Difference between revisions of "Keamanan Informasi Sederhana"
Onnowpurbo (talk | contribs) |
Onnowpurbo (talk | contribs) |
||
Line 6: | Line 6: | ||
Phishing is a type of scam where the scammers disguise as a trustworthy source in attempt to obtain private information such as passwords, and credit card information, etc. through the internet. Phishing often occurs through emails and instant messaging and may contain links to websites that direct the user to enter their private information. These fake websites are often designed to look identical to their legitimate counterparts to avoid suspicion from the user. | Phishing is a type of scam where the scammers disguise as a trustworthy source in attempt to obtain private information such as passwords, and credit card information, etc. through the internet. Phishing often occurs through emails and instant messaging and may contain links to websites that direct the user to enter their private information. These fake websites are often designed to look identical to their legitimate counterparts to avoid suspicion from the user. | ||
− | ==Internet | + | ==Penipuan Internet / scam== |
− | + | Penipuan internet adalah skema untuk menipu pengguna dengan berbagai cara dalam upaya memperoleh keuntungan. Penipuan internet sering bertujuan untuk menipu korban untuk memperoleh barang pribadi secara langsung daripada informasi pribadi melalui janji-janji palsu, membuat tidak percaya dirii dan banyak lagi. | |
==Malware== | ==Malware== | ||
Malware, particularly spyware, is malicious software disguised as software designed to collect and transmit private information, such as passwords, without the user's consent or knowledge. They are often distributed through e-mail, software and files from unofficial locations. Malware is one of the most prevalent security concerns as often it is impossible to determine whether a file is infected, despite the source of the file. | Malware, particularly spyware, is malicious software disguised as software designed to collect and transmit private information, such as passwords, without the user's consent or knowledge. They are often distributed through e-mail, software and files from unofficial locations. Malware is one of the most prevalent security concerns as often it is impossible to determine whether a file is infected, despite the source of the file. |
Revision as of 20:03, 19 March 2018
Informasi sensitif seperti informasi pribadi dan identitas, password sering dikaitkan dengan properti pribadi (seperti, misalnya, rekening bank) dan privasi dan mungkin menimbulkan masalah keamanan jika bocor. Akses dan penggunaan informasi pribadi yang tidak sah dapat mengakibatkan konsekuensi yang tidak baik seperti pencurian identitas, dan juga pencurian properti. Penyebab umum pelanggaran keamanan informasi meliputi:
Phishing
Phishing is a type of scam where the scammers disguise as a trustworthy source in attempt to obtain private information such as passwords, and credit card information, etc. through the internet. Phishing often occurs through emails and instant messaging and may contain links to websites that direct the user to enter their private information. These fake websites are often designed to look identical to their legitimate counterparts to avoid suspicion from the user.
Penipuan Internet / scam
Penipuan internet adalah skema untuk menipu pengguna dengan berbagai cara dalam upaya memperoleh keuntungan. Penipuan internet sering bertujuan untuk menipu korban untuk memperoleh barang pribadi secara langsung daripada informasi pribadi melalui janji-janji palsu, membuat tidak percaya dirii dan banyak lagi.
Malware
Malware, particularly spyware, is malicious software disguised as software designed to collect and transmit private information, such as passwords, without the user's consent or knowledge. They are often distributed through e-mail, software and files from unofficial locations. Malware is one of the most prevalent security concerns as often it is impossible to determine whether a file is infected, despite the source of the file.