Page 8 - E-MODUL KEAMANAN KOMPUTER FIKS TUTUP_Neat
P. 8

DAFTAR GAMBAR


                 Gambar 1.1 Cyber Security...........................................................................................1

                 Gambar 1.2 Cryptografi................................................................................................2

                 Gambar 2.1 Keamanan Komputer .............................................................................13
                 Gambar 3.1 Malicious Software..................................................................................24

                 Gambar 3.2 Malicious Software..................................................................................25

                 Gambar 3.3 Macam-macam malware.........................................................................29

                 Gambar 5.1 Kriptografi..............................................................................................46

                 Gambar 5.2 Kriptografi Simetris................................................................................48
                 Gambar 6.1 Steganografi............................................................................................53

                 Gambar 7.1 Sistem Operasi.........................................................................................60

                 Gambar 8. 1 Keamanan Database..............................................................................71

                 Gambar 8. 2 bagan metode penelusuran.....................................................................73

                 Gambar 9.1 Cloud security.........................................................................................79
                 Gambar 10.1 Keamanan Mobile.................................................................................91

                 Gambar 11.1 Keamanan Jaringan.............................................................................104

                 Gambar 12.1 Keamanan Iot......................................................................................115

                 Gambar 12.2 IoT Security.........................................................................................116

                 Gambar 13.1 Standar Operasional Prosedur.............................................................125
                 Gambar 13.2 SOP Security........................................................................................126
































                                                                                                     vii
   3   4   5   6   7   8   9   10   11   12   13