Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 17718 dokumen yang sesuai dengan query
cover
"Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer."
Waltham, MA: Elsevier, 2013
e20426797
eBooks  Universitas Indonesia Library
cover
Maiwald, Eric
New York: McGraw-Hill Technology Education, 2004
005.8 MAI f
Buku Teks  Universitas Indonesia Library
cover
Wheeler, Evan
Amsterdam: Syngress, 2011
005.8 WHE s
Buku Teks  Universitas Indonesia Library
cover
Rafli Raditya
"Masalah kemanan di bidang informasi dan teknologi telah menjadi sesuatu yang penting dalam kinerja perusahaan. Keamanan jaringan yang digunakan patutnya dapat berjalan dengan optimal sehingga tidak membebani kinerja pekerjaan lainnya. Upaya optimasi sangat penting dan harus terus dilakukan untuk mendirikan sebuah jaringan berkeamanan tinggi dan mudah dikelola dalam jangkauan penggunaan yang luas. Firewall Fortigate sebagai perangkat yang dapat memberi keamanan jaringan dan kemudahan manajemen jaringan selayaknya dapat dikonfigurasi dengan optimal dan efisien. IPv4 Policy pada perangkat Firewall Fortigate merupakan konfigurasi yang sangat penting bagi kelangsungan kinerja jaringan yang aman dan optimal dengan memanfaatkan perangkat Firewall Fortigate di jaringan tersebut. Optimasi konfigurasi IPv4 Policy yang tepat pada perangkat Firewall Fortigate diharapkan akan menciptakan kinerja jaringan yang optimal dan efisien dengan nilai parameter QoL yang memenuhi standar kualitas yang telah ditentukan.

Security in the field of information and technology have become so much more important than ever, especially for the important of company 39 s performance. Network security should run optimally so as not to burden the performances of other works. There has to be a lot of efforts being put to improve network security and its performance. Fortigate Firewall as a network security and network management devie is to be configured with utmost importancy and optimicy to reach its maximum potential to be an efficient network device. IPv4 Policy on Fortigate 39 s own implementation is a very important aspect for the device performance in securing and optimizing the network performance. Optimization on IPv4 Policy of Fortigate Firewall device is likely to become an important thing to improve the quality of network, such that the QoL parameters with good quality and desiganted standards."
Depok: Fakultas Teknik Universitas Indonesia, 2018
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Raphael Bianco Huwae
"Keamanan pada suatu sistem jaringan perusahaan sangatlah diperlukan. Tingkat availability yang tinggi di suatu server perusahaan menjadi aset berharga untuk mencapai profit perusahaan tersebut. Gangguan jaringan yang dialami perusahaan akan berdampak ke seluruh stakeholder perusahaan. Keamanan yang dilakukan menggunakan aplikasi firewall dinilai belum cukup untuk melindungi jaringan perusahaan. Penggunaan IDS pada suatu jaringan juga membutuhkan keahlian khusus dari administrator untuk terus menerus dapat memantau keamanan jaringan. Agar dapat melakukan pemantauan yang efektif dan hemat tenaga maka dilakukan penelitian untuk mendeteksi intrusi pada suatu keamanan jaringan dan melakukan reporting dengan menggunakan suatu bot Telegram. Penggunaan bot Telegram ini diharapkan akan memberikan suatu sistem reporting otomatis yang menyederhanakan proses monitoring pada suatu kegiatan berulang agar informasi terhadap serangan dari luar akan lebih cepat terdeteksi. Peringatan bahaya dikirim berupa notifikasi yang diintegrasikan pada aplikasi Telegram baik melalui smartphone maupun PC dengan berbentuk log alert yang dapat menampilkan waktu kejadian, IP yang diserang, IP attacker dan jenis serangan yang dilakukan. Dengan melakukan implementasi monitoring secara realtime terhadap jaringan melalui telegram maka baik pihak “IT” maupun “non IT” akan dapat mendapat informasi terhadap intrusi tersebut agar dapat melakukan reporting secara cepat.

Corporate network system security is very important. A high level of availability on a company's server becomes a valuable asset to achieve the company's profit. Server or network disruptions experienced by the company will affect all stakeholders of the company. Security measure carried out using a firewall application is not enough to protect corporate networks. The use of IDS on a network also requires special expertise from the administrator to continuously be able to monitor network security. In order to be able to carry out effective and energy-efficient monitoring, a study was conducted to detect intrusion in a network security and report it using a Telegram bot. The use of this Telegram bot is expected to provide an automatic reporting system that simplifies the process of monitoring a recurring activity so that information on attacks from outside will be responded more quickly. Danger alerts are sent in the form of messages that are integrated into Telegram applications both via smartphones and PCs in the form of log alerts that can display the time of occurrence, server IP being attacked, IP attacker and type of attack carried out. By implementing real-time monitoring of the network via telegram, both "IT" and "non-IT" parties will be able to obtain information on the intrusion so that they can make fast responses."
Depok: Fakultas Teknik Universitas Indonesia, 2021
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Waltham, MA: Syngress, 2014
005.8 CYB
Buku Teks  Universitas Indonesia Library
cover
cover
Vacca, John R.
"This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.
Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms.
Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements :
• Checklists throughout each chapter to gauge understanding
• Chapter Review Questions/Exercises and Case Studies
• Ancillaries: Solutions Manual; slide package; figure files"
Waltham, MA: Syngress, 2014
e20426913
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control."
Berlin: Springer, 2012
e20407128
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012.
The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security."
Berlin: Springer-Verlag, 2012
e20408423
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>