SlideShare a Scribd company logo
Penggunaan Perisian Terbuka Untuk Keselamatan Rangkaian Seminar Keselamatan Rangkaian 25 Mei 2007
[object Object],[object Object],[object Object],Agenda
[object Object],[object Object],Isu-isu Semasa
[object Object],[object Object],[object Object],Isu-Isu Semasa
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Kesan Akibat Isu
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Kesan Akibat Pencerobohan
[object Object],[object Object],Kesan Akibat Pencerobohan
[object Object],[object Object],[object Object],[object Object],Anda Perlu Tahu
[object Object],[object Object],[object Object],[object Object],Persediaan Kita
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ancaman Keselamatan
[object Object],[object Object],[object Object],[object Object],[object Object],Punca Ancaman
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ancaman Secara Bersahaja
[object Object],[object Object],[object Object],[object Object],[object Object],Kelemahan Manusia Adalah Ancaman
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Serangan Daripada Dalam
[object Object],[object Object],[object Object],Ralat Daripada Aplikasi
[object Object],[object Object],[object Object],[object Object],Ralat Daripada Aplikasi
[object Object],[object Object],[object Object],Lebih ke Depan Daripada Musuh
[object Object],[object Object],[object Object],GCERT
[object Object],[object Object],[object Object],[object Object],GCERT
[object Object],[object Object],NISER
http://www.sans.org/ SANS Institute http://www.sans.org/top20/ http://www.cisecurity.org/ Center for Internet Security http://packetstormsecurity.org/ Know Your Enemy http://www.cert.org/certcc.html CERT® Coordination Center (CERT/CC) Rujukan Lain
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Sediakan Perlindungan
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewall  Sambungan
[object Object],[object Object],[object Object],[object Object],Bina  Firewall  Anda Sendiri
[object Object],[object Object],Bina Dinding Api Anda Sendiri
[object Object],[object Object],[object Object],Pasang Sedia Ada
[object Object],[object Object],[object Object],Audit Server dan Rangkaian Anda Sendiri
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Audit Untuk Server
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Audit Rangkaian
[object Object],[object Object],[object Object],[object Object],[object Object],Pengesan di Server dan Rangkaian
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Pengesan di Server dan Rangkaian
Network Intrusion Detection System (NIDS) Snort http://www.snort.org/ Bro http://www.bro-ids.org/ Memasang pengesan di Server dan rangkaian
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Penapisan SPAM
[object Object],[object Object],[object Object],[object Object],Penapisan Laman Web
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Perisian Untuk Desktop
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Perisian Untuk Desktop
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Alatan Yang digunakan oleh Hacker
Muat turun slide di  http://opensource.mampu.gov.my/ Harisfazillah Jamel linuxmalaysia @ gmail.com http://blog.harisfazillah.info/ http://linuxmalaysia.harisfazillah.info/ TERIMA KASIH

More Related Content

What's hot

Sucik puji utami, hapzi ali, mencegah sistem informasi dari gangguan hacker, ...
Sucik puji utami, hapzi ali, mencegah sistem informasi dari gangguan hacker, ...Sucik puji utami, hapzi ali, mencegah sistem informasi dari gangguan hacker, ...
Sucik puji utami, hapzi ali, mencegah sistem informasi dari gangguan hacker, ...
SUCIK PUJI UTAMI
 
Virus, trojan, dan worm
Virus, trojan, dan wormVirus, trojan, dan worm
Virus, trojan, dan wormWiralfi Tasnim
 
Sim, saeful akhyar,prof.dr.hapzi ali,mm,cma, keamanan sisitem informasi , uni...
Sim, saeful akhyar,prof.dr.hapzi ali,mm,cma, keamanan sisitem informasi , uni...Sim, saeful akhyar,prof.dr.hapzi ali,mm,cma, keamanan sisitem informasi , uni...
Sim, saeful akhyar,prof.dr.hapzi ali,mm,cma, keamanan sisitem informasi , uni...
Saeful Akhyar
 
Sistem Keamanan Komputer.PDF
Sistem Keamanan Komputer.PDFSistem Keamanan Komputer.PDF
Sistem Keamanan Komputer.PDFNurdin Al-Azies
 
Panduan keselamatan ict
Panduan keselamatan ictPanduan keselamatan ict
Panduan keselamatan ict
Jefree Accon
 
Serangan dalam Internet
Serangan dalam InternetSerangan dalam Internet
Serangan dalam Internet
Juukyu
 
SIM, Lia Eka Nurrahmawati , Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...
SIM, Lia Eka Nurrahmawati , Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...SIM, Lia Eka Nurrahmawati , Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...
SIM, Lia Eka Nurrahmawati , Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...
LiaEka1412
 
