kamko 23

…  Information stored in the computers.

•Network security protect computer networks – especially local area network (LAN) – from outside intrusion.
Kasus: Setelah ia mendeteksi suatu intrusi ke komputer, seorang astronomer Universitas Harvard, yaitu Clifford Stoll menolong FBI menjejaki seorang hacker asing, dan mematahkan major spy ring. Di sini ada istilah: 1)  honeypot , 2)  digital forensics,

kamko 22

Ket 3> Electronic vandals manage

•To implant destructive software called “viruses” and “worm” to destroy computer data or software.
•Ket 4> Using a computer to plan or conduct a crime is becoming more “popular” as users discover ways to use the computer’s power for illegal purpose. Such things as creating false ATM cards, forging documents, and …
… Illegally accessing a cellular
•Phone network fall into this category. The use of electronic bulletin boards to sell child pornography also falls into this category.
•Ket 5> The illegal reproduction of software, often referred to as software piracy, is a large problem for companies that develop and sell software.
•Security issues involve methods that …
… Organizations use to
•Protect their hardware, software, and information – physical security, data security, and network security.
•Physical security involves methods of protecting all computer hardware, from mainframes to desktop computers to notebook PCs.
•Data security protects the software and …

kamko 21

Most computer crime fall into

•One of five broad categories: 1) illegal access to computers; 2) theft of computers; 3) direct attack on computers; 4) use of the computer to conduct or plan a crime; and 5) illegal reproduction of software.
•Ket 1 > an unauthorized person gains access to a computer or a computer network. Individuals who specialize in breaking into computers are called hackers.
The term hacker originally
•Applied to anyone who spent many hours at the computer “hacking” program – that is, learning how they work. In fact, many of today’s computer industry leaders started out as hackers who wanted to make computers do more. Unfortuneately, the term has taken on negative connotations due to the harm many of these people cause.
Ket 2> In many cases, when computer hardware, software, or
•Peripherals are stolen, the object of the theft is actually the information stored in the computer. An organization’s information may be significantly more valuable the the computer itself.
•A computer can be attacked physically or throuh the use of damaging software. Terrorists target computer centers for destruction.