{"id":442,"date":"2012-05-28T21:36:36","date_gmt":"2012-05-28T14:36:36","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=442"},"modified":"2012-05-28T21:37:55","modified_gmt":"2012-05-28T14:37:55","slug":"kamko-22","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/05\/28\/kamko-22\/","title":{"rendered":"kamko 22"},"content":{"rendered":"<p>Ket 3&gt; Electronic vandals manage<\/p>\n<div>\u2022To implant destructive software called \u201cviruses\u201d and \u201cworm\u201d to destroy computer data or software.<\/div>\n<div>\u2022Ket 4&gt; Using a computer to plan or conduct a crime is becoming more \u201cpopular\u201d as users discover ways to use the computer\u2019s power for illegal purpose. Such things as creating false ATM cards, forging documents, and &#8230;<\/div>\n<div>&#8230; Illegally accessing a cellular<\/div>\n<div>\n<div>\u2022Phone network fall into this category. The use of electronic bulletin boards to sell child pornography also falls into this category.<\/div>\n<div>\u2022Ket 5&gt; The illegal reproduction of software, often referred to as software piracy, is a large problem for companies that develop and sell software.<\/div>\n<div>\u2022Security issues involve methods that &#8230;<\/div>\n<\/div>\n<div>&#8230; Organizations use to<\/div>\n<div>\n<div>\u2022Protect their hardware, software, and information \u2013 physical security, data security, and network security.<\/div>\n<div>\u2022Physical security involves methods of protecting all computer hardware, from mainframes to desktop computers to notebook PCs.<\/div>\n<div>\u2022Data security protects the software and &#8230;<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ket 3&gt; Electronic vandals manage \u2022To implant destructive software called \u201cviruses\u201d and \u201cworm\u201d to destroy computer data or software. \u2022Ket 4&gt; Using a computer to plan or conduct a crime is becoming more \u201cpopular\u201d as users discover ways to use the computer\u2019s power for illegal purpose. Such things as creating false ATM cards, forging documents, &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/05\/28\/kamko-22\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;kamko 22&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-442","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/442"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=442"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/442\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}