Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 17133 dokumen yang sesuai dengan query
cover
"Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer."
Waltham, MA: Elsevier, 2013
e20426797
eBooks  Universitas Indonesia Library
cover
Waltham, MA: Syngress, 2014
005.8 CYB
Buku Teks SO  Universitas Indonesia Library
cover
Maiwald, Eric
New York: McGraw-Hill Technology Education, 2004
005.8 MAI f
Buku Teks SO  Universitas Indonesia Library
cover
Vacca, John R.
"This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.
Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms.
Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements :
• Checklists throughout each chapter to gauge understanding
• Chapter Review Questions/Exercises and Case Studies
• Ancillaries: Solutions Manual; slide package; figure files"
Waltham, MA: Syngress, 2014
e20426913
eBooks  Universitas Indonesia Library
cover
Wheeler, Evan
Amsterdam: Syngress, 2011
005.8 WHE s
Buku Teks SO  Universitas Indonesia Library
cover
Rafli Raditya
"Masalah kemanan di bidang informasi dan teknologi telah menjadi sesuatu yang penting dalam kinerja perusahaan. Keamanan jaringan yang digunakan patutnya dapat berjalan dengan optimal sehingga tidak membebani kinerja pekerjaan lainnya. Upaya optimasi sangat penting dan harus terus dilakukan untuk mendirikan sebuah jaringan berkeamanan tinggi dan mudah dikelola dalam jangkauan penggunaan yang luas. Firewall Fortigate sebagai perangkat yang dapat memberi keamanan jaringan dan kemudahan manajemen jaringan selayaknya dapat dikonfigurasi dengan optimal dan efisien. IPv4 Policy pada perangkat Firewall Fortigate merupakan konfigurasi yang sangat penting bagi kelangsungan kinerja jaringan yang aman dan optimal dengan memanfaatkan perangkat Firewall Fortigate di jaringan tersebut. Optimasi konfigurasi IPv4 Policy yang tepat pada perangkat Firewall Fortigate diharapkan akan menciptakan kinerja jaringan yang optimal dan efisien dengan nilai parameter QoL yang memenuhi standar kualitas yang telah ditentukan.

Security in the field of information and technology have become so much more important than ever, especially for the important of company 39 s performance. Network security should run optimally so as not to burden the performances of other works. There has to be a lot of efforts being put to improve network security and its performance. Fortigate Firewall as a network security and network management devie is to be configured with utmost importancy and optimicy to reach its maximum potential to be an efficient network device. IPv4 Policy on Fortigate 39 s own implementation is a very important aspect for the device performance in securing and optimizing the network performance. Optimization on IPv4 Policy of Fortigate Firewall device is likely to become an important thing to improve the quality of network, such that the QoL parameters with good quality and desiganted standards."
Depok: Fakultas Teknik Universitas Indonesia, 2018
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Raphael Bianco Huwae
"Keamanan pada suatu sistem jaringan perusahaan sangatlah diperlukan. Tingkat availability yang tinggi di suatu server perusahaan menjadi aset berharga untuk mencapai profit perusahaan tersebut. Gangguan jaringan yang dialami perusahaan akan berdampak ke seluruh stakeholder perusahaan. Keamanan yang dilakukan menggunakan aplikasi firewall dinilai belum cukup untuk melindungi jaringan perusahaan. Penggunaan IDS pada suatu jaringan juga membutuhkan keahlian khusus dari administrator untuk terus menerus dapat memantau keamanan jaringan. Agar dapat melakukan pemantauan yang efektif dan hemat tenaga maka dilakukan penelitian untuk mendeteksi intrusi pada suatu keamanan jaringan dan melakukan reporting dengan menggunakan suatu bot Telegram. Penggunaan bot Telegram ini diharapkan akan memberikan suatu sistem reporting otomatis yang menyederhanakan proses monitoring pada suatu kegiatan berulang agar informasi terhadap serangan dari luar akan lebih cepat terdeteksi. Peringatan bahaya dikirim berupa notifikasi yang diintegrasikan pada aplikasi Telegram baik melalui smartphone maupun PC dengan berbentuk log alert yang dapat menampilkan waktu kejadian, IP yang diserang, IP attacker dan jenis serangan yang dilakukan. Dengan melakukan implementasi monitoring secara realtime terhadap jaringan melalui telegram maka baik pihak “IT” maupun “non IT” akan dapat mendapat informasi terhadap intrusi tersebut agar dapat melakukan reporting secara cepat.

