Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 25162 dokumen yang sesuai dengan query
cover
Slater, Ken
New York: Stockton Press, 1991
005.8 SLA i
Buku Teks SO  Universitas Indonesia Library
cover
Niemi, Valtteri
New York: John-Wiley, 2003
005.8 NIE u
Buku Teks SO  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2011) held in Aalborg, Denmark, in May 2011. The 15 revised full papers were carefully selected from numerous submissions and cover the most active areas of research in mobile security with its 3 focus areas machine-to-machine communication security, policies for mobile environments, and mobile user authentication and authorization."
Heidelberg: Springer, 2012
e20410305
eBooks  Universitas Indonesia Library
cover
Nichols, Randall K.
New York: McGraw-Hill , 2002
005.8 NIC w
Buku Teks  Universitas Indonesia Library
cover
Airell Ramadhan Budiraharjo
"Penelitian ini dilakukan untuk menganalisis keamanan jaringan khususnya pada teknologi komputasi awan dari serangan siber. Hal ini didasarkan dengan melihat era sekarang di mana teknologi komputasi awan (Cloud Computing) sedang mengalami perkembangan yang pesat. Banyak perusahaan saat ini mulai beralih dari penggunaan sumber daya secara on-premises menjadi teknologi cloud berjeniskan private cloud dengan alasan efisiensi dan kemudahan yang diberikan teknologi cloud. Namun, kemudahan akses pada teknologi private cloud ini pun justru menjadi peluang yang besar oleh para peretas untuk melakukan serangan siber, seperti Port Scanning, DoS, dan Reverse shell. Oleh karena itu, diperlukan keamanan jaringan yang baik agar teknologi cloud yang digunakan terhindar dari dampak serangan siber yang merugikan. Salah satu metode keamanan yang dapat diterapkan, yaitu dengan implementasi tools Intrusion Detection System (IDS). Intrusion Detection System (IDS) berfungsi untuk mengawasi keamanan jaringan dengan melakukan pendeteksian terhadap anomali atau serangan yang dilakukan melalui analisis lalu lintas jaringan tersebut. Berdasarkan hasil dari penelitian implementasi IDS pada server komputasi awan didapat bahwa nilai rata-rata detection rate IDS dari tiga skenario pengujian serangan siber adalah sebesar 51.19% dengan rata-rata penggunaan CPU dan memori dari server selama pengujian adalah 21.23% dan 29.20%. Hal ini menunjukkan bahwa IDS menunjukkan potensi sebagai tools yang efektif dalam meningkatkan keamanan pada platform cloud computing tanpa memberikan dampak negatif yang berarti terhadap performa perangkat.

This research was conducted to analyze network security, especially in cloud computing technology from cyber attacks. This is based on looking at the current era where cloud computing technology is experiencing rapid development. Many companies are now starting to switch from using on-premises resources to private cloud technology due to the efficiency and convenience that cloud technology provides. However, this ease of access to private cloud technology is also a huge opportunity for hackers to carry out cyber attacks, such as Port Scanning, DoS, and Reverse shell. Therefore, good network security is needed so that the cloud technology used can avoid the harmful effects of cyber attacks. One of the security methods that can be applied is the implementation of Intrusion Detection System (IDS) tools. This Intrusion Detection System (IDS) aims to monitor network security by detecting anomalies or attacks through analyzing network traffic. Based on the results of the IDS implementation research on the cloud computing server, it is found that the average IDS detection rate from three cyber attack test scenarios is 51.19% with the average CPU and memory usage of the server during testing is 21.23% and 29.20%. This shows that IDS shows potential as an effective tool in improving security on cloud computing platforms without having a significant negative impact on device performance."
