SlideShare a Scribd company logo
1 of 23
Download to read offline
NETWORK SECURITY
Jupriyadi, S.Kom. M.T.
jupriyadi@teknokrat.ac.id
Bandarlampung, Februari 2020
https://spada.teknokrat.ac.id
Chapter 1
Introduction to security and privacy;
basic concept of confidentiality,
integrity and authentication;
security model and access control;
network and web security; intrusion
detection and prevention;
vulnerabilities and attacks;
Introduction to Capture The Flags
• To be understand the basic concepts of network security
• The student will be able to implement a security system on a
computer network
• Introduction to network security
• Network scanning and probing
• Network monitoring and log analysis
• Email security
• Wireless Security
• Web security
• Web application security
• Firewall
• Intrusion Detection System
• VPN
• Introduction to Capture The Flag
www.krackattacks.com
Identity Theft
One Account
- All Service
√ Attendance of at least 80%
√ Follow the rules that exist in Teknokrat
√ No more than 10 minutes late
Quiz 20%
Assignments 25%
Midterms 25%
Final Exams 30%
No late assignments
are accepted
No supplementary
exams
* Grade
85 - 100 A
70 - 84 B
55 - 69 C
40 - 54 D
<40 E
http://spada.teknokrat.ac.id
You can register using self-enrollment feature by
next week
Password for enrollment : n3t53c
 Certified Ethical Hacker (CEH)
 Global Information Assurance Certification (GIAC)
 Certified Information Systems Security Professional (CISSP)
 Certified Information Security Manager (CISM)
 Vendor Sertifikasi
 Network Security Essentials Fourth Edition – William
Stallings – 2011
 Fundamental of Network Security – John E. Canavan -
2001
 A.Kizza, Joseph M. 2015. Guide to Computer Network
Security. London: Springer
 Perez, A. 2014. Network Security. New Jersey: Wiley
 Keamanan Sistem Informasi Berbasis Internet – Budi
Raharjo – 2002
What's Next ?

More Related Content

Similar to Chapter 1 introduction

Cybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingCybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Bryan Len
 
Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdf
Mehedi Hasan
 

Similar to Chapter 1 introduction (20)

Cyber Law and Security
Cyber Law and SecurityCyber Law and Security
Cyber Law and Security
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada security
 
NYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity WebinarNYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity Webinar
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical Hacking
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYU
 
Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical Hacker
 
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingCybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex Training
 
Design and Construction of Digital Locking System
Design and Construction of Digital Locking SystemDesign and Construction of Digital Locking System
Design and Construction of Digital Locking System
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The proposed solution entails the development of a system that leverages the ...
The proposed solution entails the development of a system that leverages the ...The proposed solution entails the development of a system that leverages the ...
The proposed solution entails the development of a system that leverages the ...
 
Cybersecurity Essentials - Certification
Cybersecurity Essentials - CertificationCybersecurity Essentials - Certification
Cybersecurity Essentials - Certification
 
Cyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdfCyber security and Ethical Hacking Course.pdf
Cyber security and Ethical Hacking Course.pdf
 
Cyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdfCyber security and Ethical Hacking flyer.pdf
Cyber security and Ethical Hacking flyer.pdf
 
CV
CVCV
CV
 
Cybersecurity Essentials
Cybersecurity EssentialsCybersecurity Essentials
Cybersecurity Essentials
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid system
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Introduction_to_Network_Security lecture
Introduction_to_Network_Security lectureIntroduction_to_Network_Security lecture
Introduction_to_Network_Security lecture
 

More from newbie2019

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
newbie2019
 

More from newbie2019 (20)

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injection
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web security
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
C02
C02C02
C02
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 

Recently uploaded

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Chapter 1 introduction

  • 1. NETWORK SECURITY Jupriyadi, S.Kom. M.T. jupriyadi@teknokrat.ac.id Bandarlampung, Februari 2020 https://spada.teknokrat.ac.id Chapter 1
  • 2. Introduction to security and privacy; basic concept of confidentiality, integrity and authentication; security model and access control; network and web security; intrusion detection and prevention; vulnerabilities and attacks; Introduction to Capture The Flags
  • 3. • To be understand the basic concepts of network security • The student will be able to implement a security system on a computer network
  • 4. • Introduction to network security • Network scanning and probing • Network monitoring and log analysis • Email security • Wireless Security • Web security • Web application security • Firewall • Intrusion Detection System • VPN • Introduction to Capture The Flag
  • 5.
  • 6.
  • 8.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. √ Attendance of at least 80% √ Follow the rules that exist in Teknokrat √ No more than 10 minutes late
  • 18. Quiz 20% Assignments 25% Midterms 25% Final Exams 30% No late assignments are accepted No supplementary exams
  • 19. * Grade 85 - 100 A 70 - 84 B 55 - 69 C 40 - 54 D <40 E
  • 20. http://spada.teknokrat.ac.id You can register using self-enrollment feature by next week Password for enrollment : n3t53c
  • 21.  Certified Ethical Hacker (CEH)  Global Information Assurance Certification (GIAC)  Certified Information Systems Security Professional (CISSP)  Certified Information Security Manager (CISM)  Vendor Sertifikasi
  • 22.  Network Security Essentials Fourth Edition – William Stallings – 2011  Fundamental of Network Security – John E. Canavan - 2001  A.Kizza, Joseph M. 2015. Guide to Computer Network Security. London: Springer  Perez, A. 2014. Network Security. New Jersey: Wiley  Keamanan Sistem Informasi Berbasis Internet – Budi Raharjo – 2002