What can these enemies do?
Viruses
Viruses are the most widely known security threats,
because they often garner extensive press coverage.
Viruses are computer programs that are written by
devious programmers and are designed to replicate
themselves and infect computers when triggered by a
specific event. For example, viruses called macro viruses
attach themselves to files that contain macro instructions
(routines that can be repeated automatically, such as mail
merges) and are then activated every time the macro runs.
The effects of some viruses are relatively benign and cause
annoying interruptions such as displaying a comical
message when striking a certain letter on the keyboard.
Other viruses are more destructive and cause such
problems as deleting files from a hard drive or slowing
down a system.
A network can be infected by a virus only if the virus
enters the network through an outside source—most
often through an infected floppy disk or a file downloaded
from the Internet. When one computer on the network
becomes infected, the other computers on the network are
highly susceptible to contracting the virus.
“85 percent of respondents detected computer security
breaches within the last 12 months, up 42% from 1996.”
—Annual Computer Security Institute and FBI Survey, 2001

Trojan Horse Programs
Trojan horse programs, or trojans, are delivery vehicles
for destructive code. Trojans appear to be harmless or
useful software programs, such as computer games, but
they are actually enemies in disguise. Trojans can delete
data, mail copies of themselves to e-mail address lists, and
open up computers to additional attacks. Trojans can be
contracted only by copying the trojan horse program to
a system, via a disk, downloading from the Internet, or
opening an e-mail attachment. Neither trojans nor viruses
can be spread through an e-mail message itself—they are
spread only through e-mail attachments.

Vandals
Web sites have come alive through the development of
such software applications as ActiveX and Java Applets.
These devices enable animation and other special effects
to run, making Web sites more attractive and interactive.
However, the ease with which these applications can be
downloaded and run has provided a new vehicle for
inflicting damage. A vandal is a software application or
applet that causes destruction of varying degrees. A
vandal can destroy just a single file or a major portion
of a computer system.
Attacks
Innumerable types of network attacks have been
documented, and they are commonly classified in three
general categories: reconnaissance attacks, access attacks,
and denial of service (DoS) attacks.
• Reconnaissance attacks are essentially information
gathering activities by which hackers collect data that is
used to later compromise networks. Usually, software
tools, such as sniffers and scanners, are used to map out
network resources and exploit potential weaknesses in
the targeted networks, hosts, and applications. For
example, software exists that is specifically designed to
crack passwords. Such software was created for
network administrators to assist employees who have
forgotten their passwords or to determine the passwords
of employees who have left the company without telling
anyone what their passwords were. Placed in the wrong
hands, however, this software can become a very
dangerous weapon.
• Access attacks are conducted to exploit vulnerabilities in
such network areas as authentication services and File
Transfer Protocol (FTP) functionality in order to gain
entry to e-mail accounts, databases, and other
confidential information.
• DoS attacks prevent access to part or all of a computer
system. They are usually achieved by sending large
amounts of jumbled or otherwise unmanageable data to
a machine that is connected to a corporate network or
the Internet, blocking legitimate traffic from getting
through. Even more malicious is a Distributed Denial of
Service attack (DDoS) in which the attacker
compromises multiple machines or hosts.

Data Interception
Data transmitted via any type of network can be subject
to interception by unauthorized parties. The perpetrators
might eavesdrop on communications or even alter the
data packets being transmitted. Perpetrators can use
various methods to intercept the data. IP spoofing, for
example, entails posing as an authorized party in the data
transmission by using the Internet Protocol (IP) address of
one of the data recipients.

Social Engineering
Social engineering is the increasingly prevalent act of
obtaining confidential network security information
through non-technical means. For example, a social
engineer might pose as a technical support representative
and make calls to employees to gather password
information. Other examples of social engineering include
bribing a coworker to gain access to a server or searching
a colleague’s office to find a password that has been
written in a hidden spot.

Spam
Spam is the commonly used term for unsolicited electronic
mail or the action of broadcasting unsolicited advertising
messages via e-mail. Spam is usually harmless, but it can
be a nuisance, taking up the recipient’s time and storage
space.

PERTANYAAN
1. Jelaskan dengan bahasa Indonesia definisi dari Virus, Trojan, Vandal, DoS,DDoS, Spam dan Social engineering?
2. Berikan contoh beberapa peristiwa yang terjadi yang berdampak besar yang disebabkan dari hal-hal di atas?
3. Menurut anda manakah dari hal diatas yang paling berbahaya? buat urutan Top down.