Corporate network system security is very important. A high level of availability on a company's server becomes a valuable asset to achieve the company's profit. Server or network disruptions experienced by the company will affect all stakeholders of the company. Security measure carried out using a firewall application is not enough to protect corporate networks. The use of IDS on a network also requires special expertise from the administrator to continuously be able to monitor network security. In order to be able to carry out effective and energy-efficient monitoring, a study was conducted to detect intrusion in a network security and report it using a Telegram bot. The use of this Telegram bot is expected to provide an automatic reporting system that simplifies the process of monitoring a recurring activity so that information on attacks from outside will be responded more quickly. Danger alerts are sent in the form of messages that are integrated into Telegram applications both via smartphones and PCs in the form of log alerts that can display the time of occurrence, server IP being attacked, IP attacker and type of attack carried out. By implementing real-time monitoring of the network via telegram, both "IT" and "non-IT" parties will be able to obtain information on the intrusion so that they can make fast responses."
Depok: Fakultas Teknik Universitas Indonesia, 2021
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Eka Putra Mahardika P.
"Infrastruktur TI merupakan sebuah dasar dan pondasi bagi seluruh sistem informasi yang dijalankan di dalam sebuah organisasi dalam mengatur sumber daya yang menjadi sebuah kebutuhan dasar. Sistem informasi yang dimiliki oleh sebuah organisasi merupakan layanan yang akan diberikan kepada pengguna, dalam hal ini organisasi pemerintah menghadirkan sebuah layanan-layanan yang akan dipergunakan oleh publik atau masyarakat. Layanan yang selalu tersedia, handal dan dinamis dapat mengikuti kebutuhan strategis organisasi membutuhkan arsitektur TI yang terjamin ketersediaannya, handal dan dapat secara dinamis mengalokasikan dan mengatur kebutuhan sumber daya yang akan dibutuhkan oleh sistem informasi sebagai layanan kepada masyarakat. Untuk menghadirkan hal tersebut, perlu sebuah rancangan dan perencanaan arsitektur yang adaptif, berbasis layanan, tersembunyi secara fisik dari pengelola layanan dan pengguna akhir, terstandarisasi, dan menggunakan teknik virtualisasi dalam mengelola kolam sumber daya arsitektur yang akan diberikan kepada pengelola layanan. Komputasi virtualisasi adalah salah satu teknik yang akan dipergunakan, dengan mengembangkan model service-oriented infrastructure dengan menggunakan kerangka kerja TOGAF, infrastruktur berbasis layanan tersebut akan dirancang agar dapat beradaptasi dengan kebutuhan strategis organisasi pada Kementerian Perdagangan. Teknik ini selain dapat mempermudah dalam peningkatan sumber daya secara singkat, menjamin ketersediaan dan kehandalan layanan, layanan yang terstandarisasi, mengurangi tingkat kerumitan infrastruktur dan mengurangi biaya pemeliharaan dan penyediaan perangkat baru. Standardisasi infrastruktur TI diperlukan untuk menjaga rancangan arsitektur dan infrastruktur TI yang saling terintegrasi dan interoperabilitas untuk menghadirkan layanan kepada publik yang dapat diandalkan.

IT infrastructure is a basis and foundations for all information systems are implemented in an organization to manage the resources become a basic requirement. Information system held by an organization is a service to be provided to the users, in this case government organizations deliver a services that will be used by the public or the community. Service always available, reliable and able to follow the dynamic needs of the organization's strategic IT architecture requires a guaranteed availability, reliable and be able to dynamically allocate and manage resource requirements that will be needed by the system information as a service to the community. To deliver this, needs a design and planning an adaptive architecture, service-based, physically hidden from management and end-user services, standardized, and using virtualization techniques in managing the resource pool architecture that will be given to the Administrator. Computing virtualization is one of the techniques to be used, by developing a model of service-oriented infrastructure using TOGAF framework, service-based infrastructure will be designed to adapt to the strategic needs of the organization at the Ministry of Trade. This technique can facilitate in besides increased resources briefly, ensure availability and reliability of services, standardized services, reduce infrastructure complexity and reduce the cost of maintenance and the provision of new devices. Standardization of the IT infrastructure required to maintain the architecture and design of an integrated IT infrastructure and interoperability to deliver services to the public is reliable."
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2013
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
cover
London: Imperial College Press, 2014
005.8 DAT
Buku Teks SO  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>