SlideShare une entreprise Scribd logo
1  sur  41
Penggunaan Perisian Terbuka Untuk Keselamatan Rangkaian Security, Wireless And Multimedia Networking Seminar 28 Julai 2007
[object Object],[object Object],[object Object],Agenda
[object Object],[object Object],Isu-isu Semasa
[object Object],[object Object],[object Object],[object Object],Isu-Isu Semasa
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Kesan Akibat Isu
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Kesan Akibat Pencerobohan
[object Object],[object Object],Kesan Akibat Pencerobohan
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Anda Perlu Tahu
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Persediaan Kita
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ancaman Keselamatan
[object Object],[object Object],[object Object],Ancaman Keselamatan
[object Object],[object Object],[object Object],[object Object],[object Object],Punca Ancaman
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ancaman Secara Bersahaja
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Kelemahan Manusia Adalah Ancaman
[object Object],[object Object],[object Object],[object Object],[object Object],Serangan Daripada Dalam
[object Object],[object Object],[object Object],Ralat Daripada Aplikasi
[object Object],[object Object],[object Object],[object Object],Ralat Daripada Aplikasi
[object Object],[object Object],[object Object],[object Object],Lebih ke Depan Daripada Musuh
[object Object],[object Object],[object Object],GCERT
[object Object],[object Object],[object Object],[object Object],GCERT
[object Object],[object Object],NISER
http://www.sans.org/ SANS Institute http://www.sans.org/top20/ http://www.cisecurity.org/ Center for Internet Security http://packetstormsecurity.org/ Know Your Enemy http://www.cert.org/certcc.html CERT® Coordination Center (CERT/CC) Rujukan Lain
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Sediakan Perlindungan
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewall  Sambungan
[object Object],[object Object],[object Object],[object Object],Bina  Firewall  Anda Sendiri
[object Object],[object Object],Bina Dinding Api Anda Sendiri
[object Object],[object Object],[object Object],Pasang Sedia Ada
[object Object],[object Object],[object Object],[object Object],[object Object],Perlindungan Wireless
[object Object],[object Object],Perlindungan Wireless
[object Object],[object Object],[object Object],[object Object],Audit Server dan Rangkaian Anda Sendiri
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Audit Untuk Server
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Audit Rangkaian
[object Object],[object Object],[object Object],[object Object],[object Object],Pengesan di Server dan Rangkaian
[object Object],[object Object],[object Object],[object Object],[object Object],Pengesan di Server dan Rangkaian
Untuk Rangkaian Network Intrusion Detection System (NIDS) Snort http://www.snort.org/ Bro http://www.bro-ids.org/ Memasang pengesan di Server dan rangkaian
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Penapisan SPAM
[object Object],[object Object],[object Object],[object Object],Penapisan Laman Web
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Perisian Untuk Desktop
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Perisian Untuk Desktop
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Alatan Yang digunakan oleh Hacker
Harisfazillah Jamel linuxmalaysia @ gmail.com http://blog.harisfazillah.info/ http://linuxmalaysia.harisfazillah.info/ Terima Kasih

Contenu connexe

Tendances

Keselamatan dan kerahsiaan
Keselamatan dan kerahsiaanKeselamatan dan kerahsiaan
Keselamatan dan kerahsiaanMardzati Othman
 
Ancaman-Ancaman pada Keamanan Jaringan Komputer
Ancaman-Ancaman pada Keamanan Jaringan KomputerAncaman-Ancaman pada Keamanan Jaringan Komputer
Ancaman-Ancaman pada Keamanan Jaringan KomputerFajar Sany
 
Bidang pembelajaran 1.3 tingkatan 4
Bidang pembelajaran 1.3 tingkatan 4Bidang pembelajaran 1.3 tingkatan 4
Bidang pembelajaran 1.3 tingkatan 4MOE
 
Panduan keselamatan ict
Panduan keselamatan ictPanduan keselamatan ict
Panduan keselamatan ictJefree Accon
 
Sucik puji utami, hapzi ali, mencegah sistem informasi dari gangguan hacker, ...
Sucik puji utami, hapzi ali, mencegah sistem informasi dari gangguan hacker, ...Sucik puji utami, hapzi ali, mencegah sistem informasi dari gangguan hacker, ...
Sucik puji utami, hapzi ali, mencegah sistem informasi dari gangguan hacker, ...SUCIK PUJI UTAMI
 