Depok: Fakultas Teknik Universitas Indonesia, 2024
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Yutta Natasia
"Keamanan informasi adalah terjaganya kerahasiaan, keutuhan, dan ketersediaan informasi. Ancaman keamanan informasi dapat berupa serangan terhadap perangkat lunak dan pencurian kekayaan intelektual, identitas, atau informasi. Aspek manusia memegang peranan penting dalam keamanan informasi. Menurut Ogutcu et al., teknik terbaik yang dapat digunakan untuk mengatasi masalah keamanan informasi tidak dapat berhasil kecuali orang-orang dalam organisasi melakukan hal yang benar. Untuk meningkatkan kesadaran pegawai tentang pentingnya pengelolaan keamanan informasi, setiap tahunnya Otoritas Jasa Keuangan (OJK) melaksanakan sosialisasi mengenai Ketentuan Keamanan Informasi. Namun, hingga tahun 2017, belum pernah dilaksanakan evaluasi terkait kesadaran keamanan informasi di OJK, sehingga tidak dapat diketahui kondisi kesadaran keamanan informasi saat ini, dampak dari sosialisasi, dan strategi untuk mengurangi risiko keamanan informasi. Penelitian ini bertujuan untuk mengevaluasi kondisi keamanan informasi dari aspek manusia dengan menggunakan model Knowledge, Attitude, Behavior (KAB).
Hasil penelitian menunjukkan bahwa variabel pengetahuan mengenai kebijakan dan prosedur keamanan informasi memiliki pengaruh, baik secara langsung maupun tidak langsung, terhadap perilaku pegawai saat menggunakan peralatan kerja. Secara parsial, pengetahuan mengenai kebijakan dan prosedur keamanan informasi hanya memiliki pengaruh sebesar 23,6% terhadap perilaku pegawai. Namun, apabila dikombinasikan dengan sikap pegawai terhadap prosedur dan kebijakan keamanan informasi, pengetahuan dan sikap memiliki pengaruh sebesar 50,2% terhadap perilaku pegawai. Hal ini menunjukkan bahwa penambahan pengetahuan dan perubahan sikap memiliki pengaruh yang cukup besar terhadap perubahan perilaku pegawai saat menggunakan peralatan kerja. Model KAB terbukti dapat digunakan untuk melakukan pengukuran kesadaran keamanan informasi. Di OJK kesadaran keamanan informasi berada pada tingkat yang cukup baik, meskipun terdapat tiga aspek yang perlu diperbaiki, yaitu dalam hal penggunaan internet, pelaporan insiden, dan bekerja jarak jauh.

Information Security is the preserved of confidentiality, integrity, and availability of information. Threats to information security can appear in several different forms, such as software attacks, theft of intellectual property, identity theft, and theft of equipment or information. The human aspect plays an important role in information security. According to Ogutcu et al., The best techniques that can be used to solve the SI security problem can't succeed unless the people in the organization do the right thing. To increase employees' awareness of the importance of information security management, each year the Financial Services Authority of Indonesia (OJK) conducts socialization on Information Security Provisions. However, until 2017, no evaluation of information security awareness in OJK has been conducted, so it can't be known how the current state of information security awareness, the impact of socialization, and the strategies to reduce the risk of information security. This study aims to evaluate the condition of information security from human aspect by using Knowledge, Attitude, Behavior (KAB) model.
The result of the research shows that employee's knowledge about information security policy and procedure have influence, either directly or indirectly, to employee's behavior when using work equipment. Partially, knowledge of information security policies and procedures has only 23.6% effect on employee's behavior. However, when combined with employee's attitudes towards information security procedures and policies, it has 50.2% effect on employee's behavior. This indicates that the addition of knowledge and changes in attitude have a considerable influence on changes in employee's behavior when using work equipment. In conclusion, The KAB model has been proven to be used for measuring information security awareness. In OJK, information security awareness is at a fairly good level, although there are three aspects that need to be improved, namely in terms of internet use, incident reporting, and working remotely."
