Difference between revisions of "Keamanan Informasi Sederhana"
Onnowpurbo (talk | contribs) (Created page with " Information security Sensitive information such as personal information and identity, passwords are often associated with personal property (for example, bank accounts) and...") |
Onnowpurbo (talk | contribs) |
||
Line 1: | Line 1: | ||
+ | Informasi sensitif seperti informasi pribadi dan identitas, password sering dikaitkan dengan properti pribadi (seperti, misalnya, rekening bank) dan privasi dan mungkin menimbulkan masalah keamanan jika bocor. Akses dan penggunaan informasi pribadi yang tidak sah dapat mengakibatkan konsekuensi yang tidak baik seperti pencurian identitas, dan juga pencurian properti. Penyebab umum pelanggaran keamanan informasi meliputi: | ||
− | + | ==Phishing== | |
− | + | Phishing is a type of scam where the scammers disguise as a trustworthy source in attempt to obtain private information such as passwords, and credit card information, etc. through the internet. Phishing often occurs through emails and instant messaging and may contain links to websites that direct the user to enter their private information. These fake websites are often designed to look identical to their legitimate counterparts to avoid suspicion from the user. | |
− | |||
− | + | ==Internet scams== | |
− | Internet scams | ||
Internet scams are schemes that deceive the user in various ways in attempt to take advantage of them. Internet scams often aim to cheat the victim of personal property directly rather than personal information through false promises, confidence tricks and more. | Internet scams are schemes that deceive the user in various ways in attempt to take advantage of them. Internet scams often aim to cheat the victim of personal property directly rather than personal information through false promises, confidence tricks and more. | ||
− | Malware | + | |
+ | ==Malware== | ||
+ | |||
Malware, particularly spyware, is malicious software disguised as software designed to collect and transmit private information, such as passwords, without the user's consent or knowledge. They are often distributed through e-mail, software and files from unofficial locations. Malware is one of the most prevalent security concerns as often it is impossible to determine whether a file is infected, despite the source of the file. | Malware, particularly spyware, is malicious software disguised as software designed to collect and transmit private information, such as passwords, without the user's consent or knowledge. They are often distributed through e-mail, software and files from unofficial locations. Malware is one of the most prevalent security concerns as often it is impossible to determine whether a file is infected, despite the source of the file. |
Revision as of 20:00, 19 March 2018
Informasi sensitif seperti informasi pribadi dan identitas, password sering dikaitkan dengan properti pribadi (seperti, misalnya, rekening bank) dan privasi dan mungkin menimbulkan masalah keamanan jika bocor. Akses dan penggunaan informasi pribadi yang tidak sah dapat mengakibatkan konsekuensi yang tidak baik seperti pencurian identitas, dan juga pencurian properti. Penyebab umum pelanggaran keamanan informasi meliputi:
Phishing
Phishing is a type of scam where the scammers disguise as a trustworthy source in attempt to obtain private information such as passwords, and credit card information, etc. through the internet. Phishing often occurs through emails and instant messaging and may contain links to websites that direct the user to enter their private information. These fake websites are often designed to look identical to their legitimate counterparts to avoid suspicion from the user.
Internet scams
Internet scams are schemes that deceive the user in various ways in attempt to take advantage of them. Internet scams often aim to cheat the victim of personal property directly rather than personal information through false promises, confidence tricks and more.
Malware
Malware, particularly spyware, is malicious software disguised as software designed to collect and transmit private information, such as passwords, without the user's consent or knowledge. They are often distributed through e-mail, software and files from unofficial locations. Malware is one of the most prevalent security concerns as often it is impossible to determine whether a file is infected, despite the source of the file.