NETWORK SECURITY
Jupriyadi, S.Kom. M.T.
jupriyadi@teknokrat.ac.id
Bandarlampung, Februari 2020
https://spada.teknokrat.ac.id
Chapter 2
Information Security Model
Information Security Properties
Information State
Security Measure
Information Security Model
Information Security Certifications
 GIAC Security Essentials Certification (GSEC)
 ComTIA Security+
  Certified Information Security Manager (CISM)
 The CISM credential was introduced to security professionals in
2003 by Information Systems Audit and Control Association, also
known as ISACA
 Certified Information Systems Auditor (CISA)
 Certified in the Governance of Enterprise IT (CGEIT)
 Certified in Risk and Information Systems Control certification (CRISC)
 Certified Information Systems Security Professional (CISSP)
 The Certified Ethical Hacker (CEH)
 Etc..
• As most people know, Information Technology (IT) Security 
is all about information and protecting it. However, to protect 
the data, you need to know what is type of protection it 
needs. Protecting data on your publicly viewed web site isn’t 
the same as protecting your payroll data. One, you want 
people to see it, and the other, only a few people can see it. 
This is where the data types come into play, and will be the 
first item that needs covered.
Question
•Are there any system with 100% 
secure…..???
Question
•How to make a system with 
100% secure….???
Simple Case :
How to secure your house
Accessability vs Security
What are the four data types?
 Public
 Internal (Private)
 Confidential
 Secret
Why Is Computer and
Network Security Important?
 To protect company assets:
 To gain a competitive advantage:
 To comply with regulatory requirements 
and fiduciary responsibilities
The Security Trinity
Primary Goals of a Good
Security System
 Protect Confidentiality
 Private information is kept private
 Ensure Data Integrity
 Prevent data from being inappropriately changed or deleted
 Ensure Data Availability
 Services are available and uninterrupted
 Data can be accessed
 Data can be restored quickly
Security Based on System
Element
 Network Security
 Application Security
 Computer Security
What's Next ?

Chapter 1 introduction to security