Slide Keselamatan Wireless Utmm
Slide Keselamatan Wireless UtmmSlide Keselamatan Wireless Utmm
Slide Keselamatan Wireless Utmm
Linuxmalaysia Malaysia
 
SIM, Suryo Aji Saputro, Prof. Dr. Hapzi Ali, M.M, Keamanan Sistem Informasi, ...
SIM, Suryo Aji Saputro, Prof. Dr. Hapzi Ali, M.M, Keamanan Sistem Informasi, ...SIM, Suryo Aji Saputro, Prof. Dr. Hapzi Ali, M.M, Keamanan Sistem Informasi, ...
SIM, Suryo Aji Saputro, Prof. Dr. Hapzi Ali, M.M, Keamanan Sistem Informasi, ...
Suryo Aji Saputro
 
Presentasi web security
Presentasi web securityPresentasi web security
Presentasi web security
inyonoel
 
Materi Firewell
Materi Firewell Materi Firewell
Materi Firewell febryanism
 
Langkah langkah mengamankan sistem komputer
Langkah langkah mengamankan sistem komputerLangkah langkah mengamankan sistem komputer
Langkah langkah mengamankan sistem komputer
EniTrihandayani
 
Sim, ester, hapzi ali, keamanan sistem informasi, universitas mercu buana, 20...
Sim, ester, hapzi ali, keamanan sistem informasi, universitas mercu buana, 20...Sim, ester, hapzi ali, keamanan sistem informasi, universitas mercu buana, 20...
Sim, ester, hapzi ali, keamanan sistem informasi, universitas mercu buana, 20...
EsTer Rajagukguk
 
SIM10, Dea Aulia, Prof. Dr. Ir. H. Hapzi Ali, MM, CMA, Keamanan Sistem Inform...
SIM10, Dea Aulia, Prof. Dr. Ir. H. Hapzi Ali, MM, CMA, Keamanan Sistem Inform...SIM10, Dea Aulia, Prof. Dr. Ir. H. Hapzi Ali, MM, CMA, Keamanan Sistem Inform...
SIM10, Dea Aulia, Prof. Dr. Ir. H. Hapzi Ali, MM, CMA, Keamanan Sistem Inform...
Dea Aulia
 
Sim, bunga lahir wana, prof. dr. hapzi ali, keamanan sistem informasi, mercub...
Sim, bunga lahir wana, prof. dr. hapzi ali, keamanan sistem informasi, mercub...Sim, bunga lahir wana, prof. dr. hapzi ali, keamanan sistem informasi, mercub...
Sim, bunga lahir wana, prof. dr. hapzi ali, keamanan sistem informasi, mercub...
bunga lahir wana
 
Sim, aswi ruhana, hapzi ali, s1 akuntansi, keamanan sistem informasi, univers...
Sim, aswi ruhana, hapzi ali, s1 akuntansi, keamanan sistem informasi, univers...Sim, aswi ruhana, hapzi ali, s1 akuntansi, keamanan sistem informasi, univers...
Sim, aswi ruhana, hapzi ali, s1 akuntansi, keamanan sistem informasi, univers...
aswi ruhana
 
Jaringan komputer pti
Jaringan komputer ptiJaringan komputer pti
Jaringan komputer ptiAIHANA11
 

What's hot (17)

Sucik puji utami, hapzi ali, mencegah sistem informasi dari gangguan hacker, ...
Sucik puji utami, hapzi ali, mencegah sistem informasi dari gangguan hacker, ...Sucik puji utami, hapzi ali, mencegah sistem informasi dari gangguan hacker, ...
Sucik puji utami, hapzi ali, mencegah sistem informasi dari gangguan hacker, ...
 
Virus, trojan, dan worm
Virus, trojan, dan wormVirus, trojan, dan worm
Virus, trojan, dan worm
 
Sim, saeful akhyar,prof.dr.hapzi ali,mm,cma, keamanan sisitem informasi , uni...
Sim, saeful akhyar,prof.dr.hapzi ali,mm,cma, keamanan sisitem informasi , uni...Sim, saeful akhyar,prof.dr.hapzi ali,mm,cma, keamanan sisitem informasi , uni...
Sim, saeful akhyar,prof.dr.hapzi ali,mm,cma, keamanan sisitem informasi , uni...
 
