e-business security
TRANSCRIPT
![Page 1: E-Business Security](https://reader035.vdocument.in/reader035/viewer/2022070319/5583b999d8b42a85798b4895/html5/thumbnails/1.jpg)
E-BUSINESS SECURITY
Kelompok 6 :
Cecilia Andre (1501193315)
Kent Ardy Sutjiadi (1501159233)
Marchsun Tjahyadi (1501144881)
Sinta Elisa (1501145442)
Vina Stevani (1501178421)
Yennie Rossia (1501178402)
![Page 2: E-Business Security](https://reader035.vdocument.in/reader035/viewer/2022070319/5583b999d8b42a85798b4895/html5/thumbnails/2.jpg)
PENGERTIAN E-Business
Security
Computer Security
Information Security
![Page 3: E-Business Security](https://reader035.vdocument.in/reader035/viewer/2022070319/5583b999d8b42a85798b4895/html5/thumbnails/3.jpg)
ASPEK-ASPEK KEAMANAN KOMPUTER
Authentication Integrity Non Repudiation Authority Confidentiality Privacy Availability Access Control
![Page 4: E-Business Security](https://reader035.vdocument.in/reader035/viewer/2022070319/5583b999d8b42a85798b4895/html5/thumbnails/4.jpg)
ASPEK-ASPEK ANCAMAN KEAMANAN
Interuption
Interception
Modifikasi
Fabrication
![Page 5: E-Business Security](https://reader035.vdocument.in/reader035/viewer/2022070319/5583b999d8b42a85798b4895/html5/thumbnails/5.jpg)
INFRASTRUCTURE JARINGAN
Pengertian Terdapat 2 infrastruktur jaringan :
- Infrastruktur Fisikal- Infrastruktur Logikal
Model jaringan Peer-to-Peer- Kelebihan- Kekurangan
![Page 6: E-Business Security](https://reader035.vdocument.in/reader035/viewer/2022070319/5583b999d8b42a85798b4895/html5/thumbnails/6.jpg)
CONTOH TINJAUAN KEAMANAN INFORMASI
Physical Security Personal Security Operation Security Communications Security Network Security
![Page 7: E-Business Security](https://reader035.vdocument.in/reader035/viewer/2022070319/5583b999d8b42a85798b4895/html5/thumbnails/7.jpg)
ANCAMAN Alam
Manusia
Lingkungan
![Page 8: E-Business Security](https://reader035.vdocument.in/reader035/viewer/2022070319/5583b999d8b42a85798b4895/html5/thumbnails/8.jpg)
ARSITEKTUR Tersentralisasi
Desentralisasi
Client/Server
![Page 9: E-Business Security](https://reader035.vdocument.in/reader035/viewer/2022070319/5583b999d8b42a85798b4895/html5/thumbnails/9.jpg)
TUJUAN SECURITY BUAT SI Confidentiality Integrity Availiability Legitimate Use
![Page 10: E-Business Security](https://reader035.vdocument.in/reader035/viewer/2022070319/5583b999d8b42a85798b4895/html5/thumbnails/10.jpg)