phising firewall
DESCRIPTION
TKJTRANSCRIPT
![Page 1: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/1.jpg)
CYBER SECURITYKeamanan Data Dalam Dunia Maya
![Page 2: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/2.jpg)
PHISHING
Cyber Security
Saturday, JUNE 13 2015
FIREWALL
![Page 3: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/3.jpg)
OVERVIEWO
VE
RV
IEW
Perkembangan teknologi informasi sangat pesat, terutama pada penggunaan internet, yang tidak lain disebabkan oleh perkembangan dalam bidang pendidikan dan pengetahuan.
Oleh karena perkembangan tersebut, maka juga perlu dikembangkannya pula sistem penanggulangan kejahatan dunia maya atau sistem keamanan komputer di dalam dunia maya atau dalam penggunaan internet supaya dalam penggunaan atau pengaksesan internet lebih terasa aman
![Page 4: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/4.jpg)
OVERVIEWIN
DIC
AT
OR
![Page 5: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/5.jpg)
CONTENTA
BO
UT
PH
ISIN
G
Dalam presentasi ini membahas tentang kejahatan dunia maya dengan metode phising.
![Page 6: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/6.jpg)
CONTENTP
HIS
ING
Phising adalah tindakan memperoleh informasi pribadi seperti User ID, Password, PIN, nomor rekening bank, nomor kartu kredit secara tidak sah. Informasi ini kemudian akan dimanfaatkan oleh pihak penipu untuk mengakses rekening, manipulasi data dan disalah gunakan tanpa sepengetahuan pemilik akun/nomor-nomor yang sifatnya confedential.
Adapun phising yang marak dilakukan adalah :Social Media, E-Banking, PayPal, Website Commercial, Gaming Reporting Data, dsb
![Page 7: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/7.jpg)
PHISHING SCENARIOP
HIS
ING
S
CE
NA
RIO
![Page 8: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/8.jpg)
How phishing doing?P
HIS
ING
S
CE
NA
RIO
Teknik umum yang sering digunakan oleh penipu adalah sebagai berikut:
Penggunaan alamat e-mail palsu dan grafik untuk menyesatkan Nasabah sehingga Nasabah terpancing menerima keabsahan e-mail atau web sites. Agar tampak meyakinkan, pelaku juga seringkali memanfaatkan logo atau merk dagang milik lembaga resmi, seperti; bank atau penerbit kartu kredit. Pemalsuan ini dilakukan untuk memancing korban menyerahkan data pribadi, seperti; password, PIN dan nomor kartu kreditMembuat situs palsu yang sama persis dengan situs resmi.atau . pelaku phishing mengirimkan e-mail yang berisikan link ke situs palsu tersebut.Membuat hyperlink ke web-site palsu atau menyediakan form isian yang ditempelkan pada e-mail yang dikirim.
![Page 9: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/9.jpg)
DEMOP
HIS
ING
S
CE
NA
RIO
Teknik umum yang sering digunakan oleh penipu adalah sebagai berikut:
Penggunaan alamat e-mail palsu dan grafik untuk menyesatkan Nasabah sehingga Nasabah terpancing menerima keabsahan e-mail atau web sites. Agar tampak meyakinkan, pelaku juga seringkali memanfaatkan logo atau merk dagang milik lembaga resmi, seperti; bank atau penerbit kartu kredit. Pemalsuan ini dilakukan untuk memancing korban menyerahkan data pribadi, seperti; password, PIN dan nomor kartu kreditMembuat situs palsu yang sama persis dengan situs resmi.atau . pelaku phishing mengirimkan e-mail yang berisikan link ke situs palsu tersebut.Membuat hyperlink ke web-site palsu atau menyediakan form isian yang ditempelkan pada e-mail yang dikirim.
![Page 10: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/10.jpg)
Product 1• Product A• Product B
Product 2• Product C• Product D
Product 3• Product E• Product F
PHISHING
![Page 11: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/11.jpg)
40%
30%
30%
DISTRIBUTION
Lorem ipsum
Dolor sit amet.
Consectetur
Adipiscing elit.
Fusce Gravida
Pellentesque purus.
![Page 12: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/12.jpg)
Lists
List 1
• Lorem ipsum• Lorem ipsum• Lorem ipsum
List 2
• Lorem ipsum• Lorem ipsum
List 3
• Lorem ipsum• Lorem ipsum
![Page 13: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/13.jpg)
Praesent Nisi
Fusce Gravida
Consectetur
Lorem ipsum
PROGRAMS
Lorem ipsum
Dolor sit amet
Consectetur
Adipiscing elit.
Fusce Gravida
Pellentesque purus.
Praesent Nisi
Qquam, mattis in
![Page 14: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/14.jpg)
Cycle and Process
1
2
34
5
Lorem Ipsum
Lorem
Ipsum
Lorem
Ipsum
Lorem Ipsum
Lorem Ipsum
![Page 15: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/15.jpg)
Process
Lorem Ipsum
Lorem Ipsum
Lorem Ipsum
Lorem Ipsum
Lorem Ipsum
![Page 16: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/16.jpg)
STEP BY STEP
STEP 1• Lorem Ipsum
STEP 2• Lorem Ipsum
STEP 3• Lorem Ipsum
STEP 4• Lorem Ipsum
![Page 17: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/17.jpg)
CHART & PICTURE PLACEHOLDER
Feature
PowerPoint 2007, 2010, 2013
![Page 18: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/18.jpg)
Column Chart
Edit Data
Right click chart and choose
Edit Data.
Cara Edit Data
Klik kanan chart dan pilih
Edit Data.Category 1
Category 2Category 3
4.3
2.5
3.5
![Page 19: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/19.jpg)
PICTURE PLACEHOLDER
![Page 20: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/20.jpg)
SHAPES
Feature
PowerPoint 2007, 2010, 2013
![Page 21: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/21.jpg)
Social Networks
Google+
computer1001
Twittercomputer1001
computer1001
![Page 22: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/22.jpg)
Contact Us
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce gravida pellentesque purus.
ADDRESSRoad No 1 ABC CityCountry 99999
PHONE011-123456, 011-065432
FAX011-123999
WEBSITEwww.computer1001.com
![Page 23: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/23.jpg)
www.computer1001.com
THANK YOU
![Page 24: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/24.jpg)
PICTURE SMARTARTNew Feature
PowerPoint 2010, 2013
![Page 25: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/25.jpg)
VEGETABLES
PRODUCT A
FRUITS
PRODUCT B
PASTRIES
PRODUCT C
BEVERAGES
PRODUCT D
PICTURE
LAYOUT
PowerPoint
2010 - 2013
![Page 26: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/26.jpg)
Meet the Team
Creative Director• Lorem ipsum
Creative Director• Lorem ipsum
Creative Director• Lorem ipsum
![Page 27: Phising Firewall](https://reader035.vdocuments.site/reader035/viewer/2022081421/563dbba5550346aa9aaefddc/html5/thumbnails/27.jpg)
License
• Designed by: Imeily - http://www.computer1001.com• This work is licensed under a
Creative Commons Attribution-NonCommercial 3.0 Unported License.
• Attribution:– Pictures: http://office.microsoft.com/en-us/images/?CTT=97– Icons: “Modern UI Icons” set by Austin Andrews
http://modernuiicons.com/