You are on page 1of 2

9/1/2022

LEARNING OUTCOMES
INTRODUCTION
TO COMPUTER
• Identify threats to the network: security breaches, DoS attacks and
malware
• Assessing possible attacks on your network
SECURITY • Understand terms such as cracker, pentest, firewall, and
authentication
Pengantar Keamanan Siber • Compare and contrast perimeters and layered approaches to network
#01 security
• Use online resources to secure your network

1 2

HOW SERIOUSLY SHOULD YOU


TAKE THREATS TO NETWORK LOSSES FROM CYBER INCIDENTS
SECURITY?
The first group considers no real threat. Customers believe that Single Loss Expectancy (SLE) = Asset Value (AV) × Exposure Factor
there is little real danger to computer systems and that much of the (EF)
negative news is simply unwarranted panic. They often believe that
only taking minimal security precautions should ensure the security
of their system. Annualized Loss Expectancy (ALE) = Single Loss Expectancy (SLE) ×
Annual Rate of Occurrence (ARO)
People who hold opposing viewpoints exaggerate the dangers. They
tend to assume that many talented hackers and any threat will be
possible on their system.

3 4

CYBER RISK CHOICES THREATS


Acceptance: This means you find the impact of the risk to be less than the cost of • Malware
addressing it, or the probability is so remote that you do nothing. This is not the most
common approach but is appropriate in some scenarios. • Security Breach
Avoidance: This means ensuring that there is zero chance of the risk occurring. If you
are concerned about a virus being introduced to your network via USB and you shut • Serangan DoS
down all USB ports, you have avoided the risk.
• Web attacks such as SQL Injection
Transference: This involves transferring responsibility for the damages should the risk
be realized. This is commonly done via cyber threat insurance. • Session hijacking
Mitigation: With this approach, which is the most common approach, you take steps to • Insider threat
reduce either the likelihood of the event occurring or the impact. For example, if you
are concerned about computer viruses, you might mitigate that via antivirus software
and policies about attachments and links. • DNS poisoning

5 6

1
9/1/2022

BASIC TERMINOLOGY CIA CONCEPT


• white hat hacker,
• Black hat hackers
• Gray hat hacker
• crackers.
• script kiddies
• penetration testing
• phreaking

7 8

SECURITY
MCCUMBER APPROACH
CUBE GUIDE

9 10

CEH
CYBERSECURITY CISA

CERTIFICATIONS CHFI
etc

11

You might also like