Berikut ringkasan dari dokumen tersebut dalam 3 kalimat:
Dokumen tersebut membahas tentang kesadaran keamanan informasi, termasuk ancaman seperti phishing, malware, kelemahan password, dan penggunaan media removable yang tidak aman. Dianjurkan untuk selalu waspada terhadap email mencurigakan, situs web tidak dikenal, serta berhati-hati dalam berbagi informasi pribadi di internet. Keamanan informasi perlu menjadi perhatian ut
Dr. Barbara O'Neill and Carol Kando-Pineda, of the Federal Trade Commission, will present this 90-minute webinar on behalf of the Military Families Learning Network. This 90-minute webinar will include two sections: a general overview of identity theft and discussion about military-specific scams. Topics covered during the first section, presented by Dr. O’Neill, include a definition of identity theft, signs of identity theft, an identity theft risk assessment quiz, types of identity theft, how identity theft occurs, ways to reduce identity theft risk, phishing scams, proactive and reactive identity theft actions, and identity theft resources. Ms. Kando-Pineda plans to discuss getting help for identity theft victims, including the steps they need to take immediately, walking through the new features for consumers on Identitytheft.gov and how they help victims develop a recovery plan, get a heads-up on the latest “imposter” scams, and an update on the Military Consumer campaign and new resources on the way for the military community.
14 tips to increase cybersecurity awarenessMichel Bitter
We used this presentation within our company to increase the cybersecurity awareness of our employees. These 14 tips should help everybody to protect themselves against the most obvious cyber attacks.
This is a presentation that I shared with a group of College students on Cyber Security.
This was part of the Cyber Safe Tamil Nadu 2009 program organized jointly by NASSCOM, DSCI and the Tamil Nadu police.
Dr. Barbara O'Neill and Carol Kando-Pineda, of the Federal Trade Commission, will present this 90-minute webinar on behalf of the Military Families Learning Network. This 90-minute webinar will include two sections: a general overview of identity theft and discussion about military-specific scams. Topics covered during the first section, presented by Dr. O’Neill, include a definition of identity theft, signs of identity theft, an identity theft risk assessment quiz, types of identity theft, how identity theft occurs, ways to reduce identity theft risk, phishing scams, proactive and reactive identity theft actions, and identity theft resources. Ms. Kando-Pineda plans to discuss getting help for identity theft victims, including the steps they need to take immediately, walking through the new features for consumers on Identitytheft.gov and how they help victims develop a recovery plan, get a heads-up on the latest “imposter” scams, and an update on the Military Consumer campaign and new resources on the way for the military community.
14 tips to increase cybersecurity awarenessMichel Bitter
We used this presentation within our company to increase the cybersecurity awareness of our employees. These 14 tips should help everybody to protect themselves against the most obvious cyber attacks.
This is a presentation that I shared with a group of College students on Cyber Security.
This was part of the Cyber Safe Tamil Nadu 2009 program organized jointly by NASSCOM, DSCI and the Tamil Nadu police.
Information Security Awareness for everyoneYasir Nafees
SAFE (which stands for Security Awareness For Everyone) is an information security awareness program designed to help organizations creating a well informed and risk-aware culture. SAFE focuses on learning to make it important for everyone to be fully informed and take responsibility to protect organization’s most important asset, “The Information”.
Cyber Security Awareness introduction. Why is Cyber Security important? What do I have to do to protect me from Cyber attacks? How to create a IT Security Awareness Plan ?
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
Phishing is a top organizational security vulnerability because it involves the exploitation of human weakness. This ControlScan National Cyber Security Awareness Month presentation teaches employees how to spot and combat a phishing attack.
Social Engineering - Human aspects of grey and black competitive intelligence. What is social engineering? How it is used in the context of competitive intelligence and industrial espionage? How to recognize HUMINT / social engineering attacks? Which governments are known to use it?
A single email can cause a multi-million dollar breach if opened by an end-user with no security awareness, they may not even be aware of their mistake. The problem lies in the fact that only a few end-users are aware of the dangers of social engineering, much less how to detect it. It is a major issue in the business world today.
