{"id":347,"date":"2012-04-24T02:37:42","date_gmt":"2012-04-23T19:37:42","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=347"},"modified":"2012-04-24T02:40:56","modified_gmt":"2012-04-23T19:40:56","slug":"keamanan-komputer-9","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/keamanan-komputer-9\/","title":{"rendered":"Keamanan Komputer 9"},"content":{"rendered":"<p>The motives of those who<\/p>\n<div>\u2022Would infect a system with a virus run from electronic vandalism to revenge to terrorism. There is no monetary reward, only the \u201csatisfaction\u201d of knowing that their efforts have been very costly to individuals, companies, and governments.<\/div>\n<div>\u2022Viruses are serious problem. They have the potential of affecting an individual\u2019s career and even destroying companies.<\/div>\n<div>A company that loses its<\/div>\n<div>\n<div>\u2022Accounts receivables records could be a candidate for bankruptcy. Anti-viral programs, also called vaccines, exist, but they can be circumvented by a persistent (and malicious) programmer.<\/div>\n<div>\u2022The best way to cope with viruses is to recognize that they exist and to take pre-cautionary measures.<\/div>\n<\/div>\n<div>For example<\/div>\n<div>\n<div>\u2022One company requires micro users to turn off their micros and reload their personal copies of the operating system before each use.<\/div>\n<div>\u2022In the main-frame environment, system programmers must search continually for suspicious-looking programs and be particularly wary of downloading programs from computer systems outside the company.<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The motives of those who \u2022Would infect a system with a virus run from electronic vandalism to revenge to terrorism. There is no monetary reward, only the \u201csatisfaction\u201d of knowing that their efforts have been very costly to individuals, companies, and governments. \u2022Viruses are serious problem. They have the potential of affecting an individual\u2019s career &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/keamanan-komputer-9\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Keamanan Komputer 9&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-347","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/347"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=347"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/347\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}