Sistem Keamanan Komputer.PDF
Sistem Keamanan Komputer.PDFSistem Keamanan Komputer.PDF
Sistem Keamanan Komputer.PDF
 
Panduan keselamatan ict
Panduan keselamatan ictPanduan keselamatan ict
Panduan keselamatan ict
 
Serangan dalam Internet
Serangan dalam InternetSerangan dalam Internet
Serangan dalam Internet
 
SIM, Lia Eka Nurrahmawati , Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...
SIM, Lia Eka Nurrahmawati , Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...SIM, Lia Eka Nurrahmawati , Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...
SIM, Lia Eka Nurrahmawati , Prof. Dr. Ir. Hapzi Ali, MM, CMA, Keamanan Sistem...
 
Slide Keselamatan Wireless Utmm
Slide Keselamatan Wireless UtmmSlide Keselamatan Wireless Utmm
Slide Keselamatan Wireless Utmm
 
SIM, Suryo Aji Saputro, Prof. Dr. Hapzi Ali, M.M, Keamanan Sistem Informasi, ...
SIM, Suryo Aji Saputro, Prof. Dr. Hapzi Ali, M.M, Keamanan Sistem Informasi, ...SIM, Suryo Aji Saputro, Prof. Dr. Hapzi Ali, M.M, Keamanan Sistem Informasi, ...
SIM, Suryo Aji Saputro, Prof. Dr. Hapzi Ali, M.M, Keamanan Sistem Informasi, ...
 
Presentasi web security
Presentasi web securityPresentasi web security
Presentasi web security
 
Materi Firewell
Materi Firewell Materi Firewell
Materi Firewell
 
Langkah langkah mengamankan sistem komputer
Langkah langkah mengamankan sistem komputerLangkah langkah mengamankan sistem komputer
Langkah langkah mengamankan sistem komputer
 
Sim, ester, hapzi ali, keamanan sistem informasi, universitas mercu buana, 20...
Sim, ester, hapzi ali, keamanan sistem informasi, universitas mercu buana, 20...Sim, ester, hapzi ali, keamanan sistem informasi, universitas mercu buana, 20...
Sim, ester, hapzi ali, keamanan sistem informasi, universitas mercu buana, 20...
 
SIM10, Dea Aulia, Prof. Dr. Ir. H. Hapzi Ali, MM, CMA, Keamanan Sistem Inform...
SIM10, Dea Aulia, Prof. Dr. Ir. H. Hapzi Ali, MM, CMA, Keamanan Sistem Inform...SIM10, Dea Aulia, Prof. Dr. Ir. H. Hapzi Ali, MM, CMA, Keamanan Sistem Inform...
SIM10, Dea Aulia, Prof. Dr. Ir. H. Hapzi Ali, MM, CMA, Keamanan Sistem Inform...
 
Sim, bunga lahir wana, prof. dr. hapzi ali, keamanan sistem informasi, mercub...
Sim, bunga lahir wana, prof. dr. hapzi ali, keamanan sistem informasi, mercub...Sim, bunga lahir wana, prof. dr. hapzi ali, keamanan sistem informasi, mercub...
Sim, bunga lahir wana, prof. dr. hapzi ali, keamanan sistem informasi, mercub...
 
Sim, aswi ruhana, hapzi ali, s1 akuntansi, keamanan sistem informasi, univers...
Sim, aswi ruhana, hapzi ali, s1 akuntansi, keamanan sistem informasi, univers...Sim, aswi ruhana, hapzi ali, s1 akuntansi, keamanan sistem informasi, univers...
Sim, aswi ruhana, hapzi ali, s1 akuntansi, keamanan sistem informasi, univers...
 
Jaringan komputer pti
Jaringan komputer ptiJaringan komputer pti
Jaringan komputer pti
 

Viewers also liked

Sesuaikan Masa Sempena 2010
Sesuaikan Masa Sempena 2010Sesuaikan Masa Sempena 2010
Sesuaikan Masa Sempena 2010
Linuxmalaysia Malaysia
 
DNS solution trumps cloud computing competition
DNS solution trumps cloud computing competitionDNS solution trumps cloud computing competition
DNS solution trumps cloud computing competition
Linuxmalaysia Malaysia
 
Sponsorship Prospectus Malaysia Open Source Conference 2012 (MOSC2012)
Sponsorship Prospectus Malaysia Open Source Conference 2012  (MOSC2012)Sponsorship Prospectus Malaysia Open Source Conference 2012  (MOSC2012)
Sponsorship Prospectus Malaysia Open Source Conference 2012 (MOSC2012)
Linuxmalaysia Malaysia
 
Mapping A Disaster
Mapping A DisasterMapping A Disaster
Mapping A Disaster
Linuxmalaysia Malaysia
 