This document seeks to address the most common threats that can be posed to an entity and also recommend security measures that can be implemented to avoid such attacks.
Learn more at https://www.multinationalnetworks.com
Information security awareness is an essential part of your information security program (ISMS - Information Security Management System). You can find a comprehensive set of security policies and frameworks at https://templatesit.com.
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
I developed "Cyber Security 101: Training, awareness, strategies for small to medium sized business" for the second annual Small Business Summit on Security, Privacy, and Trust, co-hosted by ADP in New Jersey, October 2013.
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
Note: There is an updated version of this slide deck available on SlideShare at
https://www.slideshare.net/DallasHaselhorst/cybersecurity-awareness-training-presentation-v11
--
Do you want an cybersecurity awareness training you can present at *your* business or in *your* community? Awesome!
We spent months putting together this training presentation on cybersecurity awareness. We then presented it multiple times and continued modifying the presentation based on feedback from attendees as well as feedback from those in the information security community. We are now releasing this in the hope it is a call to action for others in their communities.
The slides are available for download on our website. Download it and please present it in your own communities, e.g. at your local library, business events, co-working spaces, schools, etc. We also have a free cybersecurity quiz available on the site that is also based on the material.
Download the latest version as a Microsoft PowerPoint presentation (.pptx) or 'Make a Copy' in Google Slides.
https://www.treetopsecurity.com/slides
Its is project based on one of the most interesting and wide topic of Computer Science, named Cyber Security
CONTENT :
1. What is Cyber Security
2. Why Cyber Security is Important
3. Brief History
4. Security Timeline
5. Architecture
6. Cyber Attack Methods
7. Technology for Cyber Secuirty
8. Development in Cyber Security
9. Future Trend in Cyber Security
Information Security Awareness for everyoneYasir Nafees
SAFE (which stands for Security Awareness For Everyone) is an information security awareness program designed to help organizations creating a well informed and risk-aware culture. SAFE focuses on learning to make it important for everyone to be fully informed and take responsibility to protect organization’s most important asset, “The Information”.
Cyber Security Awareness introduction. Why is Cyber Security important? What do I have to do to protect me from Cyber attacks? How to create a IT Security Awareness Plan ?
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
Phishing is a top organizational security vulnerability because it involves the exploitation of human weakness. This ControlScan National Cyber Security Awareness Month presentation teaches employees how to spot and combat a phishing attack.
Social Engineering - Human aspects of grey and black competitive intelligence. What is social engineering? How it is used in the context of competitive intelligence and industrial espionage? How to recognize HUMINT / social engineering attacks? Which governments are known to use it?
A single email can cause a multi-million dollar breach if opened by an end-user with no security awareness, they may not even be aware of their mistake. The problem lies in the fact that only a few end-users are aware of the dangers of social engineering, much less how to detect it. It is a major issue in the business world today.
This document seeks to address the most common threats that can be posed to an entity and also recommend security measures that can be implemented to avoid such attacks.
Learn more at https://www.multinationalnetworks.com
Information security awareness is an essential part of your information security program (ISMS - Information Security Management System). You can find a comprehensive set of security policies and frameworks at https://templatesit.com.
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
I developed "Cyber Security 101: Training, awareness, strategies for small to medium sized business" for the second annual Small Business Summit on Security, Privacy, and Trust, co-hosted by ADP in New Jersey, October 2013.
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
Note: There is an updated version of this slide deck available on SlideShare at
https://www.slideshare.net/DallasHaselhorst/cybersecurity-awareness-training-presentation-v11
--
Do you want an cybersecurity awareness training you can present at *your* business or in *your* community? Awesome!
We spent months putting together this training presentation on cybersecurity awareness. We then presented it multiple times and continued modifying the presentation based on feedback from attendees as well as feedback from those in the information security community. We are now releasing this in the hope it is a call to action for others in their communities.
The slides are available for download on our website. Download it and please present it in your own communities, e.g. at your local library, business events, co-working spaces, schools, etc. We also have a free cybersecurity quiz available on the site that is also based on the material.
