12015/10/20 Muhammad Salman University of Indonesia.
-
Upload
kathleen-perkins -
Category
Documents
-
view
222 -
download
0
Transcript of 12015/10/20 Muhammad Salman University of Indonesia.
![Page 1: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/1.jpg)
123/04/21
Muhammad SalmanUniversity of Indonesia
![Page 2: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/2.jpg)
Web course
Course materials & resources: www.scele.ui.ac.idKeamanan dan Kehandalan Jaringan
Discussion & Sharing knowledge:@FacebookNetwork Security & Reliability
23/04/21
![Page 3: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/3.jpg)
Question
23/04/21
![Page 4: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/4.jpg)
Question
23/04/21
![Page 5: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/5.jpg)
23/04/21
Sample Case: How to secure your house?
![Page 6: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/6.jpg)
23/04/21
Accesability vs Security
![Page 7: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/7.jpg)
23/04/21
![Page 8: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/8.jpg)
23/04/21
“Everything is in harmony.Once we stand above atmosphere…
everything is quite, peace, balance… and in perfect harmonyOnce we sit on the earth, everything might be in chaos..”
- MATRIX REVOLUTION
![Page 9: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/9.jpg)
23/04/21
![Page 10: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/10.jpg)
Question
23/04/21
![Page 11: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/11.jpg)
Assets Identification
• Operating System• Office Automation
• Training Material• Stock Control Records
SoftwareInformation
People
Physical
Paper Document
Services
Image & Reputation
• Finance Manager• Warehouse Operator
• Supplier Contract• Personnel Files
• Storage Cabinet• Laptop Computers
• UPS for Server• Electrical Supply
• Web Site• Brochure
![Page 12: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/12.jpg)
Threat Categorization
• Earthquakes• Floods• Lightning• Storm
• Tornadoes• Deterioration
• Service Failure• Hardware Failure• Human Error• Design Failure
• Misroute Message• Transmission Error
• Traffic Overload• Network Failure• Malicious Software• Illegal Use of Software
• Theft• Infiltration
![Page 13: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/13.jpg)
The Importance of Security
Private information, company secrets, financial data, computer equipment, and items of national security are placed at risk if proper security procedures are not followed.
A technician’s primary responsibilities include data and network security.
![Page 14: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/14.jpg)
23/04/21
Primary Goals of a Good Security System
Protect Confidentiality private information is kept private
Ensure Data Integrity prevent data from from being inappropriately
changed or deleted
Ensure Data Availability services are available and uninterrupted data can be accessed data can be restored quickly
![Page 15: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/15.jpg)
Security is Strengthened in Layers
Network
![Page 16: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/16.jpg)
23/04/21
Privacy
Integrity
Authentication
Nonrepudiation
Interception Spoofing
Modification Proof of parties involved
Multiple Security Issues to be SolvedMultiple Security Issues to be Solved
![Page 17: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/17.jpg)
Discussion
23/04/21
![Page 18: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/18.jpg)
Issue #1: Social Engineering
Never give out a password
Always ask for the ID of the unknown person
Restrict access of unexpected visitors
Escort all visitors through the facility
![Page 19: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/19.jpg)
Issue #2: Computer Disposal and Recycling
Erase all hard drives, then use a third-party tool to fully erase all data.
The only way to fully ensure that data cannot be recovered from a hard drive is to carefully shatter the platters with a hammer and safely dispose of the pieces.
To destroy software media (floppy disks and CDs), use a shredding machine designed for shredding these materials.
![Page 20: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/20.jpg)
Issue #3: 70% Unreported
23/04/21
![Page 21: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/21.jpg)
Issue #4: Attacker
Hacker vs Cracker
White Hat vs Black Hat
Ethical Hacker
![Page 22: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/22.jpg)
Issue #5: Motivations
Political reason
“Robin Hood”
Script kiddies
Insider
Espionage
….
….
![Page 23: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/23.jpg)
Issue #6: Wireless Vulnerability
• Attackers gain access to a network by being within range of an unprotected wireless network.
• When installing wireless services, you should apply wireless security techniques immediately in order to prevent unwanted access to the network.
![Page 24: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/24.jpg)
Issue #7: Cybercrime Police
![Page 25: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/25.jpg)
Issue #8: Copyright
Video and Music illegal distribution
Ownership and Intellectual Property
The music, film and video industries are global creative businesses which depend crucially on protection and enforcement of our intellectual property rights
![Page 26: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/26.jpg)
23/04/21
Last but not least…
![Page 27: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/27.jpg)
23/04/21
Example: Image Manipulation
Can you tell which one is fake?
![Page 28: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/28.jpg)
23/04/21
Another example:
![Page 29: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/29.jpg)
23/04/21
One more example:
![Page 30: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/30.jpg)
23/04/21
![Page 31: 12015/10/20 Muhammad Salman University of Indonesia.](https://reader036.fdocuments.net/reader036/viewer/2022062322/56649ed95503460f94be78f0/html5/thumbnails/31.jpg)
Next Week
23/04/21