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...
Linuxmalaysia Malaysia
 
Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...
Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...
Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...
Linuxmalaysia Malaysia
 

Viewers also liked (6)

Sesuaikan Masa Sempena 2010
Sesuaikan Masa Sempena 2010Sesuaikan Masa Sempena 2010
Sesuaikan Masa Sempena 2010
 
DNS solution trumps cloud computing competition
DNS solution trumps cloud computing competitionDNS solution trumps cloud computing competition
DNS solution trumps cloud computing competition
 
Sponsorship Prospectus Malaysia Open Source Conference 2012 (MOSC2012)
Sponsorship Prospectus Malaysia Open Source Conference 2012  (MOSC2012)Sponsorship Prospectus Malaysia Open Source Conference 2012  (MOSC2012)
Sponsorship Prospectus Malaysia Open Source Conference 2012 (MOSC2012)
 
Mapping A Disaster
Mapping A DisasterMapping A Disaster
Mapping A Disaster
 
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...
Call For Speakers Malaysia Open Source Conference 2014 (MOSCMY 2014 - MOSCMY2...
 
Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...
Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...
Big Data - Harisfazillah Jamel - Startup and Developer 4th Meetup 5th Novembe...
 

Similar to Slide Keselamatan Ict Melaka Spoof Melaka 2007 (malay)

Sistem keamanan komputer
Sistem keamanan komputerSistem keamanan komputer
Sistem keamanan komputer
Rhusman 05
 
Sistem keamanan komputer
Sistem keamanan komputerSistem keamanan komputer
Sistem keamanan komputerRhusman 05
 
10, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univer...
10, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univer...10, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univer...
10, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univer...
Yuni Rahmayani
 
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...
dewizulfah
 
SI & PI, Novian Risqi Nur Utami, Hapzi Ali, jenis jenis penyerangan dan penya...
SI & PI, Novian Risqi Nur Utami, Hapzi Ali, jenis jenis penyerangan dan penya...SI & PI, Novian Risqi Nur Utami, Hapzi Ali, jenis jenis penyerangan dan penya...
SI & PI, Novian Risqi Nur Utami, Hapzi Ali, jenis jenis penyerangan dan penya...
Novian Risqi Nur Utami
 
SIM, Sefty Echamawaty, Hapzi Ali, Keamanan Sistem Informasi, Universitas Merc...
SIM, Sefty Echamawaty, Hapzi Ali, Keamanan Sistem Informasi, Universitas Merc...SIM, Sefty Echamawaty, Hapzi Ali, Keamanan Sistem Informasi, Universitas Merc...
SIM, Sefty Echamawaty, Hapzi Ali, Keamanan Sistem Informasi, Universitas Merc...
Ekaaase
 
Sim,desi panjaitan,hapzi ali,keamanan sistem informasi
Sim,desi panjaitan,hapzi ali,keamanan sistem informasiSim,desi panjaitan,hapzi ali,keamanan sistem informasi
Sim,desi panjaitan,hapzi ali,keamanan sistem informasi
Desi Panjaitan
 
2, si & pi,mislia, hapzi ali, si definisi dan jenis penyerangan dan penya...
2, si & pi,mislia, hapzi ali, si definisi dan jenis penyerangan dan penya...2, si & pi,mislia, hapzi ali, si definisi dan jenis penyerangan dan penya...
2, si & pi,mislia, hapzi ali, si definisi dan jenis penyerangan dan penya...
Mislia lia
 
07. SI-PI, Gusti Ketut Suardika, Hapzi Ali, Melindung SI Konsep dan Komponen ...
07. SI-PI, Gusti Ketut Suardika, Hapzi Ali, Melindung SI Konsep dan Komponen ...07. SI-PI, Gusti Ketut Suardika, Hapzi Ali, Melindung SI Konsep dan Komponen ...
07. SI-PI, Gusti Ketut Suardika, Hapzi Ali, Melindung SI Konsep dan Komponen ...
Gusti_Ketut_Suardika
 
Paper system keamanan skype
Paper system keamanan skypePaper system keamanan skype
Paper system keamanan skype
Meirza Rudyanto
 
Tugas sim, pratiwi rosantry,yananto mihadi putra,se, m.si, sumber daya komput...
Tugas sim, pratiwi rosantry,yananto mihadi putra,se, m.si, sumber daya komput...Tugas sim, pratiwi rosantry,yananto mihadi putra,se, m.si, sumber daya komput...
Tugas sim, pratiwi rosantry,yananto mihadi putra,se, m.si, sumber daya komput...
Pratiwi Rosantry
 
