Makalah Bahasa Inggris Tentang Keamanan Internet

INTERNET SECURITY 

 

 

PREFACE

 

First of all, We wants to express ours thanks to Allah SWT, because oh his bless and grace, the endtitled “Internet Security” can Be finished on time

The Paper is reqruitment to fulfill the assignment from Mr. Faisal Habib the English Lecture of Muhammadiyah University of Tangerang. We also thanks to him for all the guidance to complete it.

In completing this paper, we faced many problems but with the help of many people, all problems could be passed. May Allah SWT give the blessing for them. It provides the intrinsic elements in the happy prince short story with detail explanation. Although this paper has many deficiencies in the arrangement And explanation, and we hope that it can be used as a reference for the reader to understand the intrinsic elements of a short story.

 

 

TABLE OF CONTENT

 

PROFILE GROUP 2…………………………………………………………………………………………….. ii

PREFACE……………………………………………………………………………………………………………. iii

TABLE OF CONTENT………………………………………………………………………………………… iv

CHAPTER 1

  • Background………………………………………………………………………………………………………. 1
  • Scope……………………………………………………………………………………………………………….. 1

CHAPTER 2

2.1 History Of Internet Security………………………………………………………………………………… 2

2.2 Internet Security………………………………………………………………………………………………… 3

2.3 Kinds of Security on the internet…………………………………………………………………………. 4

2.4 Types Of Internet Security………………………………………………………………………………….. 7

CHAPTER 3

3.1 Hacker & Cracker……………………………………………………………………………………………… 8

3.2 Spyware,Virus,Spam,etc…………………………………………………………………………………….. 9

CHAPTER 4

Conclusion………………………………………………………………………………………………………….. 11

 

 

CHAPTER 1

 

PREMILINARY

 

  • Background

Security issues are one of the important aspects of an information system. Often security issues are on the last list of things considered important. When disrupting system performance, security is often reduced or even eliminated. Information in this era has become a very important commodity. Some even say that we have are in an “information-based society”. Ability to access and providing information quickly and accurately becomes very essential for a organizations, whether in the form of commercial organizations (companies), universities, government agencies, and individuals. It is possible with rapid development in computer and telecommunication technology.

  • Scope

In this paper, the issues that will be discussed various matters relating to the internet. Problems and handling of security in cyberspace as well as efforts to reduce crime in cyberspace.

 

 

CHAPTER 2

 

2.1 History Of Internet Security

 

The Internet was a computer network established by the US Department of Defense in 1969, through an ARPA agency project that developed a network called the ARPANET (Advanced Research Project Agency Network), where they demonstrated how the UNIX-based computer hardware and software.

The initial purpose of the construction project was for military purposes. At that time the US Department of Defense created a scattered computer network system by connecting computers in vital areas to solve problems in the event of a nuclear attack and to avoid the occurrence of centralized information, which in the event of war can be easily destroyed.

ARPANET initially linked only 4 sites: the Stanford Research Institute, the University of California, Santa Barbara, the University of Utah, where they formed an integrated network in 1969, and in general the ARPANET was introduced in October 1972. Soon the project Growing rapidly across the region, and all universities in the country want to join, thus making ARPANET difficult to organize.

Therefore the ARPANET is split into two, namely “MILNET” for military purposes and the new “ARPANET” smaller for non-military purposes such as, universities. Combined both networks eventually known as DARPA Internet, which then simplified into the Internet

History records young hackers like Kevin Mitnick (1981-stealing Pac Bell’s manual-when he was 17 years old), and Robert T. Morris (1988-injecting Morris worms with buffer overflow techniques into the network). In 1985 there was a sniffer attack against Sun workstation, then 1986 known cuckoo’s egg virus, followed by Morris worm in 1988. In 1991 Phil Zimmerman wrote his own Pretty Good Privacy as a protection for security attacks against e-mail. 1993 Mosaic suffered a point-click attack. 1994 came Linux. 1995 Kevin Mitnick attacked SDSL / SATAN / SSL. 1998 recorded the smurf attack, and the year 2000 recorded the phenomenon of carding, which not only in developed countries but even in educational cities in Indonesia.

