Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

1 Computer and Internet Security JCCAA Presentation 03/14/2009 Yu-Min (Phillip) Hsieh Sr. System Administrator Information Technology Rice University.
Computer Viruses.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Internet & Security Information Systems Today Jessup & Valacich, Chapter.6.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Nasca Internet Networking and Security viruses.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
YNG Solutions Website Usability Review Prepared by Josepha Rood December 19, 2008.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Unit 28- Website Development Assignment 1- THEORY P3
Bahasa Inggris 1 Disusun oleh: Pikir Wisnu Wijayanto, M.Hum Fihrin Zuhrufillah, M.Pd Yuningsih, S.S Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Enterprise Network Security Accessing the WAN Lecture week 4.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Incident Response Updated 03/20/2015
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
The Internet TexPREP Summer Camp Computer Science.
Return to the PC Security web page Lesson 5: Dealing with Malware.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
What is Spam? d min.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Understand Malware LESSON Security Fundamentals.
Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.
Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.
Prodi D3 Manajemen Informatika
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
 Mal icious soft ware  Programs that violate one (or more) of the IA pillars  Does not (generally) refer to unintentional program bugs that violate.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.
Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.
MALWARE Autumn Mattis.
Chapter 6 Application Hardening
Business Risks of Insecure Networks
TexPREP Summer Camp Computer Science
Implementing Client Security on Windows 2000 and Windows XP Level 150
Securing Windows 7 Lesson 10.
Test 3 review FTP & Cybersecurity
Presentation transcript:

Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom

Subject Code : KU 2052 Credit : 2 credits Semester : 3 rd Short Description : English 3 subject gives the understanding and skills to the students on how to perform an English presentation effectively. Standard Competency: the students are able to implement the techniques of English presentation skills English 3 – Subject

Basic competence able to open a presentation Intermediate competence able to open a presentation in accordance with the points contained in the slide lecture material Intermediate – Advanced competence able to open a presentation effectively by using examples expressions or sentences contained in the slide material lectures Advanced competency able to open a presentation effectively using? expression or phrase that developed appropriately

Basic Competency : The students are able to develop the ability to do good and effective presentation based on theory, tips and tricks presentation Topic : the ability to do good and effective presentation based on theory, tips and tricks presentation Sub topic : Internet Security – How does the Internet Works Meeting: 10 th

Look at the Videos and Discuss them with your Friends

How the Internet Works – Web Addresses & Domains Domain Identifies the Website (host) Example: microsoft.com Comes in many suffixes such as:.edu(educational institutions).org (organizations; non-profit).mil (military).net (network organizations)

How the Internet Works – Web Addresses & Domains IP Address Each domain is associated with one or more IP addresses Format: a 32-bit address written as 4 numbers (from 0-255) separated by periods Example:

How the Internet Works – Web Addresses & Domains (URL) Uniform Resource Locator When you enter a URL into your Web browser, your DNS server uses its resources to resolve the name into the IP address for the appropriate Web server. Identifies particular Web pages within a domain Example: m/security/default.mspx

Information System Security IS SecurityManagerial Methods Risk Assessment Controlling Access Organizational Policies and Procedures Backups and Recovery Security Resources

Information System Security – Managerial Techniques Security Audit Risk Analysis Alternatives based on Risk Analysis 1. Assessing Risk Authentication Access Control 2. Controlling Access

Information System Security – Managerial Techniques Acceptable Use Policies Risk Analysis Alternatives based on Risk Analysis 3. Organizational Policies and Procedures Backups Disaster Recovery Plans Disaster Recovery 4. Backups and Disaster Recovery

Computer & Internet Security Malwares – malicious software Computer & Internet Security Malwares – malicious software Financial gains, Political reasons, Personal reasons Why do people write malwares? Trojan, Virus, Worm, Spyware, Adware, Rogue AVA What are the other names? Send spam mails; steal identity, financial information and trade secrets; attack other Internet websites What do they do?

Malwares – other names? Trojan VirusWormSpywareAdware Rogue Antivirus Applications..

How does a machine get infected? Application Vulnerabilities When an application is listening on the network and it is not written securely – a remote, unauthenticated attacker could gain elevated privileges and execute arbitrary code, example: buffer- overflow User Activities Compromised administrative credentials

How to prevent malware infections? Apply security updates from Microsoft and other application vendors Configure windows firewall Install an antivirus application On the system level Do not respond to any offers that you did not initiate to seek Careful browsing on the Internet - ory/article-pages/best-practice-tips/ On the user level

How to remove malware infection? 1.Antivirus program … removes known malwares inform you about specific removal steps 2.Seek professional help … 3.Restore an earlier good system state system restore or ntbackup (restore) … 4.Windows recovery console … 5.Reinstall operating system 1.Antivirus program … removes known malwares inform you about specific removal steps 2.Seek professional help … 3.Restore an earlier good system state system restore or ntbackup (restore) … 4.Windows recovery console … 5.Reinstall operating system

Work Cited / References Brown, Marshall. “How Computer Viruses Work.” < Kuenning, Geoff. “How does a computer Virus Scan Work?” January 14, Tyson, Jeff. “How Firewalls Work.”.

Work Cited / References Vilbert, Robert. “How a Virus Scanner Works.. “Spyware Information.” servers-hosting-and-ftp-explained/

Work Cited / References