1 / 30

Administrator jaringan

PERTEMUAN III Oleh : Fajar Y. Zebua. Administrator jaringan. NETWORK SECURITY. A network security design protects assets from threats and vulnerabilities in an organized manner To design security, analyze risks to your assets and create responses. WHY SECURE A NETWORK.

yuli-hays
Download Presentation

Administrator jaringan

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PERTEMUAN III Oleh : Fajar Y. Zebua Administrator jaringan

  2. NETWORK SECURITY

  3. A network security design protects assets from threats and vulnerabilities in an organized manner • To design security, analyze risks to your assets and create responses WHY SECURE A NETWORK

  4. Pihak yang tidak bertanggung-jawab: – memodifikasi situs Internet. – memanfaatkan kartu-kredit untuk belanja. – memalsukan email. – memalsukan transaksi e-commerce. – membuat virus komputer. – menyerang/memacetkan saluran internet. Ilustrasikasuskeamanan

  5. Keperluan Sistem Informasi – penjaminan INTEGRITAS informasi. – pengamanan KERAHASIAN data. – pemastian KESIAGAAN sistem informasi. – pemastian MEMENUHI peraturan, hukum, dan bakuan yang berlaku. Isukeamanan

  6. Confidentiality Protecting information from exposure and disclosure Integrity Decrease possible problems caused by corruption of data Availability Make Information always available Prinsipkeamanan

  7. What is an Exploit? Crackers break into a computer network by exploiting weaknesses in operating system services. Types of attacks – Local –Remote Exploits (1)

  8. Categories of exploits - 0-day ( new unpublished) - Account cracking - Buffer overflow - Denial of service - Impersonation Exploits (2) - Man in the middle - Misconfiguration - Network sniffing - Session hijacking - System/application design errors

  9. Computer Security Institute (http://www.gocsi.com) • Growing Incident Frequency – Incidents reported to the Computer Emergency Response Team/Coordination Center - 1997: 2,134 - 1998: 3,474 (75% growth from previous year) - 1999: 9,859 (164% growth) - 2000: 21,756 (121% growth) - 2001: 52,658 (142% growth) - Tomorrow? Security Statistics: Attack Trends

  10. Security Focus – 31 million Windows-specific attacks – 22 million UNIX/LINUX attacks – 7 million Cisco IOS attacks – All operating systems are attacked! Target serangan

  11. Ethical Hackers vs. Crackers – Hacker usually is a programmer constantly seek further knowledge, freely share what they have discovered and never intentionally damage data. – Cracker breaks into or otherwise violates system integrity with malicious intent. They destroy vital data or cause problems for their targets. Hackers vs crackers

  12. Jenis-jenisserangan

  13. SOCIAL ENGINEERING Seni dan ilmu memaksa orang untuk memenuhi harapan anda ( Bernz ), Suatu pemanfaatan trik-trik psikologis hacker luar pada seorang userlegitimate dari sebuah sistem komputer (Palumbo) Mendapatkan informasi yang diperlukan (misalnya sebuah password)dari seseorang yang merusak sebuah sistem (Berg).

  14. TUJUAN DASAR SE Tujuan dasar social engineering sama seperti umumnyahacking: mendapatkan akses tidak resmi pada sistem atauinformasi untuk melakukan penipuan, intrusi jaringan, matamataindustrial, pencurian identitas, atau secara sederhanauntuk mengganggu sistem atau jaringan.

  15. TARGET Target-target tipikal termasuk perusahaan telepon dan jasa-jasapemberian jawaban, perusahaan dan lembaga keuangandengan nama besar, badan-badan militer dan pemerintah dan rumah sakit.

  16. BENTUK SOCIAL ENGINEERING Social Engineering dengan telepon Diving Dumpster Social engineering on-line : Persuasi Reverse social engineering

  17. Penetration Attacks Steps Footprinting (nslookup, whois, dig) Port scanner (nmap) Network enumeration (nullsession) : cari account name yangsah Gaining & keeping root / administrator access Using access and/or information gained Leaving backdoor Attack – Denial of Services (DoS) :Network flooding – Buffer overflows : Software error – Malware :Virus, worm, trojan horse – Brute force Covering his tracks (hapus jejak)

  18. Denial-of-Service (DoS)Flooding Attack

  19. DIALOG ATTACK Eavesdropping, biasa disebut dengan spoofing,cara penanganan dengan Encryption Impersonation dan message alterationditangani dengan gabungan enkripsi danautentikasi

  20. EAVESDROPPING ON A DIALOG

  21. THREE WAY HANDSHAKE

  22. PORT SCANNING Port scanning adalah proses koneksi ke port-port TCP atauUDP pada host yang menjadi target untuk menentukan serviceapa yang sedang berjalan (Listening). Dengan mengidentifikasi port-port yang listening ini kita dapatmenentukan jenis aplikasi dan sistem operasi apa yangdipergunakan pada host tersebut. Service yang dalam status listening ini memungkinkan orangyang tidak berhak menerobos ke dalam host tersebut

  23. WELL KNOWN PORTS A list of commonly used well known ports are . • Port 20 – FTP, data • Port 21 – FTP, control • Port 22 – SSH • Port 23 – Telnet • Port 25 – SMTP • Port 53 – DNS • Port 80 - HTTP

  24. TOOLS SCANNING Netstat NMAP Nessus

  25. HTTP ATTACK http://www.sans.org/top-cyber-security-risks/

  26. SQL INJECTION ATTACKS http://www.sans.org/top-cyber-security-risks/

  27. Who does the best job of protecting data onComputers Source: Information Technology Association of America, Arlington, Va.Only 0.4% of a company's revenue, on average, is dedicated to information security in the U.S. By 2011, however, that figure will accelerate tenfold to 4% of revenue for U.S. companies, according to Gartner Inc.'s total cost of ownership model for information security.

  28. CYBERCRIME http://www.enigmasoftware.com/top-20-countries-the-most-cybercrime/

  29. ADA PERTANYAAN?

  30. Q U I Z

More Related