Sim.nurlelah,prof.dr.ir.hapzi ali,mm,cma,keamanan sistem informasi,universita...
Sim.nurlelah,prof.dr.ir.hapzi ali,mm,cma,keamanan sistem informasi,universita...Sim.nurlelah,prof.dr.ir.hapzi ali,mm,cma,keamanan sistem informasi,universita...
Sim.nurlelah,prof.dr.ir.hapzi ali,mm,cma,keamanan sistem informasi,universita...
Nurlelah Nurlelah
 
TB-1 SIM-Sub-CPMK 9 Perlindungan Sistem Informasi
TB-1 SIM-Sub-CPMK 9 Perlindungan Sistem InformasiTB-1 SIM-Sub-CPMK 9 Perlindungan Sistem Informasi
TB-1 SIM-Sub-CPMK 9 Perlindungan Sistem Informasi
Nugroho Chairul Rozaq
 
Cara mendesain sistem keamanan jaringan
Cara mendesain sistem keamanan jaringanCara mendesain sistem keamanan jaringan
Cara mendesain sistem keamanan jaringan
Warnet Raha
 
Materi Pekan 7 Netinf.pdf
Materi Pekan 7 Netinf.pdfMateri Pekan 7 Netinf.pdf
Materi Pekan 7 Netinf.pdf
amelana121
 
Keamanan jaringan
Keamanan jaringanKeamanan jaringan
Keamanan jaringanlazarus0306
 
SIM, MEGA AMBAR LUTFIA, PROF Dr. HAFZI ALI,CARA MENCEGAH DAN MENAGGULANGI HAC...
SIM, MEGA AMBAR LUTFIA, PROF Dr. HAFZI ALI,CARA MENCEGAH DAN MENAGGULANGI HAC...SIM, MEGA AMBAR LUTFIA, PROF Dr. HAFZI ALI,CARA MENCEGAH DAN MENAGGULANGI HAC...
SIM, MEGA AMBAR LUTFIA, PROF Dr. HAFZI ALI,CARA MENCEGAH DAN MENAGGULANGI HAC...
SIM MEGA AMBAR LUTFIA
 
Sim, nurfanida putri hikmalia, hapzi ali,information security,universitas mer...
Sim, nurfanida putri hikmalia, hapzi ali,information security,universitas mer...Sim, nurfanida putri hikmalia, hapzi ali,information security,universitas mer...
Sim, nurfanida putri hikmalia, hapzi ali,information security,universitas mer...
Nurfanida Hikmalia
 
Vulnerability scaning keamanan jaringan
Vulnerability scaning keamanan jaringanVulnerability scaning keamanan jaringan
Vulnerability scaning keamanan jaringanBram Abang
 
Keamanan jaringan
Keamanan jaringanKeamanan jaringan
Keamanan jaringanlazarus0306
 

Similar to Slide Keselamatan Ict Melaka Spoof Melaka 2007 (malay) (20)

Sistem keamanan komputer
Sistem keamanan komputerSistem keamanan komputer
Sistem keamanan komputer
 
Sistem keamanan komputer
Sistem keamanan komputerSistem keamanan komputer
Sistem keamanan komputer
 
10, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univer...
10, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univer...10, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univer...
10, sim, yuni rahmayani, hapzi ali, cara mengatasi hacker, mercu buana univer...
 
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...
 
SI & PI, Novian Risqi Nur Utami, Hapzi Ali, jenis jenis penyerangan dan penya...
SI & PI, Novian Risqi Nur Utami, Hapzi Ali, jenis jenis penyerangan dan penya...SI & PI, Novian Risqi Nur Utami, Hapzi Ali, jenis jenis penyerangan dan penya...
SI & PI, Novian Risqi Nur Utami, Hapzi Ali, jenis jenis penyerangan dan penya...
 
SIM, Sefty Echamawaty, Hapzi Ali, Keamanan Sistem Informasi, Universitas Merc...
SIM, Sefty Echamawaty, Hapzi Ali, Keamanan Sistem Informasi, Universitas Merc...SIM, Sefty Echamawaty, Hapzi Ali, Keamanan Sistem Informasi, Universitas Merc...
SIM, Sefty Echamawaty, Hapzi Ali, Keamanan Sistem Informasi, Universitas Merc...
 
Sim,desi panjaitan,hapzi ali,keamanan sistem informasi
Sim,desi panjaitan,hapzi ali,keamanan sistem informasiSim,desi panjaitan,hapzi ali,keamanan sistem informasi
Sim,desi panjaitan,hapzi ali,keamanan sistem informasi
 
2, si & pi,mislia, hapzi ali, si definisi dan jenis penyerangan dan penya...
2, si & pi,mislia, hapzi ali, si definisi dan jenis penyerangan dan penya...2, si & pi,mislia, hapzi ali, si definisi dan jenis penyerangan dan penya...
2, si & pi,mislia, hapzi ali, si definisi dan jenis penyerangan dan penya...
 
