SlideShare a Scribd company logo
Sharing Session Internal : Computer Security
2
Esensi Computer Security Dalam Era Digitalisasi
Security
▪ Tujuan
▪ Mencegah kehilangan/kerusakan data
▪ Mencegah pencurian/pembocoran data
▪ Penanganan insiden
▪ Sumber masalah
▪ Bencana alam
▪ Hacker, pencuri, virus
▪ Diri sendiri
3
4
1. INTRO
5
Minneapolis, 2003
Sharing Session Internal : Computer Security
Sharing Session Internal : Computer Security
6
Pengenalan: data
▪ Data adalah kumpulan fakta:
personal / organizational
▪ Daftar nomor telepon
▪ Hasil rekaman CCTV
▪ Transaksi kartu kredit
▪ Foto-foto
▪ Data yang sudah diolah dan
memiliki makna substansial
disebut informasi
7
Pengenalan: ancaman
▪ Ancaman (threats) pada data:
kehilangan/kerusakan data, pencurian data
(kebocoran rahasia) karena
▪ Bencana alam
▪ Orang lain (hacker, pencuri, malware, dll)
▪ Diri sendiri
8
Pengenalan: resiko
▪ Financial loss
▪ Unavailability of resources
▪ Identity theft & fraud
▪ Loss of trust
▪ Data loss / theft
▪ Misuse of computer resources
9
Pengenalan: keamanan
▪ Tujuan: mencegah data hilang, data rusak &
menangani insiden
▪ Elemen keamanan informasi
▪ Confidentiality
▪ Authenticity
▪ Integrity
▪ Availability
▪ Nonrepudiation
10
Pengenalan: implementasi
▪ Precaution: antivirus, firewall, strong
password, dll.
▪ Maintenance: backup, update patch, resource
monitoring, dll.
▪ Reaction: power off, disconnect, reinstall,
restore, dll.
11
12
13
14
15
2. SISTEM OPERASI
OS
▪ Fungsi sistem operasi:
▪ Mengontrol I/O
▪ Mengelola file dan folder
▪ Menangani resources
▪ Mengamankan perangkat dan data
▪ Aktivitas pengamanan OS:
▪ Update patch
▪ Penggunaan antivirus & firewall
▪ Enkripsi
▪ Konfigurasi akun user
▪ Monitoring proses, services, dll
▪ Backup & recovery
16
OS: Fitur Penting
▪ Windows 10
▪ Windows security (firewall, defender)
▪ Family options
▪ Backup options (system image, file history)
▪ Encryption (EFS, BitLocker)
▪ Jump list
▪ UAC
▪ Mac OS X
▪ Parental Control
▪ Time Machine
▪ Encryption (FileVault)
▪ Automatic login
17
18
3. MALWARE
Malware
▪ Virus
▪ Trojan
▪ Worm
▪ Spyware
▪ Ransomware
▪ Rootkit
▪ ...
19
20
21
Malware: Ciri-ciri
▪ Slow
▪ Pop up
▪ Crash / BSOD
▪ Suspicious hard drive activity
▪ Antivirus, firewall, update disabling
▪ New browser homepage
▪ Peculiar program activity
▪ Random network activity
▪ Blacklisted IP address
22
Antivirus
▪ Kompatibel?
▪ Kualitas?
▪ Efektivitas
▪ Frekuensi update
▪ Efisiensi
▪ Mudah digunakan?
▪ Harga?