Sucik puji utami, hapzi ali, forum 7 minggu 11, ut ambon, 2018
Sucik puji utami, hapzi ali, forum 7 minggu 11, ut ambon, 2018Sucik puji utami, hapzi ali, forum 7 minggu 11, ut ambon, 2018
Sucik puji utami, hapzi ali, forum 7 minggu 11, ut ambon, 2018SUCIK PUJI UTAMI
 
Sim nur putriana, prof. dr. ir. hapzi ali, mm, cma keamanan sistem informasi.pdf
Sim nur putriana, prof. dr. ir. hapzi ali, mm, cma keamanan sistem informasi.pdfSim nur putriana, prof. dr. ir. hapzi ali, mm, cma keamanan sistem informasi.pdf
Sim nur putriana, prof. dr. ir. hapzi ali, mm, cma keamanan sistem informasi.pdfNur Putriana
 
8, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univers...
8, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univers...8, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univers...
8, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univers...Yuni Rahmayani
 
SIM, Lia Eka Nurrahmawati , Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...
SIM, Lia Eka Nurrahmawati , Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...SIM, Lia Eka Nurrahmawati , Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...
SIM, Lia Eka Nurrahmawati , Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...LiaEka1412
 
Presentasi modul 12 keamanan komputer
Presentasi modul 12 keamanan komputerPresentasi modul 12 keamanan komputer
Presentasi modul 12 keamanan komputerParis Dkc
 
Isu isu keselamatan komputer present latest
Isu isu keselamatan komputer present latestIsu isu keselamatan komputer present latest
Isu isu keselamatan komputer present latestAzman Hanafi
 
Keamanan jaringan
Keamanan jaringanKeamanan jaringan
Keamanan jaringanlazarus0306
 
Sim, naomi yosepin, prof. dr. hapzi ali, cma, cara mencegah dan menanggulangi...
Sim, naomi yosepin, prof. dr. hapzi ali, cma, cara mencegah dan menanggulangi...Sim, naomi yosepin, prof. dr. hapzi ali, cma, cara mencegah dan menanggulangi...
Sim, naomi yosepin, prof. dr. hapzi ali, cma, cara mencegah dan menanggulangi...Naomiyosephine
 
sim, elfrida, hapzi ali, akuntansi, universitas mercubuana, 2017
sim, elfrida, hapzi ali, akuntansi, universitas mercubuana, 2017sim, elfrida, hapzi ali, akuntansi, universitas mercubuana, 2017
sim, elfrida, hapzi ali, akuntansi, universitas mercubuana, 2017elfridaanjas
 
Vulnerability scaning keamanan jaringan
Vulnerability scaning keamanan jaringanVulnerability scaning keamanan jaringan
Vulnerability scaning keamanan jaringanBram Abang
 
Indah herlina, hapzi ali, cara mencegah gangguan sistem informasi serta keama...
Indah herlina, hapzi ali, cara mencegah gangguan sistem informasi serta keama...Indah herlina, hapzi ali, cara mencegah gangguan sistem informasi serta keama...
Indah herlina, hapzi ali, cara mencegah gangguan sistem informasi serta keama...Indah Herlina
 
Sistem Keamanan Komputer.PDF
Sistem Keamanan Komputer.PDFSistem Keamanan Komputer.PDF
Sistem Keamanan Komputer.PDFNurdin Al-Azies
 
Presentasi keamanan jaringan
Presentasi keamanan jaringanPresentasi keamanan jaringan
Presentasi keamanan jaringanAri Yandi
 

Tendances (19)

8. computer threats
8. computer threats8. computer threats
8. computer threats
 
Keselamatan dan kerahsiaan
Keselamatan dan kerahsiaanKeselamatan dan kerahsiaan
Keselamatan dan kerahsiaan
 
Ancaman-Ancaman pada Keamanan Jaringan Komputer
Ancaman-Ancaman pada Keamanan Jaringan KomputerAncaman-Ancaman pada Keamanan Jaringan Komputer
Ancaman-Ancaman pada Keamanan Jaringan Komputer
 
Bidang pembelajaran 1.3 tingkatan 4
Bidang pembelajaran 1.3 tingkatan 4Bidang pembelajaran 1.3 tingkatan 4
Bidang pembelajaran 1.3 tingkatan 4
 
Panduan keselamatan ict
Panduan keselamatan ictPanduan keselamatan ict
Panduan keselamatan ict
 
Sucik puji utami, hapzi ali, mencegah sistem informasi dari gangguan hacker, ...
Sucik puji utami, hapzi ali, mencegah sistem informasi dari gangguan hacker, ...Sucik puji utami, hapzi ali, mencegah sistem informasi dari gangguan hacker, ...
Sucik puji utami, hapzi ali, mencegah sistem informasi dari gangguan hacker, ...
 