Importance of Security
The Internet has undoubtedly become the largest public
data network, enabling and facilitating both personal and
business communications worldwide. The volume of
traffic moving over the Internet, as well as corporate
networks, is expanding exponentially every day. More
and more communication is taking place via e-mail;
mobile workers, telecommuters, and branch offices are
using the Internet to remotely connect to their corporate
networks; and commercial transactions completed over
the Internet, via the World Wide Web, now account for
large portions of corporate revenue.
While the Internet has transformed and greatly improved
the way we do business, this vast network and its associated
technologies have opened the door to an increasing number
of security threats from which corporations must protect
themselves. Although network attacks are presumably more
serious when they are inflicted upon businesses that store
sensitive data, such as personal medical or financial records,
the consequences of attacks on any entity range from mildly
inconvenient to completely debilitating—important data
can be lost, privacy can be violated, and several hours,
or even days, of network downtime can ensue.
Despite the costly risks of potential security breaches, the
Internet can be one of the safest means by which to
conduct business. For example, giving credit card
information to a telemarketer over the phone or a waiter
in a restaurant can be more risky than submitting the
information via a Web site, because electronic commerce
transactions are usually protected by security technology.
Waiters and telemarketers are not always monitored or
trustworthy. Yet the fear of security problems can be just
as harmful to businesses as actual security breaches.
General fear and suspicion of computers still exists and
with that comes a distrust of the Internet. This distrust can
limit the business opportunities for companies, especially
those that are completely Web based. Thus, companies
must enact security policies and instate safeguards that
not only are effective, but are also perceived as effective.
Organizations must be able to adequately communicate
how they plan to protect their customers.
In addition to protecting their customers, corporations
must protect their employees and partners from security
breaches. The Internet, intranets, and extranets enable
fast and effective communication between employees and
partners. However, such communication and efficiency
can of course be impeded by the effects of a network
attack. An attack may directly cause several hours of
downtime for employees, and networks must be taken
down in order for damage to be repaired or data to be
restored. Clearly, loss of precious time and data can
greatly impact employee efficiency and morale.
Legislation is another force that drives the need for
network security. Governments recognize both the
importance of the Internet and the fact that substantial
portions of the world’s economic output are dependent
on it. However, they also recognize that opening up the
world’s economic infrastructure to abuse by criminals
could cause major economic damage. National
governments are therefore developing laws intended
to regulate the vast flow of electronic information.
Furthermore, to accommodate the regulations enacted
by governments, the computer industry has developed a
portfolio of security standards to help to secure data and
to prove that it is secure. Businesses that do not have
demonstrable security policies to protect their data will be
in breach of these standards and penalized accordingly.
“I have found that inadequate network security is
usually caused by a failure to implement security
policies and make use of security tools that are
readily available. It's vital that companies complete
professional risk assessments and develop
comprehensive security plans and infrastructures
that are publicly supported by upper management.”
—Mark Carter, COO, CoreFacts, LLC, Data Recovery and
Analysis Firm
Threats to DataAs with any type of crime, the threats to the privacy
and integrity of data come from a very small minority
of vandals. However, while one car thief can steal only
one car at a time, a single hacker working from a basic
computer can generate damage to a large number of
computer networks that wreaks havoc around the world.
Perhaps even more worrisome is the fact that the threats
can come from people we know. In fact, most network
security experts claim that the majority of network
attacks are initiated by employees who work inside the
corporations where breaches have occurred. Employees,
through mischief, malice, or mistake, often manage to
damage their own companies’ networks and destroy data.
Furthermore, with the recent pervasiveness of remote
connectivity technologies, businesses are expanding to
include larger numbers of telecommuters, branch offices,
and business partners. These remote employees and
partners pose the same threats as internal employees,
as well as the risk of security breaches if their remote
networking assets are not properly secured and monitored.
Whether you want to secure a car, a home, a nation, or
a computer network, a general knowledge of who the
potential enemies are and how they work is essential.
Who are the enemies?
Hackers
This generic and often over-romanticized term applies to
computer enthusiasts who take pleasure in gaining access
to other people’s computers or networks. Many hackers
are content with simply breaking in and leaving their
“footprints,” which are joke applications or messages on
computer desktops. Other hackers, often referred to as
“crackers,” are more malicious, crashing entire computer
systems, stealing or damaging confidential data, defacing
Web pages, and ultimately disrupting business. Some
amateur hackers merely locate hacking tools online and
deploy them without much understanding of how they
work or their effects.
Unaware Staff
As employees focus on their specific job duties, they often
overlook standard network security rules. For example,
they might choose passwords that are very simple to
remember so that they can log on to their networks easily.
However, such passwords might be easy to guess or crack
by hackers using simple common sense or a widely
available password cracking software utility. Employees
can unconsciously cause other security breaches including
the accidental contraction and spreading of computer
viruses. One of the most common ways to pick up a virus
is from a floppy disk or by downloading files from the
Internet. Employees who transport data via floppy disks
can unwittingly infect their corporate networks with
viruses they picked up from computers in copy centers or
libraries. They might not even know if viruses are resident
on their PCs. Corporations also face the risk of infection
when employees download files, such as PowerPoint
presentations, from the Internet. Surprisingly, companies
must also be wary of human error. Employees, whether
they are computer novices or computer savvy, can make
such mistakes as erroneously installing virus protection
software or accidentally overlooking warnings regarding
security threats.
“Ninety-one percent of respondents detected employee
abuse of Internet access privileges.”
—Annual Computer Security Institute and FBI Survey, 2001
Disgruntled Staff
Far more unsettling than the prospect of employee error
causing harm to a network is the potential for an angry or
vengeful staff member to inflict damage. Angry employees,
often those who have been reprimanded, fired, or laid off,
might vindictively infect their corporate networks with
viruses or intentionally delete crucial files. This group is
especially dangerous because it is usually far more aware
of the network, the value of the information within it,
where high-priority information is located, and the
safeguards protecting it.
Snoops
Whether content or disgruntled, some employees might
also be curious or mischievous. Employees known as
“snoops” partake in corporate espionage, gaining
unauthorized access to confidential data in order to
provide competitors with otherwise inaccessible
information. Others are simply satisfying their personal
curiosities by accessing private information, such as
financial data, a romantic e-mail correspondence between
coworkers, or the salary of a colleague. Some of these
activities might be relatively harmless, but others, such as
previewing private financial, patient, or human resources
data, are far more serious, can be damaging to reputations,
and can cause financial liability for a company.

PERTANYAAN
1. Jelaskan Pentingnya keamanan jaringan komputer?
2. Jelaskan Ancaman apa saja yang dapat terjadi pada data perusahaan?
3. Siapa sajakah musuh perusahaan berkaitan dengan keamanan data?
catatan :
Jawaban utama harus berasal dari materi di atas dan Jawaban langsung diposting di komentar dengan menuliskan nama dan NIM