Page 8 - E-MODUL KEAMANAN KOMPUTER FIKS TUTUP_Neat
P. 8
DAFTAR GAMBAR
Gambar 1.1 Cyber Security...........................................................................................1
Gambar 1.2 Cryptografi................................................................................................2
Gambar 2.1 Keamanan Komputer .............................................................................13
Gambar 3.1 Malicious Software..................................................................................24
Gambar 3.2 Malicious Software..................................................................................25
Gambar 3.3 Macam-macam malware.........................................................................29
Gambar 5.1 Kriptografi..............................................................................................46
Gambar 5.2 Kriptografi Simetris................................................................................48
Gambar 6.1 Steganografi............................................................................................53
Gambar 7.1 Sistem Operasi.........................................................................................60
Gambar 8. 1 Keamanan Database..............................................................................71
Gambar 8. 2 bagan metode penelusuran.....................................................................73
Gambar 9.1 Cloud security.........................................................................................79
Gambar 10.1 Keamanan Mobile.................................................................................91
Gambar 11.1 Keamanan Jaringan.............................................................................104
Gambar 12.1 Keamanan Iot......................................................................................115
Gambar 12.2 IoT Security.........................................................................................116
Gambar 13.1 Standar Operasional Prosedur.............................................................125
Gambar 13.2 SOP Security........................................................................................126
vii