{"id":446,"date":"2012-05-28T21:39:11","date_gmt":"2012-05-28T14:39:11","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=446"},"modified":"2012-05-29T04:30:06","modified_gmt":"2012-05-28T21:30:06","slug":"kamko-23","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/05\/28\/kamko-23\/","title":{"rendered":"kamko 23"},"content":{"rendered":"<p>&#8230;\u00a0 Information stored in the computers.<\/p>\n<div>\u2022Network security protect computer networks \u2013 especially local area network (LAN) \u2013 from outside intrusion.<\/div>\n<div>\u2022<\/div>\n<div>\u2022<a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/physical-security\">http:\/\/searchsecurity.techtarget.com\/definition\/physical-security<\/a><\/div>\n<div>Kasus: Setelah ia mendeteksi suatu intrusi ke komputer, seorang astronomer Universitas Harvard, yaitu Clifford Stoll menolong FBI menjejaki seorang hacker asing, dan mematahkan major spy ring. Di sini ada istilah: 1)\u00a0 <a title=\"Honeypot (computing)\" href=\"http:\/\/en.wikipedia.org\/wiki\/Honeypot_%28computing%29\">honeypot<\/a> , 2)\u00a0 <a title=\"Digital forensics\" href=\"http:\/\/en.wikipedia.org\/wiki\/Digital_forensics\">digital forensics<\/a>,<\/div>\n","protected":false},"excerpt":{"rendered":"<p>&#8230;\u00a0 Information stored in the computers. \u2022Network security protect computer networks \u2013 especially local area network (LAN) \u2013 from outside intrusion. \u2022 \u2022http:\/\/searchsecurity.techtarget.com\/definition\/physical-security Kasus: Setelah ia mendeteksi suatu intrusi ke komputer, seorang astronomer Universitas Harvard, yaitu Clifford Stoll menolong FBI menjejaki seorang hacker asing, dan mematahkan major spy ring. Di sini ada istilah: 1)\u00a0 honeypot &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/05\/28\/kamko-23\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;kamko 23&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-446","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/446"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=446"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/446\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}