Please enable JavaScript.
Coggle requires JavaScript to display documents.
Operations Security - Coggle Diagram
Operations Security
Tujuan
Mempelajari teknik-teknik kontrol pada operasi personalia SI, sistem informasi dan perangkat keras.
-
-
Covert Channel Access
An info path that is not normally used for communication within a system, therefore it is not protected by the systems normal security mechanisms.
types
-
covert timing-convey info by altering the performance of or modifying the timing of a system in some measurable way.
-
Viruses
Definisi
“variety of malicious computer programs that send out requests to the operating system, of the host system under attack, to append the virus to other programs.”
Kendali Virus
Kendali Prosedural
-
-
-
-
-
-
Awareness mengenai virus kepada pengguna, misalnya jangan tergoda dengan email yang “menggoda”
-
-
-
Anti Virus
Jenis Antivirus
Scanners, biasanya menggunakan siganture/definitions
-
-
-
Behavior blockers (mirip seperti active monitors), untuk aktivitas yang tidak biasa seperti format, penulisan pada boot sector, atau mengubah executables
Immunizers, menambahkan beberapa byte pada executeables.
Spyware
Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program.
Data collecting programs that are installed with the user's knowledge are not, properly speaking, spyware, if the user fully understands what data is being collected and with whom it is being shared.
However, spyware is often installed without the user's consent, as a drive-by download, or as the result of clicking some option in a deceptive pop-up window.