Presentation is loading. Please wait.

Presentation is loading. Please wait.

Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom.

Similar presentations


Presentation on theme: "Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom."— Presentation transcript:

1

2 Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom

3 Subject Code : KU 2052 Credit : 2 credits Semester : 3 rd Short Description : English 3 subject gives the understanding and skills to the students on how to perform an English presentation effectively. Standard Competency: the students are able to implement the techniques of English presentation skills English 3 – Subject

4 Basic competence able to open a presentation Intermediate competence able to open a presentation in accordance with the points contained in the slide lecture material Intermediate – Advanced competence able to open a presentation effectively by using examples expressions or sentences contained in the slide material lectures Advanced competency able to open a presentation effectively using? expression or phrase that developed appropriately

5 Basic Competency : The students are able to develop the ability to do good and effective presentation based on theory, tips and tricks presentation Topic : the ability to do good and effective presentation based on theory, tips and tricks presentation Sub topic : Internet Security – How does the Internet Works Meeting: 10 th

6 Look at the Videos and Discuss them with your Friends

7 How the Internet Works – Web Addresses & Domains Domain Identifies the Website (host) Example: microsoft.com Comes in many suffixes such as:.edu(educational institutions).org (organizations; non-profit).mil (military).net (network organizations)

8 How the Internet Works – Web Addresses & Domains IP Address Each domain is associated with one or more IP addresses Format: a 32-bit address written as 4 numbers (from 0-255) separated by periods Example: 123.45.67.890

9 How the Internet Works – Web Addresses & Domains (URL) Uniform Resource Locator When you enter a URL into your Web browser, your DNS server uses its resources to resolve the name into the IP address for the appropriate Web server. Identifies particular Web pages within a domain Example: http://www.microsoft.co m/security/default.mspx

10 Information System Security IS SecurityManagerial Methods Risk Assessment Controlling Access Organizational Policies and Procedures Backups and Recovery Security Resources

11 Information System Security – Managerial Techniques Security Audit Risk Analysis Alternatives based on Risk Analysis 1. Assessing Risk Authentication Access Control 2. Controlling Access

12 Information System Security – Managerial Techniques Acceptable Use Policies Risk Analysis Alternatives based on Risk Analysis 3. Organizational Policies and Procedures Backups Disaster Recovery Plans Disaster Recovery 4. Backups and Disaster Recovery

13 Computer & Internet Security Malwares – malicious software Computer & Internet Security Malwares – malicious software Financial gains, Political reasons, Personal reasons Why do people write malwares? Trojan, Virus, Worm, Spyware, Adware, Rogue AVA What are the other names? Send spam mails; steal identity, financial information and trade secrets; attack other Internet websites What do they do?

14 Malwares – other names? Trojan VirusWormSpywareAdware Rogue Antivirus Applications..

15 How does a machine get infected? Application Vulnerabilities When an application is listening on the network and it is not written securely – a remote, unauthenticated attacker could gain elevated privileges and execute arbitrary code, example: buffer- overflow User Activities Compromised administrative credentials

16 How to prevent malware infections? Apply security updates from Microsoft and other application vendors Configure windows firewall Install an antivirus application On the system level Do not respond to any offers that you did not initiate to seek Careful browsing on the Internet - http://isyourcomputersafe.com/categ ory/article-pages/best-practice-tips/ On the user level

17 How to remove malware infection? 1.Antivirus program … removes known malwares inform you about specific removal steps 2.Seek professional help … 3.Restore an earlier good system state system restore or ntbackup (restore) … 4.Windows recovery console … 5.Reinstall operating system 1.Antivirus program … removes known malwares inform you about specific removal steps 2.Seek professional help … 3.Restore an earlier good system state system restore or ntbackup (restore) … 4.Windows recovery console … 5.Reinstall operating system

18

19 Work Cited / References http://www.slideshare.net/elementcult/internet-security-presentation Brown, Marshall. “How Computer Viruses Work.” <http://www.howstuffworks.com/virus.htm Kuenning, Geoff. “How does a computer Virus Scan Work?” January 14, 2002.. Tyson, Jeff. “How Firewalls Work.”.

20 Work Cited / References Vilbert, Robert. “How a Virus Scanner Works.. “Spyware Information.” 2008. http://www.turnwall.com/articles/how-does-the-internet-work- servers-hosting-and-ftp-explained/ http://computer.howstuffworks.com/dns.htm

21 Work Cited / References https://www.youtube.com/watch?v=7_LPdttKXPc https://www.youtube.com/watch?v=ZonvMhT5c_Qhttps://www.youtube.com/watch?v=i5oe63pOhLIhttps://www.youtube.com/watch?v=vhRScF7uwMA


Download ppt "Bahasa Inggris 3 Arranged by Pikir Wisnu Wijayanto, M.Hum Aris Hermansyah, S.S. Prodi D3 Manajemen Informatika Fakultas Ilmu Terapan Universitas Telkom."

Similar presentations


Ads by Google