Sucik puji utami, hapzi ali, forum 7 minggu 11, ut ambon, 2018
Sucik puji utami, hapzi ali, forum 7 minggu 11, ut ambon, 2018Sucik puji utami, hapzi ali, forum 7 minggu 11, ut ambon, 2018
Sucik puji utami, hapzi ali, forum 7 minggu 11, ut ambon, 2018
 
Sim nur putriana, prof. dr. ir. hapzi ali, mm, cma keamanan sistem informasi.pdf
Sim nur putriana, prof. dr. ir. hapzi ali, mm, cma keamanan sistem informasi.pdfSim nur putriana, prof. dr. ir. hapzi ali, mm, cma keamanan sistem informasi.pdf
Sim nur putriana, prof. dr. ir. hapzi ali, mm, cma keamanan sistem informasi.pdf
 
8, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univers...
8, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univers...8, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univers...
8, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univers...
 
SIM, Lia Eka Nurrahmawati , Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...
SIM, Lia Eka Nurrahmawati , Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...SIM, Lia Eka Nurrahmawati , Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...
SIM, Lia Eka Nurrahmawati , Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...
 
Presentasi modul 12 keamanan komputer
Presentasi modul 12 keamanan komputerPresentasi modul 12 keamanan komputer
Presentasi modul 12 keamanan komputer
 
Isu isu keselamatan komputer present latest
Isu isu keselamatan komputer present latestIsu isu keselamatan komputer present latest
Isu isu keselamatan komputer present latest
 
Keamanan jaringan
Keamanan jaringanKeamanan jaringan
Keamanan jaringan
 
Sim, naomi yosepin, prof. dr. hapzi ali, cma, cara mencegah dan menanggulangi...
Sim, naomi yosepin, prof. dr. hapzi ali, cma, cara mencegah dan menanggulangi...Sim, naomi yosepin, prof. dr. hapzi ali, cma, cara mencegah dan menanggulangi...
Sim, naomi yosepin, prof. dr. hapzi ali, cma, cara mencegah dan menanggulangi...
 
sim, elfrida, hapzi ali, akuntansi, universitas mercubuana, 2017
sim, elfrida, hapzi ali, akuntansi, universitas mercubuana, 2017sim, elfrida, hapzi ali, akuntansi, universitas mercubuana, 2017
sim, elfrida, hapzi ali, akuntansi, universitas mercubuana, 2017
 
Vulnerability scaning keamanan jaringan
Vulnerability scaning keamanan jaringanVulnerability scaning keamanan jaringan
Vulnerability scaning keamanan jaringan
 
Indah herlina, hapzi ali, cara mencegah gangguan sistem informasi serta keama...
Indah herlina, hapzi ali, cara mencegah gangguan sistem informasi serta keama...Indah herlina, hapzi ali, cara mencegah gangguan sistem informasi serta keama...
Indah herlina, hapzi ali, cara mencegah gangguan sistem informasi serta keama...
 
Sistem Keamanan Komputer.PDF
Sistem Keamanan Komputer.PDFSistem Keamanan Komputer.PDF
Sistem Keamanan Komputer.PDF
 
Presentasi keamanan jaringan
Presentasi keamanan jaringanPresentasi keamanan jaringan
Presentasi keamanan jaringan
 

Similaire à SEKURITI_KOMPUTER

Slide Keselamatan Ict Melaka Spoof Melaka 2007 (malay)
Slide Keselamatan Ict Melaka Spoof Melaka 2007 (malay)Slide Keselamatan Ict Melaka Spoof Melaka 2007 (malay)
Slide Keselamatan Ict Melaka Spoof Melaka 2007 (malay)Linuxmalaysia Malaysia
 
10, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univer...
10, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univer...10, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univer...
10, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univer...Yuni Rahmayani
 
Sistem keamanan komputer
Sistem keamanan komputerSistem keamanan komputer
Sistem keamanan komputerRhusman 05
 
Sistem keamanan komputer
Sistem keamanan komputerSistem keamanan komputer
Sistem keamanan komputerRhusman 05
 
Keamanan jaringan
Keamanan jaringanKeamanan jaringan
Keamanan jaringanlazarus0306
 
Vulnerability scaning keamanan jaringan
Vulnerability scaning keamanan jaringanVulnerability scaning keamanan jaringan
Vulnerability scaning keamanan jaringanBram Abang
 
Paper system keamanan skype
Paper system keamanan skypePaper system keamanan skype
Paper system keamanan skypeMeirza Rudyanto
 
SIM, Sefty Echamawaty, Hapzi Ali, Keamanan Sistem Informasi, Universitas Merc...
SIM, Sefty Echamawaty, Hapzi Ali, Keamanan Sistem Informasi, Universitas Merc...SIM, Sefty Echamawaty, Hapzi Ali, Keamanan Sistem Informasi, Universitas Merc...
SIM, Sefty Echamawaty, Hapzi Ali, Keamanan Sistem Informasi, Universitas Merc...Ekaaase
 
Cara mendesain sistem keamanan jaringan
Cara mendesain sistem keamanan jaringanCara mendesain sistem keamanan jaringan
Cara mendesain sistem keamanan jaringanWarnet Raha
 
Sim, saeful akhyar,prof.dr.hapzi ali,mm,cma, keamanan sisitem informasi , uni...
Sim, saeful akhyar,prof.dr.hapzi ali,mm,cma, keamanan sisitem informasi , uni...Sim, saeful akhyar,prof.dr.hapzi ali,mm,cma, keamanan sisitem informasi , uni...
Sim, saeful akhyar,prof.dr.hapzi ali,mm,cma, keamanan sisitem informasi , uni...Saeful Akhyar
 
Serangan dalam Internet
Serangan dalam InternetSerangan dalam Internet
Serangan dalam InternetJuukyu
 
Sim.nurlelah,prof.dr.ir.hapzi ali,mm,cma,keamanan sistem informasi,universita...
Sim.nurlelah,prof.dr.ir.hapzi ali,mm,cma,keamanan sistem informasi,universita...Sim.nurlelah,prof.dr.ir.hapzi ali,mm,cma,keamanan sistem informasi,universita...
Sim.nurlelah,prof.dr.ir.hapzi ali,mm,cma,keamanan sistem informasi,universita...Nurlelah Nurlelah
 
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...dewizulfah
 
Sim, bunga lahir wana, prof. dr. hapzi ali, keamanan sistem informasi, mercub...
Sim, bunga lahir wana, prof. dr. hapzi ali, keamanan sistem informasi, mercub...Sim, bunga lahir wana, prof. dr. hapzi ali, keamanan sistem informasi, mercub...
Sim, bunga lahir wana, prof. dr. hapzi ali, keamanan sistem informasi, mercub...bunga lahir wana
 
SI & PI, Novian Risqi Nur Utami, Hapzi Ali, jenis jenis penyerangan dan penya...
SI & PI, Novian Risqi Nur Utami, Hapzi Ali, jenis jenis penyerangan dan penya...SI & PI, Novian Risqi Nur Utami, Hapzi Ali, jenis jenis penyerangan dan penya...
SI & PI, Novian Risqi Nur Utami, Hapzi Ali, jenis jenis penyerangan dan penya...Novian Risqi Nur Utami
 
Sim,desi panjaitan,hapzi ali,keamanan sistem informasi
Sim,desi panjaitan,hapzi ali,keamanan sistem informasiSim,desi panjaitan,hapzi ali,keamanan sistem informasi
Sim,desi panjaitan,hapzi ali,keamanan sistem informasiDesi Panjaitan
 
Sim,desi panjaitan,hapzi ali,keamanan sistem informasi
Sim,desi panjaitan,hapzi ali,keamanan sistem informasiSim,desi panjaitan,hapzi ali,keamanan sistem informasi
Sim,desi panjaitan,hapzi ali,keamanan sistem informasiDesi Panjaitan
 
