Page 7 - E-MODUL KEAMANAN KOMPUTER UJIAN TUTUP_Neat
P. 7

BAB VI STEGANOGRAFI.....................................................................................53
                      A. Memahami Pengertian dan Teknik Steganografi.............................................54
                      B. Melakukan Enkripsi dan Dekripsi dalam Praktik Steganografi ......................55
                 BAB VII KEAMANAN SISTEM OPERASI..........................................................60
                      A. Pengertian Keamanan Sistem Operasi.............................................................61
                      B. Pencegahan terhadap Kejahatan Keamanan Sistem Operasi...........................64
                      C. Perbaikan terhadap Kejahatan Keamanan Sistem Operasi.............................68
                 BAB VIII KEAMANAN DATABASE...................................................................71
                      A. Pengertian Keamanan Database.....................................................................72
                      B. Pencegahan terhadap Kejahatan Keamanan Database....................................74
                      C. Perbaikan terhadap Kejahatan Keamanan Database......................................76
                 BAB IX KEAMANAN CLOUD.............................................................................79
                      A. Pengertian Keamanan Cloud ..........................................................................80
                      B. Pencegahan terhadap Kejahatan Keamanan Cloud.........................................87
                      C. Perbaikan terhadap Kejahatan Keamanan Cloud...........................................88
                 BAB X KEAMANAN MOBILE.............................................................................91
                      A. Pengertian Keamanan Mobile.........................................................................92
                      B. Pencegahan terhadap Kejahatan Keamanan Mobile.......................................97
                      C. Perbaikan terhadap Kejahatan Keamanan Mobile........................................100
                 BAB XI KEAMANAN JARINGAN.....................................................................104
                      A. Pengertian Keamanan Jaringan.....................................................................105
                      B. Pencegahan terhadap Kejahatan Keamanan Jaringan...................................111
                      C. Perbaikan terhadap Kejahatan Keamanan Jaringan.....................................112
                 BAB XII KEAMANAN IOT.................................................................................115
                      A. Pengertian Keamanan IoT.............................................................................116
                      B. Pencegahan terhadap Kejahatan Keamanan IoT...........................................121
                      C. Perbaikan terhadap Kejahatan Keamanan IoT.............................................122
                 BAB XIII SOP DAN AUDIT KEAMANAN........................................................125
                      A. Definisi Standar Operating Prosedure (SOP).................................................126
                      B. Pencegahan kejahatan keamanan dengan penerapan SOP.............................128
                 DAFTAR PUSTAKA............................................................................................133




















                                                                                                       vi
   2   3   4   5   6   7   8   9   10   11   12