The relatively new phenomenon is:

  1. March 1999, Melissa virus (attacking Word 97/2000, loss of $ 300 million, 150,000 systems in 4 days).
  2. October 2000, Microsoft 2 times conceded.
  3. October 2000, the Israeli site conceded.
  4. August 2000, the site of the Korean Ministry of Information hacked by hackers.
  5. February 2000, denial of service attacks eBay, Yahoo, Amazon.
  6. May 2000, I LOVE YOU (attacking Outlook, losses $ 10 billion, 500,000 systems within 24 hours)
  7. 22,000 attacks on the Pentagon system in 2000
  8. February 2001, virus Anna Kournikova
  9. The end of July 2001, Code Red virus

These events give an idea of ​​how data security is crucial. Meanwhile, the position of information security officer is still considered marginal. The problem of data security is not merely technology but more important is policy. From the survey results note that computer system security problems caused by bugs and errors in the system (65%), unauthorized use by insiders (19%), natural disasters (13%), and outsiders (3%)

 

2.2 Internet Security

The Internet is a very open computer network in the world, the consequences that must be taken care of is no security guarantees for network related to the Internet. This means that if the network operator is not careful in setting up the system, then most likely the network associated to the Internet will be easily entered by people who are not invited from outside. It is the duty of the network operators concerned, to minimize the risk as much as possible. Selection of strategies and skills of network administrators, will greatly differentiate whether a network easily penetrated or not.

Efforts to prevent someone from taking actions we do not want on the computers, software, and devices built into them to keep them in the ideal state we want ‘

 

What is protected :

Þ your data

Þ your resources

Þ Your reputation

To what :

Þ breakthroughs

Þ Denial Of Service

Þ Information Theft

Internet Security Objectives :

Þ Confidentiality

Þ Data Integrity

Þ Availability of data when we need it

Internet Security for users :

Þ Secure data

Þ Maintain data confidentiality

Users do :

Þ Downloading files

Þ receive and receive email

 

Tips on keeping the data intact :

Þ Do not trust any software downloaded

Þ Do not directly execute email attachments

Þ Always use antivirus software

 

2.3 Kinds of Security on the Internet

 

  1. Application Layer Security

At this level each application is responsible for providing security. Implementation at this level only concerns the client and server. Security at this level is simpler only via internet communication involves only two parties: the sender and the recipient (eg in the email application) the sender and receiver may agree to use the same protocol and use different types of security services available.

  1. Transport Layer Security

At this level the security applied is more complicated. One of the security methods in this layer is Transport Layer Security (TLS). TSL is one of the protocols developed by Netscape for security on the Internet

For transactions on the Internet, security includes:

– Customers need to be sure that the intended server belongs to the actual vendor, not the fraudster

– Customers need to be sure that the contents of the messages they send are not modified during the transaction. Message integrity must be maintained

– Customers need to be sure that no unauthorized person can receive the sensitive information it sends, such as credit card numbers

In addition to the above three things, TLS can also provide features for vendors (recipients) to authenticate customers.

  1. Security at the IP Layer

In IP layer, the implementation of security feature (security) is very complex because many tools are involved. Security at this level uses IP Security (IPSec). IPSec is a set of protocols designed by the IETF (Internet Engineering Task Force) to provide security to data packets sent via the Internet.IPSec does not define certain encryption or authentication methods, but rather provides framework and security mechanisms. While users are choosing the encryption / Authentication

  1. Firewall

An organization can protect it from the outside world with a firewall. A firewall is a router that is installed between an organization’s internal network, and the Internet. Firewalls are designed to pass certain data packets and filter (block) others.

There are 2 kinds of Firewall as follows:

  1. Packet-filter Firewall

It passes or blocks data packets based on information on the heder in the network-layer or transport layer, the sender and recipient’s IP address, sender and recipient address port, and the type of protocol used (eg TCP or UDP). A firewall packet is a router that uses a table to determine which packets should be removed.

  1. Proxy firewall

Packet-filter firewalls limit data packets based on information in the header, but can not choose based on what exactly the content of a particular message. For example an organization implements the policy that only partners who can transmit data, while data from outside partners will be rejected. This can not be done by packet-filter firewall because it is unable to distinguish all the data packets coming on TCP port 80 (the default port used for Internet)

The solution is to install a proxy on the computer (also known as a gateway) that beada between client computers and corporate servers. When someone sends a message, the proxy will send a message to the server to receive the message. The server will skip packets at the application level and find out if they are acceptable. Otherwise the message will be discarded and an error message will be sent.

  1. Access Control

Access control is a preventive effort to provide security to a data network. An organization needs access control rules to protect its resources from unauthenticated users. There are three methods that can be used for access control that is password, token and biometrics.

  1. Password

The technique that uum used for authorization is the use of passwords. Each of us requires a password to access the system. Effective passwords have the following criteria:

  1. Has a length of at least 6 characters
  2. Specified by the administrator because the user can choose a password that is easy to guess
  3. Password should be changed periodically
  4. Token

Tokens are small devices (eg cards, keys etc) containing electronic circuits for security control

  1. Biometric

That is, some user characteristics are used to gain access to a system. Can be a sound, fingerprint, retinal pattern or facial structure.