10. sim, ronna azami dwi septiani, hapzi ali, information security, universit...
10. sim, ronna azami dwi septiani, hapzi ali, information security, universit...10. sim, ronna azami dwi septiani, hapzi ali, information security, universit...
10. sim, ronna azami dwi septiani, hapzi ali, information security, universit...RonnaAzaniDwiSeptian
 

Similaire à SEKURITI_KOMPUTER (20)

Slide Keselamatan Ict Melaka Spoof Melaka 2007 (malay)
Slide Keselamatan Ict Melaka Spoof Melaka 2007 (malay)Slide Keselamatan Ict Melaka Spoof Melaka 2007 (malay)
Slide Keselamatan Ict Melaka Spoof Melaka 2007 (malay)
 
10, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univer...
10, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univer...10, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univer...
10, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univer...
 
Sistem keamanan komputer
Sistem keamanan komputerSistem keamanan komputer
Sistem keamanan komputer
 
Sistem keamanan komputer
Sistem keamanan komputerSistem keamanan komputer
Sistem keamanan komputer
 
Forum 10
Forum 10Forum 10
Forum 10
 
Keamanan jaringan
Keamanan jaringanKeamanan jaringan
Keamanan jaringan
 
Vulnerability scaning keamanan jaringan
Vulnerability scaning keamanan jaringanVulnerability scaning keamanan jaringan
Vulnerability scaning keamanan jaringan
 
Paper system keamanan skype
Paper system keamanan skypePaper system keamanan skype
Paper system keamanan skype
 
SIM, Sefty Echamawaty, Hapzi Ali, Keamanan Sistem Informasi, Universitas Merc...
SIM, Sefty Echamawaty, Hapzi Ali, Keamanan Sistem Informasi, Universitas Merc...SIM, Sefty Echamawaty, Hapzi Ali, Keamanan Sistem Informasi, Universitas Merc...
SIM, Sefty Echamawaty, Hapzi Ali, Keamanan Sistem Informasi, Universitas Merc...
 
Cara mendesain sistem keamanan jaringan
Cara mendesain sistem keamanan jaringanCara mendesain sistem keamanan jaringan
Cara mendesain sistem keamanan jaringan
 
Sim, saeful akhyar,prof.dr.hapzi ali,mm,cma, keamanan sisitem informasi , uni...
Sim, saeful akhyar,prof.dr.hapzi ali,mm,cma, keamanan sisitem informasi , uni...Sim, saeful akhyar,prof.dr.hapzi ali,mm,cma, keamanan sisitem informasi , uni...
Sim, saeful akhyar,prof.dr.hapzi ali,mm,cma, keamanan sisitem informasi , uni...
 
Serangan dalam Internet
Serangan dalam InternetSerangan dalam Internet
Serangan dalam Internet
 
Sim.nurlelah,prof.dr.ir.hapzi ali,mm,cma,keamanan sistem informasi,universita...
Sim.nurlelah,prof.dr.ir.hapzi ali,mm,cma,keamanan sistem informasi,universita...Sim.nurlelah,prof.dr.ir.hapzi ali,mm,cma,keamanan sistem informasi,universita...
Sim.nurlelah,prof.dr.ir.hapzi ali,mm,cma,keamanan sistem informasi,universita...
 
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...
 
Sim, bunga lahir wana, prof. dr. hapzi ali, keamanan sistem informasi, mercub...
Sim, bunga lahir wana, prof. dr. hapzi ali, keamanan sistem informasi, mercub...Sim, bunga lahir wana, prof. dr. hapzi ali, keamanan sistem informasi, mercub...
Sim, bunga lahir wana, prof. dr. hapzi ali, keamanan sistem informasi, mercub...
 
SI & PI, Novian Risqi Nur Utami, Hapzi Ali, jenis jenis penyerangan dan penya...
SI & PI, Novian Risqi Nur Utami, Hapzi Ali, jenis jenis penyerangan dan penya...SI & PI, Novian Risqi Nur Utami, Hapzi Ali, jenis jenis penyerangan dan penya...
SI & PI, Novian Risqi Nur Utami, Hapzi Ali, jenis jenis penyerangan dan penya...
 
