01.pdf yang berisi pengenalan tentang keamanan informasi

adiwahyucandrakusuma1 8 views 12 slides Oct 27, 2025
Slide 1
Slide 1 of 12
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12

About This Presentation

01.pdf yang berisi pengenalan tentang keamanan informasi


Slide Content

November 1, 2004 Introduction to Computer Security
©2004 Matt Bishop
Slide #1-1
Chapter 1: Introduction
•Components of computer security
•Threats
•Policies and mechanisms
•The role of trust
•Assurance
•Operational Issues
•Human Issues

November 1, 2004 Introduction to Computer Security
©2004 Matt Bishop
Slide #1-2
Basic Components
•Confidentiality
–Keeping data and resources hidden
•Integrity
–Data integrity (integrity)
–Origin integrity (authentication)
•Availability
–Enabling access to data and resources

November 1, 2004 Introduction to Computer Security
©2004 Matt Bishop
Slide #1-3
Classes of Threats
•Disclosure
–Snooping
•Deception
–Modification, spoofing, repudiation of origin, denial of
receipt
•Disruption
–Modification
•Usurpation
–Modification, spoofing, delay, denial of service

November 1, 2004 Introduction to Computer Security
©2004 Matt Bishop
Slide #1-4
Policies and Mechanisms
•Policy says what is, and is not, allowed
–This defines “security” for the site/system/etc.
•Mechanisms enforce policies
•Composition of policies
–If policies conflict, discrepancies may create
security vulnerabilities

November 1, 2004 Introduction to Computer Security
©2004 Matt Bishop
Slide #1-5
Goals of Security
•Prevention
–Prevent attackers from violating security policy
•Detection
–Detect attackers’ violation of security policy
•Recovery
–Stop attack, assess and repair damage
–Continue to function correctly even if attack
succeeds

November 1, 2004 Introduction to Computer Security
©2004 Matt Bishop
Slide #1-6
Trust and Assumptions
•Underlie all aspects of security
•Policies
–Unambiguously partition system states
–Correctly capture security requirements
•Mechanisms
–Assumed to enforce policy
–Support mechanisms work correctly

November 1, 2004 Introduction to Computer Security
©2004 Matt Bishop
Slide #1-7
Types of Mechanisms
secure precise broad
set of reachable states set of secure states

November 1, 2004 Introduction to Computer Security
©2004 Matt Bishop
Slide #1-8
Assurance
•Specification
–Requirements analysis
–Statement of desired functionality
•Design
–How system will meet specification
•Implementation
–Programs/systems that carry out design

November 1, 2004 Introduction to Computer Security
©2004 Matt Bishop
Slide #1-9
Operational Issues
•Cost-Benefit Analysis
–Is it cheaper to prevent or recover?
•Risk Analysis
–Should we protect something?
–How much should we protect this thing?
•Laws and Customs
–Are desired security measures illegal?
–Will people do them?

November 1, 2004 Introduction to Computer Security
©2004 Matt Bishop
Slide #1-10
Human Issues
•Organizational Problems
–Power and responsibility
–Financial benefits
•People problems
–Outsiders and insiders
–Social engineering

November 1, 2004 Introduction to Computer Security
©2004 Matt Bishop
Slide #1-11
Tying Together
Threats
Policy
Specification
Design
Implementation
Operation

November 1, 2004 Introduction to Computer Security
©2004 Matt Bishop
Slide #1-12
Key Points
•Policy defines security, and mechanisms
enforce security
–Confidentiality
–Integrity
–Availability
•Trust and knowing assumptions
•Importance of assurance
•The human factor
Tags