Sabtu, 13 November 2010

DATA SECURITY

Looking at threats that can disrupt and even damage the computer system we need to hold security data measures to avoid or at least reduce the risks that may arise. Some security measures on computer system data is described below.

1.Administrative Security
Data security administration (administrative security) needs to be done to keep the possibility of data security breaches come from "insiders" or those who cooperate with outside parties. The rules, policies, training and discipline relating to the security of computer systems need to be held

2. Network Security
Each network systems have weaknesses, so each needs to be researched and find ways to close security holes in the Letter (security holes). Weaknesses that could arise from the network operating system used, so that very often the creator of the operating system repair software (operating system pacth) or restoration (updates, new releases) of its products. Each installation of new software from the network users must document-invest, as well as any surgery and access to it should be noted (logbook), so that when comes the things that are not in want, the network administrator can perform tracking

3. Anti Virus
New viruses continue to emerge so that the computer system should always have enough protection to avoid unforeseen events. It should be understood that the viral infection runs without permission and without the owner's computer system, besides that, sex is very diverse. The first virus attack is a virus that attacks the popular Morris U.S. Defense Department network system in 1988 as well as various college network installations, financial losses reached $ 98,000,000. Since then anti-virus program start are encouraged to minimize the consequences.

Viruses can be categorized in various types, among others, as follows:
Virus "file infector"
virus in the form of "boot sector"
virus "macro"

Some groups of viruses are as follows:
Boot sector
Worms
Companion
Macro
Link
Multipartite
Partitions Memory
Polymorphic
Trojan horses
Memory resident (TSR)
Parasitic
IRC worms

Some viruses site information is as follows:
Data Fellows Virus Information Center I
nternational Computer Security Association: www.icsa.net/ IBM Antivirus
Online: www.av.ibm. com / Symantec AntiVirus
Research Center: www.symantec.com/avcenter/
Network Associates Virus Alerts: www.nai.com / asp_set / anti_virus / alerts / intro.asp
Virus Bulletin: www.virusbtn.com/
CERT at Carnegie-Mellon University : www.cert.org/ http://www.infilsec.com/vulnerabilities/ http://www.infilsec.com/vulnerabilities/
CIAC (Computer Incident Advisory Capability): www.ciac.org/

anti-virus, the most popular are:
Norton Anti Virus
McAfee VirusScan
Anti-Virus
CA-Pccillin
Trend Micro
Personal Innoculan

4. Firewall
Firewall means a fire wall, usually made in large buildings to prevent fire spread from one part of the building to another. Firewall on a computer network is the software that is installed on a computer server so it can protect networks from attacks that come from outside. Firewalls are designed to: Organize and supervise data traffic from outside to inside the network and vice versa, all data flow must pass through the firewall, which is not through the firewall must be prevented. Establish a network security policy so that it can pass only by inheritance. Prevent infiltration from the outside so as not to disrupt the network firewall There are three kinds, namely: router packet filtering, circuit level gateways, and application-level gateway.

5. Proxy Server
Proxy server pada dasarnya berfungsi seperti firewall jenis application level gateway, suatu server yang berada antara server jaringan dan internet. Proxy server melaksanakan beberapa proses aplikasi yang telah ditetapkan lebih dulu, misalnya melayani akses dari terminal ke suatu situs web, atau berfungsi sebagai “transfer agent” terhadap berbagai aplikasi yang memiliki akses keluar atau akses dari luar ke dalam jaringan.

6. Enkripsi-Dekripsi
Change the original data into a secret code called a process of data encryption or data encryption. Once the confidential data to the destination, the data is returned to its original form, this process is called decryption of data. Mathematical science underlying the encryption and decryption technique is called cryptology while the technique and science of encryption-decryption process is called cryptography. The original manuscript is called plaintext and the secret text (which has been encrypted) is called ciphertext. Broadly speaking there are two categories of cryptography, namely: symmetric and asymmetric techniques. Several symmetric key algorithms include:
Substitution Cipher
Transposition Cipher
Data Encryption Standard (DES)
Triple DES Rivest Code 2 (RC2)
Rivest Code 4 (RC4)

Tidak ada komentar:

Posting Komentar