{"id":427,"date":"2012-05-14T08:33:52","date_gmt":"2012-05-14T01:33:52","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=427"},"modified":"2012-05-28T21:25:56","modified_gmt":"2012-05-28T14:25:56","slug":"kamko-20","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/05\/14\/kamko-20\/","title":{"rendered":"kamko 20"},"content":{"rendered":"<p>Level of risk<\/p>\n<div>\u2022No amount of security measures will completely remove the vulnerability of a computer center or an information system. Each company must determine the level of risk it is willing to accept.<\/div>\n<div>Pustaka<\/div>\n<div>\n<div>\u2022Living with Computers, version 5.0, Patrick G. Mc. Keown, The Dryden Press, Harcourt Brace College Publishers.<\/div>\n<div>Review<\/div>\n<div>\n<div>\u2022A computer crime is an illegal act that requires special knowledge of computer technology; computer security comprises the methods used to protect the computer, the data, and user from natural and criminal forces.<\/div>\n<div>\u2022Some experts feel it is impossible to accurate estimate the magnitude of computer crime because so much of it goes unnoticed or unreported.<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Level of risk \u2022No amount of security measures will completely remove the vulnerability of a computer center or an information system. Each company must determine the level of risk it is willing to accept. Pustaka \u2022Living with Computers, version 5.0, Patrick G. Mc. Keown, The Dryden Press, Harcourt Brace College Publishers. Review \u2022A computer crime &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/05\/14\/kamko-20\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;kamko 20&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-427","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/427"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=427"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/427\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}