Sim,desi panjaitan,hapzi ali,keamanan sistem informasi
Sim,desi panjaitan,hapzi ali,keamanan sistem informasiSim,desi panjaitan,hapzi ali,keamanan sistem informasi
Sim,desi panjaitan,hapzi ali,keamanan sistem informasi
 
Sim,desi panjaitan,hapzi ali,keamanan sistem informasi
Sim,desi panjaitan,hapzi ali,keamanan sistem informasiSim,desi panjaitan,hapzi ali,keamanan sistem informasi
Sim,desi panjaitan,hapzi ali,keamanan sistem informasi
 
KK_18_TKJ
KK_18_TKJKK_18_TKJ
KK_18_TKJ
 
10. sim, ronna azami dwi septiani, hapzi ali, information security, universit...
10. sim, ronna azami dwi septiani, hapzi ali, information security, universit...10. sim, ronna azami dwi septiani, hapzi ali, information security, universit...
10. sim, ronna azami dwi septiani, hapzi ali, information security, universit...
 

Plus de Linuxmalaysia Malaysia

Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...
Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...
Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...Linuxmalaysia Malaysia
 
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...Linuxmalaysia Malaysia
 
Malaysia Open Source Conference MOSCMY 2013 Itinerary And Streams MOSC2013 a...
Malaysia Open Source Conference MOSCMY 2013  Itinerary And Streams MOSC2013 a...Malaysia Open Source Conference MOSCMY 2013  Itinerary And Streams MOSC2013 a...
Malaysia Open Source Conference MOSCMY 2013 Itinerary And Streams MOSC2013 a...Linuxmalaysia Malaysia
 
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013Linuxmalaysia Malaysia
 
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochureBrochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochureLinuxmalaysia Malaysia
 
Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)
Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)
Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)Linuxmalaysia Malaysia
 
FOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysia
FOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysiaFOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysia
FOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysiaLinuxmalaysia Malaysia
 
Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...
Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...
Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...Linuxmalaysia Malaysia
 
Sponsorship Prospectus Malaysia Open Source Conference 2012 (MOSC2012)
Sponsorship Prospectus Malaysia Open Source Conference 2012  (MOSC2012)Sponsorship Prospectus Malaysia Open Source Conference 2012  (MOSC2012)
Sponsorship Prospectus Malaysia Open Source Conference 2012 (MOSC2012)Linuxmalaysia Malaysia
 
OSS Community Forum Regarding Proposed BCPM2011 SWOT Slide
OSS Community Forum Regarding Proposed BCPM2011 SWOT SlideOSS Community Forum Regarding Proposed BCPM2011 SWOT Slide
OSS Community Forum Regarding Proposed BCPM2011 SWOT SlideLinuxmalaysia Malaysia
 
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011Linuxmalaysia Malaysia
 
Building Smart Phone Web Apps MOSC2010 Bikesh iTrain
Building Smart Phone Web Apps MOSC2010 Bikesh iTrainBuilding Smart Phone Web Apps MOSC2010 Bikesh iTrain
Building Smart Phone Web Apps MOSC2010 Bikesh iTrainLinuxmalaysia Malaysia
 
OSDC.my Master Plan For Malaysia Open Source Community
OSDC.my Master Plan For Malaysia Open Source CommunityOSDC.my Master Plan For Malaysia Open Source Community
OSDC.my Master Plan For Malaysia Open Source CommunityLinuxmalaysia Malaysia
 
33853955 bikesh-beginning-smart-phone-web-development
33853955 bikesh-beginning-smart-phone-web-development33853955 bikesh-beginning-smart-phone-web-development
33853955 bikesh-beginning-smart-phone-web-developmentLinuxmalaysia Malaysia
 
Open Source Tools for Creating Mashups with Government Datasets MOSC2010
Open Source Tools for Creating Mashups with Government Datasets MOSC2010Open Source Tools for Creating Mashups with Government Datasets MOSC2010
Open Source Tools for Creating Mashups with Government Datasets MOSC2010Linuxmalaysia Malaysia
 
DNS solution trumps cloud computing competition
DNS solution trumps cloud computing competitionDNS solution trumps cloud computing competition
DNS solution trumps cloud computing competitionLinuxmalaysia Malaysia
 
Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)
Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)
Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)Linuxmalaysia Malaysia
 
Benchmarking On Web Server For Budget 2008 Day
Benchmarking On  Web  Server For  Budget 2008  DayBenchmarking On  Web  Server For  Budget 2008  Day
Benchmarking On Web Server For Budget 2008 DayLinuxmalaysia Malaysia
 

Plus de Linuxmalaysia Malaysia (20)

Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...
Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...
Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...
 
