3. Vurnerabiity Assesment and Solution
• Vurnabilty Scanning
• Vurnability Assesment and Penetration Testing
• Application Assesment
Security Vulnerability
4. Security Threats
Ancaman dan serangan pada keamanan jaringan mengacu
pada berbagai jenis risiko dan tindakan yang bertujuan
untuk merusak, mengganggu, atau mengakses ilegal
infrastruktur jaringan, data, atau layanan yang ada dalam
suatu jaringan komputer.
Dalam konteks keamanan jaringan, ancaman dan serangan
merupakan konsep yang penting untuk dipahami karena
mereka menimbulkan risiko terhadap integritas, kerahasiaan,
dan ketersediaan data serta layanan dalam suatu jaringan.
5. Design Philosophy
Weaknesses in Network Infrastucture and
Communicaation Protocol
Filosofi desain pada keamanan jaringan melibatkan
pendekatan holistik untuk mengembangkan sistem yang
tahan terhadap serangan dan kerentanan
Terdapat beragam kelemahan dalam infrastruktur jaringan
dan protokol komunikasi yang dapat dieksploitasi oleh
penyerang untuk merusak, mengganggu, atau mendapatkan
akses tidak sah ke dalam jaringan.
Security Threats Resources
6. Rapid Growth of Cyberspace
The Growth of Hacker Community
Pertumbuhan pesat dunia maya telah memberikan dampak
yang signifikan pada bidang keamanan jaringan. Seiring
dengan perkembangan teknologi informasi dan komunikasi,
semakin banyak aspek kehidupan yang beralih ke dunia
maya, yang membuat keamanan jaringan semakin penting.
Pertumbuhan komunitas peretas atau hacker community
telah menjadi fenomena yang signifikan dalam dunia maya.
Komunitas ini terdiri dari berbagai individu dengan
keterampilan dan minat yang beragam dalam bidang
teknologi informasi, keamanan komputer, dan pemrograman.
Security Threats Resources
7. Vurnability in Operating System Protocol
Kerentanan dalam protokol sistem operasi merujuk pada
celah atau kelemahan yang terdapat dalam protokol yang
digunakan oleh sistem operasi untuk berkomunikasi dengan
perangkat keras, perangkat lunak lain, atau jaringan.
Kerentanan ini dapat dieksploitasi oleh penyerang untuk
melakukan berbagai jenis serangan, termasuk
pengambilalihan sistem, pencurian data, atau gangguan
layanan
Security Threats Resources
8. The Invisible Security Thereat – Insider Effect
Security Threats Resources
Social Enginering
Physical Theft
9. Security Thereat Motives
Terorism
Military Espionage
Economic Espionage
Targeting of National Information Infrastructure
Vendetta / Revenge (Dendam)
Hate (National Origin, Gender, and Race)
11. Security Thereat Management
Security threat management is a technique used to monitor
an organizations critical security system in real-time to
review reports from the monitoring sensors such as the
intrusion detection system (IDS), firewall, and others
scanning sensors.
Among Technique used for security threat management are
risk assesment and forensic analysis
12. Security Thereat Management
Risk assessment in network security is a systematic process
for identifying, evaluating, and prioritizing potential threats
and vulnerabilities that can affect the security of an
organization's network.
The purpose of a risk assessment is to measure the level of
risk associated with network security and identify steps that
can be taken to reduce these risks
Risk Assesment
13. Security Thereat Management
Forensic analysis is done after a threat has been identifiied
and contained. After contaiment, the response team can
launch teh forensic analysis tools to interact with he dynamic
report displayy that have come from sensors during the
duration of the threat or attack if the threat results in the
attack
Forensic analysis in network security is the process of
collecting, analyzing, and interpreting digital evidence related
to security attacks or incidents that occur in computer
networks
Forensic Analysis
14. Steps of Forensic Analysis
Evidence Collection
Digital Evidence Analysis
Event Reconstruction
Impact Assessment
15. Security Threat Correlation
Security threat correlation is the process of identifying
and understanding the relationship between different
types of security threats that may confront a system or
organization.
This involves the analysis of security data relating to
attacks, events, or incidents that occur, with the aim of
identifying patterns or trends that can assist in a
deeper understanding of the threat at hand..
16. Security Attack
An attack on network security is an attempt by an
unauthorized or unwanted party to penetrate or damage a
computer network system with a specific purpose.
The aims of these attacks can vary, from data theft, service
disruption, to sabotage
17. Attacks on Network Security
Malware Attacks
Phishing Attacks
DoS / DDoS Attack
Man in-the-Middle (MitM)
Brute Force Attack
Insider Attack