23
Antivirus
▪ Techniques
▪ Scanning
▪ Integrity checking
▪ Actions
▪ Clean
▪ Quarantine
▪ Delete
24
Antivirus
▪ Limitation
▪ Limited detection
techniques
▪ Doesn’t fully
protect
▪ Slows down
PC/network
▪ Conflicts
25
26
4. INTERNET
Internet
▪ Ancaman keamanan di Internet
▪ Data: pembocoran, pencurian identitas, penipuan
melalui social engineering
▪ Malware
▪ Keamanan anak:
▪ Pornografi: stealth sites, misdirected search/URL,
iklan-iklan
▪ Cyberbullying: medsos, chat room, email
▪ Pedofil: medsos, chat room, email
27
Internet: browser
28
29
Internet: browser
▪ Mengamankan browser:
▪ Konfigurasi keamanan dan privasi, tracking, cookie, filter
▪ Update patch
▪ Memonitor alerts
▪ Menghindari wi-fi publik
▪ Menginstall plugin keamanan
▪ Menggunakan website HTTPS
▪ Menonaktifkan script: Java, ActiveX, cookies, extension
30
Internet: IM
▪ Fitur-fitur
▪ Chat
▪ Mengirim gambar, video, tautan, musik
▪ File sharing
▪ Ancaman keamanan
▪ Privasi
▪ Identitas palsu
▪ Malware
31
Internet: keamanan anak
▪ Ancaman keamanan anak di Internet:
▪ Cyberbullying
▪ Pornografi
▪ Stealth site
▪ Misdirected search
▪ Grooming
▪ Ancaman di media sosial
▪ Spam
▪ Ancaman di chat rooms
32
Internet: keamanan anak
▪ Langkah-langkah melindungi anak dari masalah
online:
▪ Pencegahan: pendidikan, monitoring, limitasi
▪ Kenali ciri-ciri anak yang mengalami masalah online
▪ Latih anak agar melaporkan hal-hal mencurigakan
▪ Apa yang harus dilakukan jika anak menjadi
korban:
▪ Abaikan semua komunikasi dari predator
▪ Hentikan aktivitas di situs/media tersebut
▪ Blokir akun-akun yang terkait
▪ Jika perlu: hapus akun anak
33
34
5. MEDSOS
35
36
Medsos
▪ Media sosial: situs/aplikasi online untuk
terhubung, dan berbagi informasi dengan orang-
orang lain.
▪ Setiap orang memiliki profil:
▪ Nama
▪ Informasi pribadi (hobi, agama ,dll)
▪ Kontak (email, no hp, dll)
▪ Foto, video, dll
▪ Almamater, kantor, komunitas, dll
37
Medsos: ancaman
▪ Phishing
▪ Identity theft
▪ Malware
▪ Site flaws
▪ URL Spoofing
▪ Clickjacking /
Likejacking
▪ Social engineering
▪ Direct approach
▪ Indirect approach
38
Medsos: tips
▪ Tips:
▪ Password
▪ Iklan / link
▪ Friend request
▪ Informasi yang diposting
▪ Pengaturan privasi
▪ Geotagging
39
40
41
42
6. CLOUD
Cloud
▪ Based on user
▪ Private
▪ Public
▪ Community
▪ Hybrid
▪ Based on service
▪ IaaS
▪ PaaS
▪ SaaS
43
Cloud
▪ Advantages
▪ Flexible
▪ Cost effective
▪ Portable
▪ Privacy issues
▪ Data ownership
▪ Data location
▪ Data migration
▪ Data permanency
▪ Threats
▪ Data breach
▪ Data loss
▪ Account hacking
▪ Disgruntled employee
▪ Technology loopholes
▪ Shared space
44
Cloud
▪ Mitigation
▪ Backup data
▪ Update backup
▪ Strong password
▪ 2 Factor authentication
▪ Encrypt
▪ Discipline behavior
▪ Avoid upload sensitive data
▪ Choosing cloud
▪ How much space?
▪ How much cost?
▪ Customer service
▪ Customer review
▪ Security
▪ Data loss plan
▪ Location
▪ Up time warranty
45
46
7. JARINGAN
47
Jaringan
▪ Jaringan
▪ LAN/MAN/WAN
▪ WPAN/WLAN/WMAN/W
WAN
▪ Wireless security
▪ WEP/WPA/WPA2/WPA3
▪ Bluetooth security
▪ Firewall
▪ Threats
▪ Evil twin, configuration
problem, war driver
48
VPN
▪ Secure?