Download the latest version as a Microsoft PowerPoint presentation (.pptx) or 'Make a Copy' in Google Slides.
https://www.treetopsecurity.com/slides
Its is project based on one of the most interesting and wide topic of Computer Science, named Cyber Security
CONTENT :
1. What is Cyber Security
2. Why Cyber Security is Important
3. Brief History
4. Security Timeline
5. Architecture
6. Cyber Attack Methods
7. Technology for Cyber Secuirty
8. Development in Cyber Security
9. Future Trend in Cyber Security
TUGAS BESAR 1 SISTEM INFORMASI MANAJEMEN UNIVERSITAS MERCU BUANA
Dosen Pengampu: Hapzi Ali, Prof, Dr, MM
Nama Anggota:
Sandy Rahman Hidayat (43219010020)
Nugroho Chairul Rozaq (43219010137)
Chapter 8 management information system 12th edition 2012 laudonYanick Iglesias
Rangkuman Chapter 8 Mengamankan sistem Informasi,
Dirangkum dan diterjemahkan dari buku Sistem Informasi Manajemen edisi 12, Kenneth C. Laudon, Jane P. Laudon
PDF Defensive Security V4 Linuxhackingid (New Version)Linuxhackingid
Official From Linuxhackingid
Defensive Security is a reactive approach to cybersecurity that focuses on protecting systems from cyberattacks and maintaining data confidentiality.
Objectives of PDF Defensive Security:
Building a Digital Fortress: Learn how to secure your systems, networks, and web applications from various cyber threats.
Master Security Strategy: Discover strategies and best practices to minimize the risk of attack and protect your sensitive data.
Become a Hardening Expert: Master techniques to strengthen your system's defenses and make it more resistant to attack
Materi webinar yang diselenggarakan oleh PHP Indonesia secara live di Facebook PHP-ID. Topik yang dibahas mengenai Machine Learning dengan PHP, baik sisi konsep maupun implementasinya.
Webinar Data Mining dengan Rapidminer | Universitas Budi LuhurAchmad Solichin
Materi Webinar Data Mining dengan Rapidminer di Universitas Budi Luhur yang diselenggarakan oleh mahasiswa S2 Ilmu Komputer Universitas Budi Luhur pada hari Jumat, 8 Januari 2021
TREN DAN IDE RISET BIDANG DATA MINING TERBARUAchmad Solichin
Presentasi ini menyajikan Tren dan Ide Riset Bidang DATA MINING Tahun ini. Wajib disimak! Disertai juga puluhan Contoh Paper Penelitian Terkini di bidang Data Mining. Saya menjelaskan banyak ide penelitian untuk skripsi, tesis, disertasi, dll. Simak sampe akhir ya.
Materi Seminar: Artificial Intelligence dengan PHPAchmad Solichin
Materi Seminar: Artificial Intelligence dengan PHP ini disampaikan pada Seminar online yang diselenggarakan oleh Lab ICT Universitas Budi Luhur pada hari Rabu, 12 Agustus 2020
Slide ini menjelaskan mengenai konsep dan langkah-langkah Algoritma Depth First Search (BFS) pada Graph.
Slide disusun oleh Achmad Solichin (http://achmatim.net)
Slide ini menjelaskan mengenai konsep dan langkah-langkah Algoritma Breadth First Search (BFS) pada Graph.
