Académique Documents
Professionnel Documents
Culture Documents
Instructor
Lecturer
Dr. Teuku Yuliar Arif, ST., M.Kom
Mobile: 082160313880
E-mail: yuliar@unsyiah.ac.id, yuliararif@gmail.com
Homepage: http://elektro.unsyiah.ac.id/staf/tyarif/
http://tyarif.wordpress.com
Course Overview
References
Network Security Essentials: Applications and Standards, 4th
ed., by William Stallings, Pearson Education, Inc., 2011.
Cryptography and Network Security: Principles and Practice,
Fifth Edition, by William Stallings, Prentice-Hall, 2011.
Kriptografi untuk Keamanan Jaringan, Rifki Sadikin, AndiOffset, 2012.
Selected network security papers (ieeexplore, elsevier).
Grading Policy
(Tentative) grading policy
Attendance: 10%
Assignments: 30%
Midterm: 30%
Final exam: 30%
Course Description
Introduction to basic concepts in network
security and their applications
Cryptography
Encryption, hash function, digital signature
System security
Firewall, Intrusion, virus
Mode operasi
Bilangan Acak
Sistem sandi stream
Sandi RC4
Introduction to Network
Security
Week-1, 7/2/2015
11
12
13
14
Examples of Security
Requirements
confidentiality student grades
integrity patient information
availability authentication service
15
16
active attacks
17
Passive Attacks
Passive attacks do not affect system resources
Eavesdropping, monitoring
18
19
20
Active Attacks
Active attacks try to alter system resources or affect
their operation
Modification of data, or creation of false data
Four categories
Masquerade
Replay
Modification of messages
Denial of service: preventing normal use
A specific target or entire network
Difficult to prevent
The goal is to detect and recover
21
22
23
24
25
http://idsirtii.or.id
26
http://www.acad-csirt.or.id
27