07. SI-PI, Gusti Ketut Suardika, Hapzi Ali, Melindung SI Konsep dan Komponen ...
07. SI-PI, Gusti Ketut Suardika, Hapzi Ali, Melindung SI Konsep dan Komponen ...07. SI-PI, Gusti Ketut Suardika, Hapzi Ali, Melindung SI Konsep dan Komponen ...
07. SI-PI, Gusti Ketut Suardika, Hapzi Ali, Melindung SI Konsep dan Komponen ...
 
Paper system keamanan skype
Paper system keamanan skypePaper system keamanan skype
Paper system keamanan skype
 
Tugas sim, pratiwi rosantry,yananto mihadi putra,se, m.si, sumber daya komput...
Tugas sim, pratiwi rosantry,yananto mihadi putra,se, m.si, sumber daya komput...Tugas sim, pratiwi rosantry,yananto mihadi putra,se, m.si, sumber daya komput...
Tugas sim, pratiwi rosantry,yananto mihadi putra,se, m.si, sumber daya komput...
 
Sim.nurlelah,prof.dr.ir.hapzi ali,mm,cma,keamanan sistem informasi,universita...
Sim.nurlelah,prof.dr.ir.hapzi ali,mm,cma,keamanan sistem informasi,universita...Sim.nurlelah,prof.dr.ir.hapzi ali,mm,cma,keamanan sistem informasi,universita...
Sim.nurlelah,prof.dr.ir.hapzi ali,mm,cma,keamanan sistem informasi,universita...
 
TB-1 SIM-Sub-CPMK 9 Perlindungan Sistem Informasi
TB-1 SIM-Sub-CPMK 9 Perlindungan Sistem InformasiTB-1 SIM-Sub-CPMK 9 Perlindungan Sistem Informasi
TB-1 SIM-Sub-CPMK 9 Perlindungan Sistem Informasi
 
Cara mendesain sistem keamanan jaringan
Cara mendesain sistem keamanan jaringanCara mendesain sistem keamanan jaringan
Cara mendesain sistem keamanan jaringan
 
Materi Pekan 7 Netinf.pdf
Materi Pekan 7 Netinf.pdfMateri Pekan 7 Netinf.pdf
Materi Pekan 7 Netinf.pdf
 
Keamanan jaringan
Keamanan jaringanKeamanan jaringan
Keamanan jaringan
 
SIM, MEGA AMBAR LUTFIA, PROF Dr. HAFZI ALI,CARA MENCEGAH DAN MENAGGULANGI HAC...
SIM, MEGA AMBAR LUTFIA, PROF Dr. HAFZI ALI,CARA MENCEGAH DAN MENAGGULANGI HAC...SIM, MEGA AMBAR LUTFIA, PROF Dr. HAFZI ALI,CARA MENCEGAH DAN MENAGGULANGI HAC...
SIM, MEGA AMBAR LUTFIA, PROF Dr. HAFZI ALI,CARA MENCEGAH DAN MENAGGULANGI HAC...
 
Sim, nurfanida putri hikmalia, hapzi ali,information security,universitas mer...
Sim, nurfanida putri hikmalia, hapzi ali,information security,universitas mer...Sim, nurfanida putri hikmalia, hapzi ali,information security,universitas mer...
Sim, nurfanida putri hikmalia, hapzi ali,information security,universitas mer...
 
Vulnerability scaning keamanan jaringan
Vulnerability scaning keamanan jaringanVulnerability scaning keamanan jaringan
Vulnerability scaning keamanan jaringan
 
Keamanan jaringan
Keamanan jaringanKeamanan jaringan
Keamanan jaringan
 

More from Linuxmalaysia Malaysia

Malaysia Open Source Conference MOSCMY 2013 Itinerary And Streams MOSC2013 a...
Malaysia Open Source Conference MOSCMY 2013  Itinerary And Streams MOSC2013 a...Malaysia Open Source Conference MOSCMY 2013  Itinerary And Streams MOSC2013 a...
Malaysia Open Source Conference MOSCMY 2013 Itinerary And Streams MOSC2013 a...
Linuxmalaysia Malaysia
 
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
Linuxmalaysia Malaysia
 
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochureBrochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
Linuxmalaysia Malaysia
 
Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)
Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)
Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)
Linuxmalaysia Malaysia
 
FOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysia
FOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysiaFOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysia
FOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysiaLinuxmalaysia Malaysia
 
Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...
Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...
Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...
Linuxmalaysia Malaysia
 
OSS Community Forum Regarding Proposed BCPM2011 SWOT Slide
OSS Community Forum Regarding Proposed BCPM2011 SWOT SlideOSS Community Forum Regarding Proposed BCPM2011 SWOT Slide
OSS Community Forum Regarding Proposed BCPM2011 SWOT Slide
Linuxmalaysia Malaysia
 
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011Linuxmalaysia Malaysia
 
Building Smart Phone Web Apps MOSC2010 Bikesh iTrain
Building Smart Phone Web Apps MOSC2010 Bikesh iTrainBuilding Smart Phone Web Apps MOSC2010 Bikesh iTrain
Building Smart Phone Web Apps MOSC2010 Bikesh iTrain
Linuxmalaysia Malaysia
 
OSDC.my Master Plan For Malaysia Open Source Community
OSDC.my Master Plan For Malaysia Open Source CommunityOSDC.my Master Plan For Malaysia Open Source Community
OSDC.my Master Plan For Malaysia Open Source Community
Linuxmalaysia Malaysia
 
33853955 bikesh-beginning-smart-phone-web-development
33853955 bikesh-beginning-smart-phone-web-development33853955 bikesh-beginning-smart-phone-web-development
33853955 bikesh-beginning-smart-phone-web-developmentLinuxmalaysia Malaysia
 
Open Source Tools for Creating Mashups with Government Datasets MOSC2010
Open Source Tools for Creating Mashups with Government Datasets MOSC2010Open Source Tools for Creating Mashups with Government Datasets MOSC2010
Open Source Tools for Creating Mashups with Government Datasets MOSC2010
Linuxmalaysia Malaysia
 
Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)
Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)
Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)
Linuxmalaysia Malaysia
 
Benchmarking On Web Server For Budget 2008 Day
Benchmarking On  Web  Server For  Budget 2008  DayBenchmarking On  Web  Server For  Budget 2008  Day
Benchmarking On Web Server For Budget 2008 Day
Linuxmalaysia Malaysia
 
OSS Community In Malaysia 2009 List
OSS Community In Malaysia 2009 ListOSS Community In Malaysia 2009 List
OSS Community In Malaysia 2009 List
Linuxmalaysia Malaysia
 
List Of OSS Communities Malaysia 2009
List Of OSS Communities Malaysia 2009List Of OSS Communities Malaysia 2009
List Of OSS Communities Malaysia 2009
Linuxmalaysia Malaysia
 
OSCC MAMPU Oct-Nov 2009 E-Newsletter
OSCC MAMPU Oct-Nov 2009 E-NewsletterOSCC MAMPU Oct-Nov 2009 E-Newsletter
OSCC MAMPU Oct-Nov 2009 E-Newsletter
Linuxmalaysia Malaysia
 
Ramadan Slides Prepared by Shell Middle East & North Africa Network
Ramadan Slides Prepared by Shell Middle East & North Africa NetworkRamadan Slides Prepared by Shell Middle East & North Africa Network
Ramadan Slides Prepared by Shell Middle East & North Africa Network
Linuxmalaysia Malaysia
 
OSCC MAMPU Malaysia June 2009 E Newsletter
OSCC MAMPU Malaysia June 2009 E NewsletterOSCC MAMPU Malaysia June 2009 E Newsletter
OSCC MAMPU Malaysia June 2009 E Newsletter
Linuxmalaysia Malaysia
 
OSCC MAMPU Malaysia May 2009 E Newsletter
OSCC MAMPU Malaysia May 2009 E NewsletterOSCC MAMPU Malaysia May 2009 E Newsletter
OSCC MAMPU Malaysia May 2009 E Newsletter
Linuxmalaysia Malaysia
 

More from Linuxmalaysia Malaysia (20)

Malaysia Open Source Conference MOSCMY 2013 Itinerary And Streams MOSC2013 a...
Malaysia Open Source Conference MOSCMY 2013  Itinerary And Streams MOSC2013 a...Malaysia Open Source Conference MOSCMY 2013  Itinerary And Streams MOSC2013 a...
Malaysia Open Source Conference MOSCMY 2013 Itinerary And Streams MOSC2013 a...
 
