Senin, 14 April 2014

ASPEK-ASPEK LAYANAN

PASSIVE AND ACTIVE THREAT
          About network security
          Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.
Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.
          Network security is becoming a very important issue and continues to grow. Some cases involving system security is now a claim that requires handling and protection costs so much. System - vital systems like defense systems, systems and banking systems-level systems, it requires such a high level of security. This is mainly due to advances in computer networks with the concept of open system so that anyone, anywhere and at any time, have the opportunity to access these vital areas.
          Network security is defined as a protection from power resources to efforts disclosure, modification, utilization, prohibition and destruction by unauthorized persons.
          Network security concepts
          Network security starts with authenticating, commonly with a username and a password. Since this requires just one detail authenticating the user name —i.e. the password— this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used (e.g. a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g. a fingerprint or retinal scan).
Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software or an intrusion prevention system (IPS)[3] help detect and inhibit the action of such malware. An anomaly-based intrusion detection system may also monitor the network like wireshark traffic and may be logged for audit purposes and for later high-level analysis.
Communication between two hosts using a network may be encrypted to maintain privacy.
Honeypots, essentially decoy network-accessible resources, may be deployed in a network as surveillance and early-warning tools, as the honeypots are not normally accessed for legitimate purposes. Techniques used by the attackers that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on new exploitation techniques. Such analysis may be used to further tighten security of the actual network being protected by the honeypot.A honeypot can also direct an attacker ’ s attention away from legitimate servers. A honeypot encourages attackers to spend their time and energy on the decoy server while distracting their attention from the data on the real server. Similar to a honeypot, a honeynet is a network set up with intentional vulnerabilities. Its purpose is also to invite attacks so that the attacker ’ s methods can be studied and that information can be used to increase network security. A honeynet typically contains one or more honeypots.
          Definition of threat      
          A threat is an act of coercion wherein an act is proposed to elicit a negative response. It is a communicated intent to inflict harm or loss on another person. It can be a crime in many jurisdictions. Threat (intimidation) is widely seen in animals, particularly in a ritualized form, chiefly in order to avoid the unnecessary physical violence that can lead to physical damage or death of both conflicting parties.


          Categories of threat are
There are two categories of threat are:
        PASSIVE THREAT
Threat or passive monitoring and recording data during the data recording ditranmisikan passing through the data during the data communication facilities ditranmisikan. The purpose of the attacker is to obtain information that is being transmitted.
Passive threats include:
  1. System failures
Failure causes are defects in design, process, quality, or part application, which are the underlying cause of a failure or which initiate a process which leads to failure. Where failure depends on the user of the product or process, then human error must be considered.
·         Can be a electrical interference
Electromagnetic interference (or EMI, also called radio-frequency interference or RFI when in radio frequency) is disturbance that affects an electrical circuit due to either electromagnetic induction or electromagnetic radiation emitted from an external source The disturbance may interrupt, obstruct, or otherwise degrade or limit the effective performance of the circuit. These effects can range from a simple degradation of data to a total loss of data.[2] The source may be any object, artificial or natural, that carries rapidly changing electrical currents, such as an electrical circuit, the Sun or the Northern Lights.
EMI can be intentionally used for radio jamming, as in some forms of electronic warfare, or can occur unintentionally, as a result of spurious emissions for example through intermodulation products, and the like. It frequently affects the reception of AM radio in urban areas. It can also affect cell phone, FM radio and television reception, although to a lesser extent.
·         Can be a Equipment Failure
An equipment failure involving components of a computer or a device other than a computer. Sometimes a piece of equipment fails to produce a release, and sometimes the equipment itself fails to function properly resulting in a release. In both cases, the failure is identified as an "Equipment Failure".
·         Can be a Software malfunction
A software malfunction is an error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. Most bugs arise from mistakes and errors made by people in either a program's source code or its design, or in frameworks and operating systems used by such programs, and a few are caused by compilers producing incorrect code. A program that contains a large number of malfunctions, and/or malfunctions that seriously interfere with its functionality, is said to be buggy. Reports detailing bugs in a program are commonly known as bug reports, defect reports, fault reports, problem reports, trouble reports, change requests, and so forth.
malfunctions trigger errors that can in turn have a wide variety of ripple effects, with varying levels of inconvenience to the user of the program. Some bugs have only a subtle effect on the program's functionality, and may thus lie undetected for a long time. More serious malfunctions may cause the program to crash or freeze. Others qualify as security malfunctions and might for example enable a malicious user to bypass access controls in order to obtain unauthorized privileges.
  1. Human error
·         Can be a Data entry errors
Transposition errors are commonly mistaken for transcription errors, but they should not be confused. As the name suggest, transposition errors occur when characters have “transposed”—that is, they have switched places. Transposition errors are almost always human in origin. The most common way for characters to be transposed is when a user is touch typing at a speed that makes them input one character, before the other. This may be caused by their brain being one step ahead of their body.
·         Can be a error data deletion
Data kerugian adalah kondisi kesalahan dalam sistem informasi di mana informasi dihancurkan oleh kegagalan atau kelalaian dalam penyimpanan, transmisi, atau pengolahan. Sistem informasi mengimplementasikan backup dan pemulihan bencana peralatan dan proses untuk mencegah kehilangan data atau mengembalikan data yang hilang.
  1. Disaster
The natural disaster is a natural event that resulted in adverse impact on the human population. Natural events could be a flood, volcanic eruptions, earthquakes, tsunamis, landslides, snowstorms, drought, hail, heat waves, hurricanes, tropical storms, typhoons, tornadoes, wildfires and disease outbreaks. Some natural disasters do not occur naturally. Examples are starving, the shortage of food in bulk is caused by a combination of human and natural factors. Two types of natural disasters resulting from space rarely affect humans, such as asteroids and sun storms.
ACTIVE THREAT


