’ personal details or finding credit card lists online. Such problems are not confined to the consumer arena. Commercial, legal and industrial firms often share clients’ confidential data,plans and proposals online, in an insecure environment leaving them vulnerable to outsiders. The loss of client confidence can spread like a cancer if not checked.

Sometimes security problems arise during internal system changes by IT staff, but often it is the result of something more malicious, such as hackers testing their ‘cybermuscles’ in order to deny user access, or those with more sinister, criminal intent. The more subtle attackers may gain access and do nothing to draw attention to their presence. Hacker ‘toolkits’ can be hidden within existing data. Changes may not be noticed for months.

Vulnerabilities to such attacks may appear in previously watertight systems whenever the systems are internally upgraded or reconfigured. Even adding a firewall an lead to other vulnerabilities. Few IT systems these days are static. Network security is something none of us can afford to compromise. Valuable IT time and resources may be required to recover systems, business can be lost in the short-term, but most importantly reputations can be permanently damaged.

While most off-the-shelf systems are extensively tested,many larger organisations prefer to design and build their own, although such bespoke systems are especially vulnerable. They are often complex and it is difficult to be sure that the system is working correctly, even though you have looked at all of the components and fitted them together properly. Regular penetration testing can help you to know your system’s vulnerabilities and to do something about them before any trouble arrives.

You might ask yourself how well you know your system, particularly if changes are made on a regular basis by different IT staff.

So How Is Security Testing Carried Out? ‘Regular Monitor’ penetration testing involves NTA looking at the vulnerability of a network from the point of view of a potential attacker and searching for any weakness that could be exploited to gain access to a system. However, this is done within very strict parameters. Security holes are located, identified and reported,but they are not exploited to gain access to a system. However, this is done within very strict parameters. Security holes are located, identified and reported, but they are not exploited.

Security testing gives operators greater confidence in their systems and gives their customers greater trust, safe in the knowledge that data and communications are secure. Never let the customer be the one to inform you that things are going wrong. To put your Internet customers first, first regularly check your system.

Open Source in The Enterprise In proprietary software, a single company claims ‘ownership’ of the software, and keeps a tight grip on its ‘intellectual property’. Often part of the ‘intellectual property’ they so carefully guard is the nature of that ‘intellectual property’ itself. The security community at large has a long history of taking matters into its own hands in a virtual ‘name and shame’ tradition, where security flaws in many products, commercial or otherwise are openly discussed.

The End