Page 7 - E-MODUL KEAMANAN KOMPUTER UJIAN TUTUP_Neat
P. 7
BAB VI STEGANOGRAFI.....................................................................................53
A. Memahami Pengertian dan Teknik Steganografi.............................................54
B. Melakukan Enkripsi dan Dekripsi dalam Praktik Steganografi ......................55
BAB VII KEAMANAN SISTEM OPERASI..........................................................60
A. Pengertian Keamanan Sistem Operasi.............................................................61
B. Pencegahan terhadap Kejahatan Keamanan Sistem Operasi...........................64
C. Perbaikan terhadap Kejahatan Keamanan Sistem Operasi.............................68
BAB VIII KEAMANAN DATABASE...................................................................71
A. Pengertian Keamanan Database.....................................................................72
B. Pencegahan terhadap Kejahatan Keamanan Database....................................74
C. Perbaikan terhadap Kejahatan Keamanan Database......................................76
BAB IX KEAMANAN CLOUD.............................................................................79
A. Pengertian Keamanan Cloud ..........................................................................80
B. Pencegahan terhadap Kejahatan Keamanan Cloud.........................................87
C. Perbaikan terhadap Kejahatan Keamanan Cloud...........................................88
BAB X KEAMANAN MOBILE.............................................................................91
A. Pengertian Keamanan Mobile.........................................................................92
B. Pencegahan terhadap Kejahatan Keamanan Mobile.......................................97
C. Perbaikan terhadap Kejahatan Keamanan Mobile........................................100
BAB XI KEAMANAN JARINGAN.....................................................................104
A. Pengertian Keamanan Jaringan.....................................................................105
B. Pencegahan terhadap Kejahatan Keamanan Jaringan...................................111
C. Perbaikan terhadap Kejahatan Keamanan Jaringan.....................................112
BAB XII KEAMANAN IOT.................................................................................115
A. Pengertian Keamanan IoT.............................................................................116
B. Pencegahan terhadap Kejahatan Keamanan IoT...........................................121
C. Perbaikan terhadap Kejahatan Keamanan IoT.............................................122
BAB XIII SOP DAN AUDIT KEAMANAN........................................................125
A. Definisi Standar Operating Prosedure (SOP).................................................126
B. Pencegahan kejahatan keamanan dengan penerapan SOP.............................128
DAFTAR PUSTAKA............................................................................................133
vi