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
MOSC2013 MOSCMY Brochure Malaysia Open Source Conference 2013
 
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochureBrochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
Brochure Malaysia Open Source Conference 2013 MOSCMY 2013 (MOSC2013) brochure
 
Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)
Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)
Hala Tuju Kemahiran Keselamatan Komputer Dan Internet (ICT)
 
FOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysia
FOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysiaFOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysia
FOSSDAY@IIUM 2012 Cloud Presentation By LinuxMalaysia
 
Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...
Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...
Questionnaire For Establishment Of Board of Computing Professionals Malaysia ...
 
OSS Community Forum Regarding Proposed BCPM2011 SWOT Slide
OSS Community Forum Regarding Proposed BCPM2011 SWOT SlideOSS Community Forum Regarding Proposed BCPM2011 SWOT Slide
OSS Community Forum Regarding Proposed BCPM2011 SWOT Slide
 
Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011Introduction To ICT Security Audit OWASP Day Malaysia 2011
Introduction To ICT Security Audit OWASP Day Malaysia 2011
 
Building Smart Phone Web Apps MOSC2010 Bikesh iTrain
Building Smart Phone Web Apps MOSC2010 Bikesh iTrainBuilding Smart Phone Web Apps MOSC2010 Bikesh iTrain
Building Smart Phone Web Apps MOSC2010 Bikesh iTrain
 
OSDC.my Master Plan For Malaysia Open Source Community
OSDC.my Master Plan For Malaysia Open Source CommunityOSDC.my Master Plan For Malaysia Open Source Community
OSDC.my Master Plan For Malaysia Open Source Community
 
33853955 bikesh-beginning-smart-phone-web-development
33853955 bikesh-beginning-smart-phone-web-development33853955 bikesh-beginning-smart-phone-web-development
33853955 bikesh-beginning-smart-phone-web-development
 
Open Source Tools for Creating Mashups with Government Datasets MOSC2010
Open Source Tools for Creating Mashups with Government Datasets MOSC2010Open Source Tools for Creating Mashups with Government Datasets MOSC2010
Open Source Tools for Creating Mashups with Government Datasets MOSC2010
 
Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)
Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)
Brochure MSC Malaysia Open Source Conference 2010 (MSC MOSC2010)
 
Benchmarking On Web Server For Budget 2008 Day
Benchmarking On  Web  Server For  Budget 2008  DayBenchmarking On  Web  Server For  Budget 2008  Day
Benchmarking On Web Server For Budget 2008 Day
 
OSS Community In Malaysia 2009 List
OSS Community In Malaysia 2009 ListOSS Community In Malaysia 2009 List
OSS Community In Malaysia 2009 List
 
List Of OSS Communities Malaysia 2009
List Of OSS Communities Malaysia 2009List Of OSS Communities Malaysia 2009
List Of OSS Communities Malaysia 2009
 
OSCC MAMPU Oct-Nov 2009 E-Newsletter
OSCC MAMPU Oct-Nov 2009 E-NewsletterOSCC MAMPU Oct-Nov 2009 E-Newsletter
OSCC MAMPU Oct-Nov 2009 E-Newsletter
 
Ramadan Slides Prepared by Shell Middle East & North Africa Network
Ramadan Slides Prepared by Shell Middle East & North Africa NetworkRamadan Slides Prepared by Shell Middle East & North Africa Network
Ramadan Slides Prepared by Shell Middle East & North Africa Network
 
OSCC MAMPU Malaysia June 2009 E Newsletter
OSCC MAMPU Malaysia June 2009 E NewsletterOSCC MAMPU Malaysia June 2009 E Newsletter
OSCC MAMPU Malaysia June 2009 E Newsletter
 
OSCC MAMPU Malaysia May 2009 E Newsletter
OSCC MAMPU Malaysia May 2009 E NewsletterOSCC MAMPU Malaysia May 2009 E Newsletter
OSCC MAMPU Malaysia May 2009 E Newsletter
 

Slide Keselamatan Ict Melaka Spoof Melaka 2007 (malay)

  • 1. Penggunaan Perisian Terbuka Untuk Keselamatan Rangkaian Seminar Keselamatan Rangkaian 25 Mei 2007
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. http://www.sans.org/ SANS Institute http://www.sans.org/top20/ http://www.cisecurity.org/ Center for Internet Security http://packetstormsecurity.org/ Know Your Enemy http://www.cert.org/certcc.html CERT® Coordination Center (CERT/CC) Rujukan Lain
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. Network Intrusion Detection System (NIDS) Snort http://www.snort.org/ Bro http://www.bro-ids.org/ Memasang pengesan di Server dan rangkaian
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. Muat turun slide di http://opensource.mampu.gov.my/ Harisfazillah Jamel linuxmalaysia @ gmail.com http://blog.harisfazillah.info/ http://linuxmalaysia.harisfazillah.info/ TERIMA KASIH