▪ Private?
▪ Untrackable?
49
Sharing Session Internal : Computer Security

More Related Content

PPTX
Insider Threat
PPTX
Certified Secure Computer User CSCUv3 by Cyber Gita
PDF
Threat Hunting on the Dark Web
PPT
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
PPTX
Automating Threat Hunting on the Dark Web and other nitty-gritty things
PPTX
SIT Summer School (Cyber Security)
PDF
presentation of public speaking public speaking.pdf
PPT
Detection is Dead
Insider Threat
Certified Secure Computer User CSCUv3 by Cyber Gita
Threat Hunting on the Dark Web
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Automating Threat Hunting on the Dark Web and other nitty-gritty things
SIT Summer School (Cyber Security)
presentation of public speaking public speaking.pdf
Detection is Dead

Similar to Sharing Session Internal : Computer Security (20)

PPT
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
PPTX
Sensitive Data Exposure
PDF
Cyber Security Extortion: Defending Against Digital Shakedowns
PPTX
How to manage your client's data responsibly
PDF
Log Out Cyber Awareness
PPTX
Cyber Security - Moving Past "Best Practices"
PDF
Online Privacy, the next Battleground
PPTX
Shining a Light on Cyber Threats from the Dark Web
PPSX
Cyber security awareness for students
PDF
001 ho basic computer
PDF
Shockproofing Your Use of Social Media
PPTX
Online Security and How to Make Money Online
PPTX
Personal Internet Security Practice
PPTX
Online Safety, Security, Ethics, and Etiquette EMPOTECH (1).pptx
PPTX
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPT
Building Trust in the Digital Age
PDF
The Hacker's Guide to NOT Getting Hacked
PPTX
Online privacy & security
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Sensitive Data Exposure
Cyber Security Extortion: Defending Against Digital Shakedowns
How to manage your client's data responsibly
Log Out Cyber Awareness
Cyber Security - Moving Past "Best Practices"
Online Privacy, the next Battleground
Shining a Light on Cyber Threats from the Dark Web
Cyber security awareness for students
001 ho basic computer
Shockproofing Your Use of Social Media
Online Security and How to Make Money Online
Personal Internet Security Practice
Online Safety, Security, Ethics, and Etiquette EMPOTECH (1).pptx
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Building Trust in the Digital Age
The Hacker's Guide to NOT Getting Hacked
Online privacy & security
Ad

More from pmgdscunsri (18)

PDF
Info Session Empowering You to Achieve More with GDGoC UNSRI
PDF
Info Session GDGoC UNSRI 2024_2025 - Nadia Laras
PDF
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
PPTX
[InspireHER] Carving Success as Kartini: Strategies in Pursuing Careers
PPTX
Leveling Up your Branding and Mastering MERN: Fullstack WebDev
PDF
Deep Learning For Computer Vision- Day 3 Study Jams GDSC Unsri.pptx
PPTX
Firebase integration with Flutter
PPTX
Building a Flutter App.pptx
PPTX
Dart Object-Oriented Programming (OOP) and Flutter State Management
PPTX
Convolutional Neural Networks (CNN) for Computer Vision - Day 4 Study Jams G...
PPTX
Linear Regression, Classification and Data Time Series - Day 2 Study Jams GDS...
PPTX
Introduction to Machine Learning - Day 1 Study Jams GDSC Unsri.pptx
PPTX
Dart Basics & Introduction to Flutter Part 2.pptx
PPTX
Dart Basics & Introduction to Flutter Part 1
PPTX
Seminar and DevTalk : Mastering UX Research - 5 Whys Framework
PPTX
Seminar and DevTalk : Mastering UX Research - What is UX Research
PDF
Info Session Bangkit Academy "Empowering Through Bangkit: Unveiling the Essen...
PDF
Sosialisasi Bangkit 2024: Discovering Bangkit Academy, Capstone, and Incubati...