 

2.4 Types of Internet Security

 

  1. Physical security

Physical security is no less important than cyber security because crime in physical form can be fatal to a system. Physical security is more emphasis on hardware. Examples of physical security is to use a lock or padlock on the hardware used or tight guarding of server hardware.

  1. Network security

Network security is preventing unauthorized users from using owned networks. An example of network security is to use a firewall or proxy that is used to filter users who will use the network.

           III. Authorization access

Access authorization is the use of passwords or passwords if we want to access something. Orientation has been widely applied to various systems both in Personal Computer (PC) and in handphone. The use of security access authorization is very simple but can effectively ward off unauthorized users trying to access a system.

  1. Virus Protection

Virus is a security threat that we can not underestimate.Virus has many characteristics and is able to destroy important data even the existing system.Because of protection against this virus is very important. One easy way to ward off viruses is to use antivirus software and be careful if we move data from storage media.

  1. Handling of the congregation

Disaster management is planning the steps to be taken in the event of a disaster that results in the destruction of a system and the loss of important data.

 

 

CHAPTER 3

 

To learn about internet security system then it is important also we will know hackers and crackers

 

3.1 Hacker

  • Consists of a person or group of people who continuously strive to penetrate the security system of the operating system of a computer.
  • Experienced hackers can quickly identify the security holes in a computer network system.
  • The hacker’s habit is to keep searching for new knowledge or new targets and they will inform each other.
  • Basically the real hackers intend to destroy data within the network.

3.2 Craker

  • A person or group of people who intentionally intend to undermine and destroy integrity throughout a network of computer systems is called a cracker and his actions
  • In general, the cracker after successfully entered into the computer network will directly perform destruction and destruction of important data to cause chaos for the users in using the computer.
  • These crew activities are easily recognizable and can be quickly identified from the impact of their activities.

 

Some terms that we will know are related to internet security

 

3.2 SPYWARE

Spyware goes into the category of malicious software, which aims to take over some control of the PC and monitor activities that occur on the PC without asking permission in advance or just a notification to the PC user. After obtaining data from the monitoring results, then spyware will report the activities that occur on the PC to third parties. In this case it is the creator of the spyware.

Some other examples of spyware that usually attack Internet users are CoolWebSearch, Internet Optimizer also known as DyFuca, 180 Solutions, and HuntBar also known as WinTools or Adware.Websearch which is widely distributed spyware is distributed by Traffic Syndicate.

 

 

PIRACY

After browsing the internet for hours, you just realize something is wrong with your browser. Maybe it could be like this. If you close the browser and have tried to open the browser to browse again it will appear a website that you do not know at all, you already feel the website address you want to open properly and not infrequently the website becomes the default home page address in your browser. If this happens, no doubt your PC is exposed to piracy.

 

SPAM

Spam1 is as “unsolicited email”, which is email We do not expect this Spam can email that much to many person. The refill from this email is a promotion. This spam problem is based on send an email to one person and 1000 people are not much different. Barrier for mass mailing is very low. This is different by doing conventional marketing to send a postcard or letter will be much different for one person and 1000 person.

 

WORM

You certainly still remember advertising in the television media a few years ago, “Your child worms?”. Related to worms, this paper discusses worms or foreign terms worm. Internet worms (Worms) are autonomous intrusion agents capable of self-replication and spread by exploiting security flaws in commonly used services. Worm is a new phenomenon, first discovered in 1988. Worms have become a deadly threat on the Internet, although most cases that occur specifically are on a Windows-based system. Several types of worms using the latest electronic mail (e-mail) as a medium of dissemination.

 

VIRUS

The term computer virus is no stranger to today’s computer users. Release, about 12 years ago, this term has been known by the computer user community. New in 1988, appeared articles in the mass media that heavily preach about new threats to computer users who came to be known as ‘computer virus’. Viruses are on a good computer program, a package like any other programs. It is very basic on computer viruses and other programs. Viruses are made by someone with a variety of purposes, especially virus makers who want to pursue popularity and also just for the sake of pleasure. Goodbye to create a virus with the aim of destroying it will mess up the computer it’s infecting.

 

 

CHAPTER 4

 

CONCLUSION

           

            Along with the development of internet technology, causing the emergence of many crimes through the internet network. The existence of Cybercrime has become a threat of stability, so the government is difficult to compensate crime techniques done with computer technology,especially internet and intranet networks.

Therefore, computer security is required to prevent the destruction of the inside of the system because it is entered by unwanted users. Intregrated system security should be an integrated step in its entire subsystem, with the aim of narrowing or even closing the gap of harmful unauthorized acts.

Download makalahnya disini

 

 

Rich Snippets
Published
Article
Makalah Bahasa Inggris Tentang Keamanan Internet
Ratings
51star1star1star1star1star

Kata Bijak? Google banyak!

You may also like...

Leave a Reply