Beruflich Dokumente
Kultur Dokumente
What Is a Threat?
threats bisa berasal kekuatan dari alam (angin puyuh, banjir) atau
kesalahan dari manusia yang mengancam asset informasi.
Common Attacks
o
o
o
o
Industrial espionage
Spam, phishing, and hoaxes
Denial of service (DoS) and distributed denial of service (DDoS)
Botnets
Intrusion Detection
Packet sniffing and recording tools
Intrusion detection systems
Anomaly detection systems
Intrusion Prevention
Firewalls
Intrusion prevention systems
Wireless Security
Jenis
o
o
o
o
3. Conclusions
Information technology security management mengadung proses
untuk melindungi operias IT dari sebuah organsasi dan asset dari internal
atau external threat, intentional dan lain sebagainya. Tujuan dari proses ini
untuk memastikan Confidetiality, integrity dan availability dari IT sistem.
Meliputi security policies dan procedure, security organization structure, iT
security processes dan rules and regulations.
Identity Management
1. Introduction
Identity has become a burden in the online world. When it is stolen,
it engenders a massive fraud, principally in online services, which
generates a lack of confidence in doing business with providers and
frustration for users.
2. Evolution of Identity Management Requirements
Digital Identity Definition
A digital identity is a representation of an entity in a specific context
Identity Management Overview
Digital identity should manage three connected vertexesusability,
cost, and risk. Identity management systems are elaborated to deal
with the following core facets :
o Reducing identity theft
o Management
o Reachability
o Authenticity
o Anonimity and pseudonymuty
o Organization personal data management
Privacy Requirement
Privacy is a central issue due to the fact that the official authorities
of almost all countries have strict legal policies related to identity.
User Centricity
In user-centric identity management, the user has full control over
her identity and consistent user experience during all transactions
when accessing her services. In user-centric identity management, the
user has full control over her identity and consistent user experience
during all transactions when accessing her services.
Usability Requirement
Mengenai Single Sign-On
3. The Requirements Fulfilled by Current Identity Management
Technologies
Evolution of Identity Management
Identity Management 1.0
Identity 2.0
The main objective of the Identity 2.0 protocol is to provide users
with full control over their virtual identities. An important aspect of
Identity 2.0 is protection against increasing Web attacks such as
phishing as well as the inadvertent disclosure of confidential
information while enabling convenient management.
4. Identity 2.0 for Mobile Users
Mobile Web 2.0
Mobility
Evolution of Mobile Identity