Page 6 - E-MODUL KEAMANAN KOMPUTER FIKS_Neat
P. 6
DAFTAR ISI
KATA PENGANTAR...............................................................................................i
DAFTAR ISI.............................................................................................................v
DAFTAR GAMBAR..............................................................................................vii
BAB I PENDAHULUAN DASAR KEAMANAN KOMPUTER...........................1
A. Pengertian Keamanan Komputer......................................................................2
B. Rasionalisasi Perlunya Keamanan Komputer...................................................6
C. Tujuan dan Fungsi Keamanan Komputer.........................................................8
D. Cakupan dan Ruang Lingkup Keamanan Komputer.....................................10
BAB II DASAR KEAMANAN KOMPUTER.......................................................13
A. Keamanan Komputer Dalam Kehidupan Sehari-hari.....................................14
B. Prinsip Implementasi Keamanan Komputer....................................................16
C. Tahapan Keamanan Komputer.......................................................................19
D. Komponen Keamanan Komputer...................................................................20
BAB III MALICIOUS SOFTWARE.......................................................................24
A. Pengertian Program Jahat Pada Sistem komputer...........................................25
B. Pengertian malicious software..........................................................................26
C. Tujuan dan Fungsi Program Jahat..................................................................29
D. Mencegah Masuknya Program Jahat Pada Sistem Komputer........................30
BAB IV HACKING DAN CRACKING.................................................................36
A. Pengertian Kejahatan Sistem...........................................................................37
B. Jenis-Jenis Kejahatan Sistem...........................................................................37
C. Analisis Hacking dan Cracking.......................................................................40
D. Prosedur Penindakan Terhadap Kejahatan Sistem.........................................43
BAB V KRIPTOGRAFI..........................................................................................46
A. Memahami Pengertian dan Teknik kriptografi...............................................47
B. Melakukan Enkripsi dan Deskripsi Dalam Praktik Kriptografi......................47
v