Slide disusun oleh Achmad Solichin | http://achmatim.net
Materi seminar ini menjelaskan mengenai konsep dasar computer vision dan aplikasinya di era Industri 4.0. Materi seminar ini disampaikan pada acara Seminar Tahunan IT yang diselenggarakan oleh Lab ICT Universitas Budi Luhur
Sebuah buku foto yang berjudul Lensa Kampung Ondel-Ondelferrydmn1999
Indonesia, negara kepulauan yang kaya akan keragaman budaya, suku, dan tradisi, memiliki Jakarta sebagai pusat kebudayaan yang dinamis dan unik. Salah satu kesenian tradisional yang ikonik dan identik dengan Jakarta adalah ondel-ondel, boneka raksasa yang biasanya tampil berpasangan, terdiri dari laki-laki dan perempuan. Ondel-ondel awalnya dianggap sebagai simbol budaya sakral dan memainkan peran penting dalam ritual budaya masyarakat Betawi untuk menolak bala atau nasib buruk. Namun, seiring dengan bergulirnya waktu dan perubahan zaman, makna sakral ondel-ondel perlahan memudar dan berubah menjadi sesuatu yang kurang bernilai. Kini, ondel-ondel lebih sering digunakan sebagai hiasan atau sebagai sarana untuk mencari penghasilan. Buku foto Lensa Kampung Ondel-Ondel berfokus pada Keluarga Mulyadi, yang menghadapi tantangan untuk menjaga tradisi pembuatan ondel-ondel warisan leluhur di tengah keterbatasan ekonomi yang ada. Melalui foto cerita, foto feature dan foto jurnalistik buku ini menggambarkan usaha Keluarga Mulyadi untuk menjaga tradisi pembuatan ondel-ondel sambil menghadapi dilema dalam mempertahankan makna budaya di tengah perubahan makna dan keterbatasan ekonomi keluarganya. Buku foto ini dapat menggambarkan tentang bagaimana keluarga tersebut berjuang untuk menjaga warisan budaya mereka di tengah arus modernisasi.
4. Kesadaran Keamanan Informasi
EMAIL SCAMS
67% email
adalah spam
REMOVABLE
MEDIA
USB dan CD
adalah media
penyebar virus
yang cepat
PASSWORD
SECURITY
42% pencurian
data perusahaan
disebabkan
password yang
lemah
SOCIAL MEDIA
THREATS
Sosial media
bagai pedang
bermata dua
MALWARE
94% malware
dikirim via
email
SAVE INTERNET
HABITS
Aktivitas hacking
berkembang
karena internet
5. 1. Email Scams
Selalu berhati-hati sebelum membuka
email yang tidak dikenal / mencurigakan.
1
Jangan membuka tautan yang diragukan
validitasnya.
2
Jangan mengunduh dan membuka
attachment dari email yang tidak dikenal.
3
Tindakan pencegahan
Bentuk penipuan via email yang
paling umum adalah phising.
Phising adalah suatu metode
kejahatan dunia maya di mana target
dihubungi melalui email, telepon
atau pesan teks oleh seseorang yang
menyamar sebagai lembaga yang sah
untuk memikat individu agar
memberikan data sensitif seperti
informasi pribadi, rincian kartu
kredit dan perbankan, kata sandi dll.
Di dalam email tersebut biasanya
akan terdapat sebuah tautan ke
halaman palsu yang tampilannya
dibuat persis seperti website yang
asli untuk menjebak seseorang.
Selalu waspada dengan permintaan data
pribadi (no rekening, password, nama ibu,
dll)
4
8. 2. Malware
Selalu berhati-hati sebelum mengunduh
file dari email, situs atau sumber lainnya.
1
Jangan pernah menginstall / memasang
software / program yang tidak resmi
(ilegal)
2
Pastikan Antivirus terpasang dan up-to-
date.
3
Tindakan pencegahan
Malware = malicious (jahat) +
software (perangkat lunak)
Malware merupakan perangkat lunak
yang dibuat dengan tujuan untuk
mencuri, memanipulasi, menghapus,
atau bahkan memata-matai sebuah
sistem.
Malware umumnya disisipkan pada
sebuah software, game, situs, dll
Disebarkan melalui jaringan internet,
email, pesan pribadi, atau halaman
situs web. Kontak IT support jika komputer
terindikasi terkena malware (melambat)
4
9. 2. Malware
VIRUS
Duplikasi diri,
perlu trigger,
harus ada “inang”
SPYWARE
Mencuri data
secara sembunyi-
sembunyi
TROJAN HORSE
Tidak bisa
duplikasi diri,
tersembunyi
RANSOMWARE
Mencuri data,
enkripsi data,
minta tebusan
WORM
Duplikasi diri,
tidak perlu trigger
dan “inang”,
jaringan berat
ADWARE
Mengambil data
untuk
kepentingan iklan
Jenis-jenis Malware
12. 3. Password Security
Sebanyak 78% Generasi milenial
menggunakan password yang sama untuk
beberapa akun sosial media
Password “123456” masih digunakan oleh
lebih dari 23 juta akun di internet.