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2018
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
London: BTexact Technologies, 2002
005.8 INT
Buku Teks SO  Universitas Indonesia Library
cover
Jacobson, Douglas
Boca Raton: CRC Pres, 2009
005.8 JAC i
Buku Teks SO  Universitas Indonesia Library
cover
Muhammad Teguh Brillian
"ABSTRAK
Penelitian kuantitatif ini berdasar dari fenomena order fiktif yang dilakukan sejumlah pengendara ojek daring sebagai pengguna aplikasi transportasi daring. Tujuan dari penelitian ini adalah untuk mengetahui pengaruh sanksi yang dirasakan dan kepercayaan moral terhadap intensi penyalahgunaan aplikasi mobile. Penelitian ini menggunakan dasar deterrence theory dan mengadopsi penelitian Hovav & DArcy (2012) dengan memodifikasi indikator pada variabel kepercayaan moral dan menghilangkan domain budaya negara. Pengumpulan data dilakukan dengan menggunakan kuesioner yang disebar secara langsung kepada pengendara ojek daring. Data yang berhasil diperoleh dari responden sebanyak 198 sampel. Pengolahan data menggunakan metode Partial Least Square-Structural Equation Modelling (PLS-SEM). Dari delapan hipotesis yang digunakan pada penelitian ini, tujuh hipotesis diterima dan satu hipotesis mengenai hubungan kepastian sanksi yang dirasakan terhadap intensi penyalahgunaan aplikasi mobile ditolak. Kesimpulan yang diperoleh pada penelitian ini adalah ketegasan sanksi yang dirasakan pengendara ojek daring serta keyakinan moral mereka memiliki hubungan yang signifikan dengan intensi melakukan penyalahgunaan aplikasi mobile, sedangkan kepastian sanksi yang dirasakan tidak memiliki hubungan yang signifikan dengan intensi pengendara ojek daring melakukan penyalahgunaan aplikasi mobile. Selanjutnya, juga dapat disimpulkan bahwa kendali keamanan, dalam bentuk kendali teknis dan kendali prosedural memiliki hubungan yang signifikan dengan kepastian sanksi yang dirasakan, ketegasan sanksi yang dirasakan, dan keyakinan moral pengendara ojek daring.

ABSTRACT
This quantitative research is based on the phenomenon of fictitious order made by a number of online motorcycle taxi drivers as users of ride-hailing mobile applications. The purpose of this study is to determine the effect of sanctions perceived and moral beliefs against the intention of mobile application abuse. This study uses deterrence theory and adopts Hovav & DArcy (2012) research by modifying the indicator on moral beliefs and eliminating the national cultural domain. Data were collected by using questionnaires that were distributed directly to motorcycle taxi drivers. 198 sample was collected and analysed using Partial Least Square-Structural Equation Modelling (PLS-SEM). Seven of the eight hypotheses are accepted and one hypothesis, regarding the relationship between perceived of sanctions certainty and intention of mobile application abuse, is rejected. The conclusion obtained in this research is perceived of sanction celerity by the online motorcycle-taxi rider and their moral belief has a significant relationship with the intention of mobile application abuse, whereas the perceived of sanction certainty does not have significant relationship with the intention of the online motorcycle taxi driver to abuse the mobile application. Furthermore, it also can be concluded that security countermeasures, in the form of technical control and procedural control, have a significant relationship with the perceived of sanction certainty, perceived of sanction celerity, and the moral beliefs of online motorcycle taxi drivers."
2019
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Andress, Jason
"Summary :
The Basics of Information Security will provide the reader with a basic knowledge of information security in both theoretical and practical aspects. We will first cover the basic knowledge needed to understand the key concepts of information security, discussing many of the concepts that underpin the security world. We will then dive into practical applications of these ideas in the areas of operations, physical, network, operating system, and application security. Book Audience This book will provide a valuable resource to beginning security professionals, as well as to network and systems administrators. The information provided on can be used develop a better understanding on how we protect our information assets and defend against attacks, as well as how to apply these concepts practically"-- Provided by publisher.
Contents
Machine generated contents note: Introduction What is Information Security? Identification and Authentication Authorization and Access Control Auditing and Accountability Cryptography Legal and Regulatory Issues Operations Security Human Element Security Physical Security Network Security Operating System Security Application Security.
"
Amsterdam: Syngress, 2011
005.8 AND b
Buku Teks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>