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...
 
Malaysia Open Source Conference MOSCMY 2013 Itinerary And Streams MOSC2013 a...
Malaysia Open Source Conference MOSCMY 2013  Itinerary And Streams MOSC2013 a...Malaysia Open Source Conference MOSCMY 2013  Itinerary And Streams MOSC2013 a...
Malaysia Open Source Conference MOSCMY 2013 Itinerary And Streams MOSC2013 a...
 
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
 
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochureBrochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
 
Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)
Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)
Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)
 
FOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysia
FOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysiaFOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysia
FOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysia
 
Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...
Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...
Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...
 
Sponsorship Prospectus Malaysia Open Source Conference 2012 (MOSC2012)
Sponsorship Prospectus Malaysia Open Source Conference 2012  (MOSC2012)Sponsorship Prospectus Malaysia Open Source Conference 2012  (MOSC2012)
Sponsorship Prospectus Malaysia Open Source Conference 2012 (MOSC2012)
 
OSS Community Forum Regarding Proposed BCPM2011 SWOT Slide
OSS Community Forum Regarding Proposed BCPM2011 SWOT SlideOSS Community Forum Regarding Proposed BCPM2011 SWOT Slide
OSS Community Forum Regarding Proposed BCPM2011 SWOT Slide
 
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011
 
Building Smart Phone Web Apps MOSC2010 Bikesh iTrain
Building Smart Phone Web Apps MOSC2010 Bikesh iTrainBuilding Smart Phone Web Apps MOSC2010 Bikesh iTrain
Building Smart Phone Web Apps MOSC2010 Bikesh iTrain
 
OSDC.my Master Plan For Malaysia Open Source Community
OSDC.my Master Plan For Malaysia Open Source CommunityOSDC.my Master Plan For Malaysia Open Source Community
OSDC.my Master Plan For Malaysia Open Source Community
 
33853955 bikesh-beginning-smart-phone-web-development
33853955 bikesh-beginning-smart-phone-web-development33853955 bikesh-beginning-smart-phone-web-development
33853955 bikesh-beginning-smart-phone-web-development
 
Open Source Tools for Creating Mashups with Government Datasets MOSC2010
Open Source Tools for Creating Mashups with Government Datasets MOSC2010Open Source Tools for Creating Mashups with Government Datasets MOSC2010
Open Source Tools for Creating Mashups with Government Datasets MOSC2010
 
DNS solution trumps cloud computing competition
DNS solution trumps cloud computing competitionDNS solution trumps cloud computing competition
DNS solution trumps cloud computing competition
 
Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)
Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)
Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)
 
Benchmarking On Web Server For Budget 2008 Day
Benchmarking On  Web  Server For  Budget 2008  DayBenchmarking On  Web  Server For  Budget 2008  Day
Benchmarking On Web Server For Budget 2008 Day
 
Sesuaikan Masa Sempena 2010
Sesuaikan Masa Sempena 2010Sesuaikan Masa Sempena 2010
Sesuaikan Masa Sempena 2010
 
OSS Community In Malaysia 2009 List
OSS Community In Malaysia 2009 ListOSS Community In Malaysia 2009 List
OSS Community In Malaysia 2009 List
 

SEKURITI_KOMPUTER

  • 1. Penggunaan Perisian Terbuka Untuk Keselamatan Rangkaian Security, Wireless And Multimedia Networking Seminar 28 Julai 2007
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. http://www.sans.org/ SANS Institute http://www.sans.org/top20/ http://www.cisecurity.org/ Center for Internet Security http://packetstormsecurity.org/ Know Your Enemy http://www.cert.org/certcc.html CERT® Coordination Center (CERT/CC) Rujukan Lain
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. Untuk Rangkaian Network Intrusion Detection System (NIDS) Snort http://www.snort.org/ Bro http://www.bro-ids.org/ Memasang pengesan di Server dan rangkaian
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. Harisfazillah Jamel linuxmalaysia @ gmail.com http://blog.harisfazillah.info/ http://linuxmalaysia.harisfazillah.info/ Terima Kasih