Pencurian data perusahaan 42%
disebabkan karena password yang lemah.
Password lemah yang paling banyak
digunakan: 123456; 123456789, password,
qwerty, 12345678, 12345, 123123, 111111,
… (https://www.tomsguide.com/news/worst-
passwords-2020)
13. 3. Password Security
PRIVATE
Hanya digunakan
oleh satu orang
UNIK
Berbeda untuk
setiap akun
MUDAH DIINGAT
Mudah diingat
tanpa perlu
dicatat/ditulis
SULIT DITEBAK
Kombinasi huruf,
angka, dan karakter
khusus
UPTODATE
Diubah secara
berkala
TIDAK TERLALU
PENDEK
Semakin panjang
semakin baik
PASSWORD YANG BAIK
15. 4. Removable Media
Jangan memasang (plug) USB / CD /
Flashdisk yang tidak terpercaya (tidak
yakin aman)
1
Usahakan untuk tidak menggunakan USB
/ CD / Flashdisk di komputer umum
(warnet, dll)
2
Usahkaan bertukar file melalui email atau
cloud storage
3
Tindakan pencegahan
Removable media: USB, CD, HD
External, dll
Beberapa kasus penyebaran malware
yang memanfaatkan removable
media:
1. Stuxnet worm (2010)
2. Dark Tequila, malware
perbankan yang menyebar bulan
Agustus 2018.
3. Malware Windows LNK tahun
2016
4. Mahadewa: malware lokal (2008)
5. dll Disable autorun di komputer
4
16. 5. Save Internet Habits
Jangan
sembarangan
memasukkan data
pribadi (password,
PIN, nomor kartu
kredit, dll)
Gunakan internet
untuk hal positif
Pastikan alamat
situs yang
dikunjungi sudah
benar
Hati-hati
mengunduh file,
software, game,
film dll
1 2 3 4
17. 6. Social Media Threats
1. Hoax
2. Pencurian data pribadi
3. Pencurian konten tanpa ijin
4. Hacking
5. Pornografi
6. Perundungan
7. Penghinaan
8. dll
1. Jangan unggah konten
sembarangan. Saring sebelum
sharing
2. Periksa seberapa banyak data
pribadimu tersebar di internet
3. Libatkan keluarga, teman,
jaringan untuk melindungi bila
telah mendapat ancaman
keamanan di internet
4. Segera tingkatkan keamanan
diri di internet
5. Sampaikan ekspresimu di
internet secara bijak
ANCAMAN PENCEGAHAN
18. Data Privacy
Data Privacy is an area of data
protection that concerns the
proper handling of sensitive
data including, notably,
personal data.
19. Data Privacy Best Practices
Sumber: https://www.varonis.com/blog/data-privacy/
20. Referensi
• Slide “Cyber Security Awareness Presentation” oleh Jennifer Cheong
• Slide “Information Security Awareness” oleh University System of Georgia
• Slide “Security Awareness” oleh Univeristy of Memphis
• https://resources.infosecinstitute.com/topic/top-10-security-awareness-training-topics-for-your-
employees
• https://www.thesslstore.com/blog/usb-flash-drive-malware-how-it-works-how-to-protect-against-it.
• https://www.betterbuys.com/estimating-password-cracking-times/
• https://www.tomsguide.com/news/worst-passwords-2020
• https://www.idagent.com/blog/10-password-security-statistics-that-you-need-to-see-now/
• https://www.csoonline.com/article/3295877/what-is-malware-viruses-worms-trojans-and-
beyond.html
• https://www.postel.go.id/berita-ancaman-cyber-attack-dan-urgensi-keamanan-informasi-nasional-
26-2079
• https://blog.twitter.com/in_id/topics/events/2018/Mengenali-dan-Tips-Mengatasi-Ancaman-
Keamanan-di-Internet.html
• https://www.imperva.com/learn/application-security/penetration-testing/
• Slide template oleh SlideGo dan FreePik