Info Session Empowering You to Achieve More with GDGoC UNSRI
Info Session GDGoC UNSRI 2024_2025 - Nadia Laras
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
[InspireHER] Carving Success as Kartini: Strategies in Pursuing Careers
Leveling Up your Branding and Mastering MERN: Fullstack WebDev
Deep Learning For Computer Vision- Day 3 Study Jams GDSC Unsri.pptx
Firebase integration with Flutter
Building a Flutter App.pptx
Dart Object-Oriented Programming (OOP) and Flutter State Management
Convolutional Neural Networks (CNN) for Computer Vision - Day 4 Study Jams G...
Linear Regression, Classification and Data Time Series - Day 2 Study Jams GDS...
Introduction to Machine Learning - Day 1 Study Jams GDSC Unsri.pptx
Dart Basics & Introduction to Flutter Part 2.pptx
Dart Basics & Introduction to Flutter Part 1
Seminar and DevTalk : Mastering UX Research - 5 Whys Framework
Seminar and DevTalk : Mastering UX Research - What is UX Research
Info Session Bangkit Academy "Empowering Through Bangkit: Unveiling the Essen...
Sosialisasi Bangkit 2024: Discovering Bangkit Academy, Capstone, and Incubati...
Ad

Recently uploaded (20)

PPT
Lines and angles cbse class 9 math chemistry
PPTX
Embedded for Artificial Intelligence 1.pptx
PPTX
ERP good ERP good ERP good ERP good good ERP good ERP good
PPTX
Computers and mobile device: Evaluating options for home and work
PDF
-DIGITAL-INDIA.pdf one of the most prominent
PPTX
Fundamentals of Computer.pptx Computer BSC
PPTX
Syllabus Computer Six class curriculum s
PPTX
material for studying about lift elevators escalation
PDF
Prescription1 which to be used for periodo
PDF
Smarter Security: How Door Access Control Works with Alarms & CCTV
PPTX
Nanokeyer nano keyekr kano ketkker nano keyer
DOCX
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
PDF
Dynamic Checkweighers and Automatic Weighing Machine Solutions
PPTX
KVL KCL ppt electrical electronics eee tiet
PPTX
title _yeOPC_Poisoning_Presentation.pptx
PPTX
INFERTILITY (FEMALE FACTORS).pptxgvcghhfcg
PPTX
code of ethics.pptxdvhwbssssSAssscasascc
PPTX
Lecture 3b C Library _ ESP32.pptxjfjfjffkkfkfk
PPTX
1.pptxsadafqefeqfeqfeffeqfqeqfeqefqfeqfqeffqe
PPTX
Embeded System for Artificial intelligence 2.pptx
Lines and angles cbse class 9 math chemistry
Embedded for Artificial Intelligence 1.pptx
ERP good ERP good ERP good ERP good good ERP good ERP good
Computers and mobile device: Evaluating options for home and work
-DIGITAL-INDIA.pdf one of the most prominent
Fundamentals of Computer.pptx Computer BSC
Syllabus Computer Six class curriculum s
material for studying about lift elevators escalation
Prescription1 which to be used for periodo
Smarter Security: How Door Access Control Works with Alarms & CCTV
Nanokeyer nano keyekr kano ketkker nano keyer
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
Dynamic Checkweighers and Automatic Weighing Machine Solutions
KVL KCL ppt electrical electronics eee tiet
