Page 6 - E-MODUL KEAMANAN KOMPUTER FIKS_Neat
P. 6

DAFTAR ISI




                 KATA PENGANTAR...............................................................................................i
                 DAFTAR ISI.............................................................................................................v
                 DAFTAR GAMBAR..............................................................................................vii
                 BAB I PENDAHULUAN DASAR KEAMANAN KOMPUTER...........................1
                      A. Pengertian Keamanan Komputer......................................................................2
                      B. Rasionalisasi Perlunya Keamanan Komputer...................................................6
                      C. Tujuan dan Fungsi Keamanan Komputer.........................................................8
                      D. Cakupan dan Ruang Lingkup Keamanan Komputer.....................................10
                 BAB II DASAR KEAMANAN KOMPUTER.......................................................13
                      A. Keamanan Komputer Dalam Kehidupan Sehari-hari.....................................14
                      B. Prinsip Implementasi Keamanan Komputer....................................................16
                      C. Tahapan Keamanan Komputer.......................................................................19
                      D. Komponen Keamanan Komputer...................................................................20
                 BAB III MALICIOUS SOFTWARE.......................................................................24
                      A. Pengertian Program Jahat Pada Sistem komputer...........................................25
                      B. Pengertian malicious software..........................................................................26
                      C. Tujuan dan Fungsi Program Jahat..................................................................29
                      D. Mencegah Masuknya Program Jahat Pada Sistem Komputer........................30
                 BAB IV HACKING DAN CRACKING.................................................................36
                      A. Pengertian Kejahatan Sistem...........................................................................37
                      B. Jenis-Jenis Kejahatan Sistem...........................................................................37
                      C. Analisis Hacking dan Cracking.......................................................................40
                      D. Prosedur Penindakan Terhadap Kejahatan Sistem.........................................43
                 BAB V KRIPTOGRAFI..........................................................................................46
                      A. Memahami Pengertian dan Teknik kriptografi...............................................47
                      B. Melakukan Enkripsi dan Deskripsi Dalam Praktik Kriptografi......................47
























                                                                                                      v
   1   2   3   4   5   6   7   8   9   10   11