kamko 23

…  Information stored in the computers.

•Network security protect computer networks – especially local area network (LAN) – from outside intrusion.
Kasus: Setelah ia mendeteksi suatu intrusi ke komputer, seorang astronomer Universitas Harvard, yaitu Clifford Stoll menolong FBI menjejaki seorang hacker asing, dan mematahkan major spy ring. Di sini ada istilah: 1)  honeypot , 2)  digital forensics,

kamko 22

Ket 3> Electronic vandals manage

•To implant destructive software called “viruses” and “worm” to destroy computer data or software.
•Ket 4> Using a computer to plan or conduct a crime is becoming more “popular” as users discover ways to use the computer’s power for illegal purpose. Such things as creating false ATM cards, forging documents, and …
… Illegally accessing a cellular
•Phone network fall into this category. The use of electronic bulletin boards to sell child pornography also falls into this category.
•Ket 5> The illegal reproduction of software, often referred to as software piracy, is a large problem for companies that develop and sell software.
•Security issues involve methods that …
… Organizations use to
•Protect their hardware, software, and information – physical security, data security, and network security.
•Physical security involves methods of protecting all computer hardware, from mainframes to desktop computers to notebook PCs.
•Data security protects the software and …

kamko 21

Most computer crime fall into

•One of five broad categories: 1) illegal access to computers; 2) theft of computers; 3) direct attack on computers; 4) use of the computer to conduct or plan a crime; and 5) illegal reproduction of software.
•Ket 1 > an unauthorized person gains access to a computer or a computer network. Individuals who specialize in breaking into computers are called hackers.
The term hacker originally
•Applied to anyone who spent many hours at the computer “hacking” program – that is, learning how they work. In fact, many of today’s computer industry leaders started out as hackers who wanted to make computers do more. Unfortuneately, the term has taken on negative connotations due to the harm many of these people cause.
Ket 2> In many cases, when computer hardware, software, or
•Peripherals are stolen, the object of the theft is actually the information stored in the computer. An organization’s information may be significantly more valuable the the computer itself.
•A computer can be attacked physically or throuh the use of damaging software. Terrorists target computer centers for destruction.

kamko 20

Level of risk

•No amount of security measures will completely remove the vulnerability of a computer center or an information system. Each company must determine the level of risk it is willing to accept.
Pustaka
•Living with Computers, version 5.0, Patrick G. Mc. Keown, The Dryden Press, Harcourt Brace College Publishers.
Review
•A computer crime is an illegal act that requires special knowledge of computer technology; computer security comprises the methods used to protect the computer, the data, and user from natural and criminal forces.
•Some experts feel it is impossible to accurate estimate the magnitude of computer crime because so much of it goes unnoticed or unreported.

kamko 19

Data communications

•The mere existence of data communications capabilities, where data are transmitted via communication links from one computer to another, poses a threat to security. Some companies use cryptography – encryption /decryption hardware that scrambles and unscrambles messages.
personnel
•Managers are paying close attention to who gets hired for positions with access to computer-based information systems and sensitive data.
Information systems security
•Diklasifikasi: fisikal dan logikal. Yang pertama terkait hardware,  facilities, magnetic disks, dan lain-lain yang bisa diakses ilegal, dicuri, dihancurkan.
•Logical security is built into the software by permitting only authorized persons to access and use the system. Logical security for on-line systems is acheived primarily by passwords and authorization codes.

kamko 18

Threats take many form

•White collar crime, natural disasters (earthquakes, floods), vandalism, and carelessnes.
•Computer center security: hardware à jika perangkat keras fails, gagal maka MIS fails. Ancaman kegagalan dapat diminimalkan oleh implementing security precautions that prevent access by unauthorized personnel and by taking steps to keep all hardware operational.
software
•Unless properly controlled, the software for an MIS can be modified for personal gain. Thus, close control over software development and the documentation of an MIS is needed to minimize the opportunity for computer crime. Operational control procedures that are built into the design of an MIS will constantly monitor processing accuracy.
File /data bases
•The data base contains the raw material for information. The files /data bases are the life blood of a company and must be protected.

kamko 17

franking privileges

•Legislator à fasilitas free mail. Is massive amount of correspondence an attempt to better inform the constituents, or is it politically motivated and an abuse of the power of the computer?
•Is this application a violation of code of ethics?
Computer-center and system security
•Pertimbangan terpenting dalam membangun dan mengoperasikan sistem informasi adalah keamaan. Semakin lama sistem go on-line, banyak orang yang mengakses sistem.
•Perusahaan harus extremely careful untuk tidak berkompromi terhadap integritas sistem. Sistem informasi mempunyai beberapa point of vulnerability and too much is at stake to overlook the threats to the security of an information system and computer center.

kamko 16

computerized dialers

•Sistem ini digunakan oleh telemarketing dari berbagai produk. Apakah ini invasi terhadap privasi individual?
•Berapa banyak dari kita yang menerima, welcome, kesempatan mendengarkan pesan komersial? Apakah telemarketing melanggar code of ethics?
copyrighted software
•Misalnya dibeli electronic spreadsheet software package. The purchase agreement permits the use of the software on any micro at the office or at his home.
•Biasanya purchase agreement melarang secara tegas penggandaan copyrighted software untuk keperluan selain back up. Bagai mana jikalau ada teman dekat orang tersebut minta copy? Apakah langgar kode etik?

kamko 15

5) … System integrity at all times;

•6) Do not violate the rights or privacy of others; 7) Accomplish each task to the best of your ability; 8) Do not break the law.
•If you follow this eight-point code, it is unlikely that anyone will question your ethics. Nevertheless, well-meaning people routinely violate this simple code because they are unaware of the tremendous detrimental impact of their actions.
With the speed and power of computer
•A minor code infraction easily can be magnified into a costly catastrophe. Kasus implikasi etika aplikasi teknologi informasi: 1) computerized dialers; 2) copyrighted software; 3) franking privileges.
•Kasus 1: sistem otomatis menelpon dan memainkan pesan yang sudah direkam. Nomor telpon dimasukkan ke sistem. Jika tiada jawaban, ditelpon lagi di lain waktu.