title _yeOPC_Poisoning_Presentation.pptx
INFERTILITY (FEMALE FACTORS).pptxgvcghhfcg
code of ethics.pptxdvhwbssssSAssscasascc
Lecture 3b C Library _ ESP32.pptxjfjfjffkkfkfk
1.pptxsadafqefeqfeqfeffeqfqeqfeqefqfeqfqeffqe
Embeded System for Artificial intelligence 2.pptx

Sharing Session Internal : Computer Security

  • 2. 2 Esensi Computer Security Dalam Era Digitalisasi
  • 3. Security ▪ Tujuan ▪ Mencegah kehilangan/kerusakan data ▪ Mencegah pencurian/pembocoran data ▪ Penanganan insiden ▪ Sumber masalah ▪ Bencana alam ▪ Hacker, pencuri, virus ▪ Diri sendiri 3
  • 8. 6
  • 9. Pengenalan: data ▪ Data adalah kumpulan fakta: personal / organizational ▪ Daftar nomor telepon ▪ Hasil rekaman CCTV ▪ Transaksi kartu kredit ▪ Foto-foto ▪ Data yang sudah diolah dan memiliki makna substansial disebut informasi 7
  • 10. Pengenalan: ancaman ▪ Ancaman (threats) pada data: kehilangan/kerusakan data, pencurian data (kebocoran rahasia) karena ▪ Bencana alam ▪ Orang lain (hacker, pencuri, malware, dll) ▪ Diri sendiri 8
  • 11. Pengenalan: resiko ▪ Financial loss ▪ Unavailability of resources ▪ Identity theft & fraud ▪ Loss of trust ▪ Data loss / theft ▪ Misuse of computer resources 9
  • 12. Pengenalan: keamanan ▪ Tujuan: mencegah data hilang, data rusak & menangani insiden ▪ Elemen keamanan informasi ▪ Confidentiality ▪ Authenticity ▪ Integrity ▪ Availability ▪ Nonrepudiation 10
  • 13. Pengenalan: implementasi ▪ Precaution: antivirus, firewall, strong password, dll. ▪ Maintenance: backup, update patch, resource monitoring, dll. ▪ Reaction: power off, disconnect, reinstall, restore, dll. 11
  • 14. 12
  • 15. 13
  • 16. 14
  • 18. OS ▪ Fungsi sistem operasi: ▪ Mengontrol I/O ▪ Mengelola file dan folder ▪ Menangani resources ▪ Mengamankan perangkat dan data ▪ Aktivitas pengamanan OS: ▪ Update patch ▪ Penggunaan antivirus & firewall ▪ Enkripsi ▪ Konfigurasi akun user ▪ Monitoring proses, services, dll ▪ Backup & recovery 16
  • 19. OS: Fitur Penting ▪ Windows 10 ▪ Windows security (firewall, defender) ▪ Family options ▪ Backup options (system image, file history) ▪ Encryption (EFS, BitLocker) ▪ Jump list ▪ UAC ▪ Mac OS X ▪ Parental Control ▪ Time Machine ▪ Encryption (FileVault) ▪ Automatic login 17
  • 21. Malware ▪ Virus ▪ Trojan ▪ Worm ▪ Spyware ▪ Ransomware ▪ Rootkit ▪ ... 19
  • 22. 20
  • 23. 21
  • 24. Malware: Ciri-ciri ▪ Slow ▪ Pop up ▪ Crash / BSOD ▪ Suspicious hard drive activity ▪ Antivirus, firewall, update disabling ▪ New browser homepage ▪ Peculiar program activity ▪ Random network activity ▪ Blacklisted IP address 22
  • 25. Antivirus ▪ Kompatibel? ▪ Kualitas? ▪ Efektivitas ▪ Frekuensi update ▪ Efisiensi ▪ Mudah digunakan? ▪ Harga? 23
  • 26. Antivirus ▪ Techniques ▪ Scanning ▪ Integrity checking ▪ Actions ▪ Clean ▪ Quarantine ▪ Delete 24
  • 27. Antivirus ▪ Limitation ▪ Limited detection techniques ▪ Doesn’t fully protect ▪ Slows down PC/network ▪ Conflicts 25