Active Threat is a dark user equipment connected communication facility to alter or modify the data transmission or bring gesture control gesture control data or false.
Active Threat is a dark user equipment connected communication facility to alter or modify the data transmission or bring gesture control gesture control data or false . For this category , there are three types , namely : message - stream modification , denial of message service and masquerade . Type of message - stream modification enables the offender to choose to delete , modify , suspend, did reorder and duplicate the original message . Performers also possible to add fake messages . Type denial of message service allows the perpetrators to destroy or put off most or all of the messages . Type masquerade allows actors to masquerade as the original host or switch and communicate with other hosts or switches to get the data or services .
Other threats such as fraud and computer crime. This threat is based on a computer as a tool to perform actions that are not true. The use of computer-based systems can sometimes be prone to fraud (fraud) and theft.
The method commonly used by people in penetrating the computer-based system there are 6 kinds (Bonar and Hopwood, 1993), namely:
  1. Manipulating input.
  2. Replacement program.
  3. Direct replacement.
  4. Data theft.
  5. Sabotage.
  6. Misuse and theft of computing resources.
In many of the computer fraud, manipulation of input is the most widely used method, since it can be done without requiring high technical skills. Manipulation through regular programs carried out by the specialist technology file directly informasi.Pengubahan generally performed by people who have direct access to the database.
Data theft is often committed by "insiders" for sale. One of the cases occurred in the Encyclopedia Britannica Company (Bodnar and Hopwood, 1993). The company sells its employees accused a customer list to a direct mail advertiser for $ 3 million.
Sabotage can be done in various ways. The general term to express the action entered into a computer system without authorization, ie hacking. During the riots rahun 1998, many Web sites of government agencies in Indonesia compromised by crackers. 

To prevent these threats, citizens and megabagan matelik Subak is guarding the water at night in turns according to the agreement to stay up sometimes when keeping water, because of the successful implementation of the regulation depends on the cropping pattern rotation water supplies are classified into three categories namely, when inventory adequate water, when the water supply is inadequate and when the water supply is inadequate. These periods are prone to water theft. The final solution of all these problems are solved by customary law / awig awig subak agreed manners. In addition, the threat could also come from pests and plant diseases. 

Tidak ada komentar:

Posting Komentar