topik supri yanto '31106412' {bhs.inggris bisnis 1 / 3db 19}
computer security and critical data?
Background
computer-security for computer users must have
use various methods to computer security and
personal data, such as by installing anti-virus,
de-el-el. but sometimes it still feels less safe,
because then the rapid development of technology,
so that the hackers were slalu out viruses
terdahsyat and there is even one virus that sampe
now have not found the vaccine,
Guideline
makaning, we should be cautious with all slalu tricks
tricks of the hackers, and here are a few tips to
we prevented computer users and avoid hacking.
how to prevent / minimize them:
1. Beware of phishing sites in great many outstanding
current (example: www.swiiscash.net - should
www.e-www.swisscah.net and qold.com - his G-wear replaced Q),
You should never go to that site, although only
idly want to see it if you still lay against
Internet security and your computer.
2. Do not ever go to any site via e-mail click
/ E-mail links that could potentially be used for click
download active-x yg could hijack (hijack) your browser
you unless you are sure that the link is safe or to
activate the registration. 90% of people were hacked because
of this
or the computer can get spyware / viruses.
3. Always use Mozilla FireFox browser has proven to reply
have the best security than other browsers, including
IE7.0
4. Install Firewall on your computer, you can use
ZoneAlarm free version can be downloaded at
www.zonelabs.com
5. Frequently update your Windows with the latest patch for
the
original licensed Windows
6. Computer should also have a antivirus and
antispyware or you can use in gratisnya version
www.ewido.net
7. Do not even you open an investment account or
your other important account on the computer cafes (public)
that
does not have a firewall or you do not believe that
computer is secure because you can get your account hacked
because keylogger (keyboard activities recorder program and
you open the site) and you should check the startup
Windows was used and turn off the access that you think
dangerous to use a program like Hijack This!
which can be downloaded at the download section of our site.
8. Never download a file attachment in an e-mail address
if you do not know the e-mail from anyone, and especially
e-mail from abroad (in English).
9. Do not install a free program that you are any
downloaded from the site that can not be trusted or through
P2P programs like LimeWire, iMesh or BearShare because
sometimes the program contains a virus or spyware
formulation of an issue
>> Some of the things that make computer crime continues
occurs and tends to increase are as follows:
1. Increased computer and internet users
2. The number of software that was originally used to
audit of a system by looking for weaknesses
and gaps there might be misused to make
scanning system to others.
3. The number of software to conduct the probe and
infiltration are available on the Internet and can be
downloaded
free.
4. The increased capability of computers and Internet
users
5. Decentralization server so that more system
should be handled, while the limited human resources.
6. Lack of shoulder governing computer crime.
7. Increasing number of companies that connect
their LAN networks to the Internet.
8. Increased business applications that use the internet.
9. The number of software that has weaknesses (bugs).
Aim
>> There are several things that can answer the question why
we need to secure computer systems, among others:
1. Avoiding the risk of intrusion, we must ensure
that the system does not kemasukaan intruder who can read,
write and run programs that might interfere
or destroy our system.
2. Reduce the risk of threat, this is usually true in
institutions and private companies. There are several types
of intruders
that can attack our system.
3. Protect the system from the vulnerability, keretanan
will
make our system has the potential to provide access to
not allowed for others who are not eligible.
4. Protect the system from natural disturbances such as
lightning and
others.
View of the points above, is why we
need to keep your computer security is to keep
information, because information has become a commodity that
very important. Some even say that we have
are disebuah "Information based society". Ability to
access and provide information quickly and accurately
becomes very essential for an organization, whether a
form of commercial organizations (companies), universities,
government agencies, and individuals.
>> Aspects of computer security:
The core of computer security is to protect the computer and
network with the aim of securing the information that is
in it. Computer security itself includes some
aspects, among others:
1. Privacy, is something that is confidential
(private). The point is prevention of such information
not accessed by unauthorized people. Examples are
email or other files that should not be read someone else
even by the administrator. Prevention is possible
done is to use technology enksripsi, so
only the owner can find out information that the information
real.
2. Confidentiality, the data supplied to the
another for specific purposes but still maintained its
spread.
Examples of personal data such as: name, address,
no ktp, telephone and so on. Confidentiality will be seen
When asked to prove the crime a person, whether
holders will provide information to people infomasinya
who asked him or keep klientnya.
3. Integrity, the emphasis is not an information
be changed except by the owner of the information. Sometimes
data
who has not maintained its integrity terenskripsipun because
there is the possibility of encryption chpertext changed.
Example: Attack of Integrity as an email
sent the middle road and replaced it intercepted,
so that the email until ketujuan has changed.
4. Autentication, this will be done when the user login
by using the user name and password, if appropriate
or not, if the match will not be accepted and rejected. It
usually associated with access rights a person, whether he
The access is valid or not.
5. Availability, these aspects related to whether a
data available when needed / required. If a data
or information security is too tight will make it difficult
in data access. Besides the slow access
also inhibits Aspe terpenuhnya availability. Attack
often done on this aspect is the denial of service
(DoS), the discomfiture when the demand for services
data so that computers can not serve him. Another example
from denial of service this is to send requests
causing excessive computer can no longer
accommodate the load and eventually the computer down.
>> Some examples of activities that can be done to
computer security planning:
1. Calculate the losses if our information systems are
not
worked for 1 hour, for 1 day, 1 week and 1 month.
(Imagine detik.com server could not be accessed during
a few days. Every day she got a few million loss.
2. Calculate the losses if any error information (data)
the system information that we have. Examples of our WEB
announced the price of an item that is different from the
price
in our stores.
3. Calculate the losses if there is missing data, such as
how the loss suffered when the customer list and
invoices missing from our system and how much it costs
reconstruction again.
4. Does your company's good name is a thing
that must be protected? Imagine if a famous bank
with the security vulnerability of the data, going back and
forth
security incidents. Of cause many customers to move
to other banks for fear of security money.
refrensi:
1.www.geogle.com
2. www.ilmukomputer.com
Selasa, 27 Oktober 2009
Langganan:
Posting Komentar (Atom)
Tidak ada komentar:
Posting Komentar