  • 29. Internet ▪ Ancaman keamanan di Internet ▪ Data: pembocoran, pencurian identitas, penipuan melalui social engineering ▪ Malware ▪ Keamanan anak: ▪ Pornografi: stealth sites, misdirected search/URL, iklan-iklan ▪ Cyberbullying: medsos, chat room, email ▪ Pedofil: medsos, chat room, email 27
  • 31. 29
  • 32. Internet: browser ▪ Mengamankan browser: ▪ Konfigurasi keamanan dan privasi, tracking, cookie, filter ▪ Update patch ▪ Memonitor alerts ▪ Menghindari wi-fi publik ▪ Menginstall plugin keamanan ▪ Menggunakan website HTTPS ▪ Menonaktifkan script: Java, ActiveX, cookies, extension 30
  • 33. Internet: IM ▪ Fitur-fitur ▪ Chat ▪ Mengirim gambar, video, tautan, musik ▪ File sharing ▪ Ancaman keamanan ▪ Privasi ▪ Identitas palsu ▪ Malware 31
  • 34. Internet: keamanan anak ▪ Ancaman keamanan anak di Internet: ▪ Cyberbullying ▪ Pornografi ▪ Stealth site ▪ Misdirected search ▪ Grooming ▪ Ancaman di media sosial ▪ Spam ▪ Ancaman di chat rooms 32
  • 35. Internet: keamanan anak ▪ Langkah-langkah melindungi anak dari masalah online: ▪ Pencegahan: pendidikan, monitoring, limitasi ▪ Kenali ciri-ciri anak yang mengalami masalah online ▪ Latih anak agar melaporkan hal-hal mencurigakan ▪ Apa yang harus dilakukan jika anak menjadi korban: ▪ Abaikan semua komunikasi dari predator ▪ Hentikan aktivitas di situs/media tersebut ▪ Blokir akun-akun yang terkait ▪ Jika perlu: hapus akun anak 33
  • 37. 35
  • 38. 36
  • 39. Medsos ▪ Media sosial: situs/aplikasi online untuk terhubung, dan berbagi informasi dengan orang- orang lain. ▪ Setiap orang memiliki profil: ▪ Nama ▪ Informasi pribadi (hobi, agama ,dll) ▪ Kontak (email, no hp, dll) ▪ Foto, video, dll ▪ Almamater, kantor, komunitas, dll 37
  • 40. Medsos: ancaman ▪ Phishing ▪ Identity theft ▪ Malware ▪ Site flaws ▪ URL Spoofing ▪ Clickjacking / Likejacking ▪ Social engineering ▪ Direct approach ▪ Indirect approach 38
  • 41. Medsos: tips ▪ Tips: ▪ Password ▪ Iklan / link ▪ Friend request ▪ Informasi yang diposting ▪ Pengaturan privasi ▪ Geotagging 39
  • 42. 40
  • 43. 41
  • 45. Cloud ▪ Based on user ▪ Private ▪ Public ▪ Community ▪ Hybrid ▪ Based on service ▪ IaaS ▪ PaaS ▪ SaaS 43
  • 46. Cloud ▪ Advantages ▪ Flexible ▪ Cost effective ▪ Portable ▪ Privacy issues ▪ Data ownership ▪ Data location ▪ Data migration ▪ Data permanency ▪ Threats ▪ Data breach ▪ Data loss ▪ Account hacking ▪ Disgruntled employee ▪ Technology loopholes ▪ Shared space 44
  • 47. Cloud ▪ Mitigation ▪ Backup data ▪ Update backup ▪ Strong password ▪ 2 Factor authentication ▪ Encrypt ▪ Discipline behavior ▪ Avoid upload sensitive data ▪ Choosing cloud ▪ How much space? ▪ How much cost? ▪ Customer service ▪ Customer review ▪ Security ▪ Data loss plan ▪ Location ▪ Up time warranty 45
  • 49. 47
  • 50. Jaringan ▪ Jaringan ▪ LAN/MAN/WAN ▪ WPAN/WLAN/WMAN/W WAN ▪ Wireless security ▪ WEP/WPA/WPA2/WPA3 ▪ Bluetooth security ▪ Firewall ▪ Threats ▪ Evil twin, configuration problem, war driver 48