{"id":1541,"date":"2013-09-26T16:17:58","date_gmt":"2013-09-26T09:17:58","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=1541"},"modified":"2013-09-30T20:04:54","modified_gmt":"2013-09-30T13:04:54","slug":"kuterbi-kamko-2","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2013\/09\/26\/kuterbi-kamko-2\/","title":{"rendered":"Kuterbi Kamko 2"},"content":{"rendered":"<p>Setelah Bab 1 terselesaikan, anda lanjut ke Bab 2 Analisis Komponen Keamanan Komputer untuk Lokasi UPT Puskom Unila. Simak URL https:\/\/dosen.unila.ac.id\/rasp\/2012\/02\/27\/keamanan-komputer-1\/<\/p>\n<p>Ada 5 komponen yang harus anda analisis dari kondisi UPT Puskom Unila, yaitu: 1) Availability [bagai mana ketersediaan perangkat keamanan?], 2) Controlability [bagai mana perangkat tersebut dapat dikendalikan oleh security officer institusi itu?], 3) Data integrity [bagai mana integritas data keamanan di sana?], 4) Confidentiality [bagai mana perangkat aturan pembatasan akses dan lokasi?], 5) Auditability [bagai mana derajat transaksi bisa ditelusuri dan diaudit?].<\/p>\n<p>Selain itu anda bahas juga pendekatan yang umum dilakukan untuk meningkatkan keamanan sistem komputer di UPT Puskom Unila yaitu: a) Membatasi akses fisik terhadap semua komponennya &lt;terkait butir 4 di atas&gt;; 2) Menerapkan mekanisme keamanan pada pemakai komputer, sistem operasi, dan perangkat keras &lt;terkait butir 2 di atas&gt;; 3) Mengatur strategi pemrograman agar dihasilkan program yang yang dapat diandalkan &lt;terkait butir 5 di atas&gt;.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Setelah Bab 1 terselesaikan, anda lanjut ke Bab 2 Analisis Komponen Keamanan Komputer untuk Lokasi UPT Puskom Unila. Simak URL https:\/\/dosen.unila.ac.id\/rasp\/2012\/02\/27\/keamanan-komputer-1\/ Ada 5 komponen yang harus anda analisis dari kondisi UPT Puskom Unila, yaitu: 1) Availability [bagai mana ketersediaan perangkat keamanan?], 2) Controlability [bagai mana perangkat tersebut dapat dikendalikan oleh security officer institusi itu?], 3) &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2013\/09\/26\/kuterbi-kamko-2\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Kuterbi Kamko 2&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-1541","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/1541"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=1541"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/1541\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=1541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=1541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=1541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}