panduan belajar keselamatan ict internet security

Upload: linuxmalaysia-malaysia

Post on 04-Apr-2018

237 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 Panduan Belajar Keselamatan Ict Internet Security

    1/4

    Hcnc \uku M`gchirco M`s`ncgctco Magput`r Lco Iot`ro`t (ID\)

    Crdhiv` ;-

    http;//dimfudyb`r.bnafspat.dag/2:32/33/hcnc-tuku-m`gchirco-m`s`ncgctco.htgn

    Zcoluco riofmcs ioi scyc s`licmco cpcbinc s`arcof schcbct b`rtcoyc t`otcof m`gchircom`s`ncgctco !" ycof b`nicu ban`h p`nckcri lco mucsci. #cncg bilcof m`s`ncgctco !"

    $Ioeargctiao T`durity) s`dcrc ugug t`rbchcfi m`pclc tifc bchcfico.

    3. %`okcncomco m`rkc-m`rkc g`ofuctmco $hcrl`oiof& p`rtchcoco s`rv`r lcncg sist`g

    rcofmcico $'`t(arm&.

    2. %`okcncomco m`rkc-m`rkc culit m`pclc s`rv`r lco sist g rcofmcico lcncg

    g`gcstimco sist`g p`rtchcoco lcncg m`clcco bcim.

    ). %`okcncomco ukico s`rcofco colc s`oliri bcfi g`ofuki p`rtchcoco $Z`ot`st&

    *`bcfci p`rguncco+ guncmco l`ofco hcrl`oiof lco g`gbuct culit s`rv`r. ,cgco (`bDIT`durityg`oy`licmco p`nbcfci lamug`o b`odhgcrmycof ban`h lifuocmco s`bcfcirukumco lcncg uschc hcrl`oiof s`rv`r. *inc rukum ncgco (`b ioi ;-

    http;//b`odhgcrms.dis`durity.arf/`o-us/raut`l`cunt

    imc colc p`offuoc buotu *`rv`r+ sinc #a(onacl lamug`o b`rtckum #`bico ,iou

    4`odhgcrm. 4cdc lco imut crchco-crchco lco pcoluco ycof lib`rimco. oi t`rgcsum

    http://cikgucyber.blogspot.com/2012/11/hala-tuju-kemahiran-keselamatan.htmlhttp://benchmarks.cisecurity.org/en-us/?route=defaulthttp://benchmarks.cisecurity.org/en-us/?route=defaulthttp://cikgucyber.blogspot.com/2012/11/hala-tuju-kemahiran-keselamatan.html
  • 7/31/2019 Panduan Belajar Keselamatan Ict Internet Security

    2/4

    p`ok`ncsco g`ofcpc ic p`rnu lincmumco lcncg uschc hcl`oiof s`rv`r.

    otum hcrl`oiof p`osikinco s`p`rti ,Z3 lco ,Z2 clcnch sikin ycof mitc p`rnu cgbinuotum oincimco liri mitc. ,c(ct ,iou Zra`ssiaocn ostitut` $,Z& http;//(((.npi.arf/

    uotum gcmnugct ncokut p`rsikinco ioi. #i %cncysic sinc s`rtci

    Ecd`baam NZI Gcncysichttp;//(((.cd`baam.dag/,Z.%cncysic

    *`n`pcs mitc hcrl`o s`rv`r sulch t`otu mitc h`olcm g`ofuki m`gcgpuco ic.

  • 7/31/2019 Panduan Belajar Keselamatan Ict Internet Security

    3/4

    lco kufc lisioi uotum nctihco bcfi g`ofuctmco 7`b Cppnidctiao+ 1"`b #nidctiao%&naits col '`e`os`s1

    https;//faafn`-fruy`r`.cppspat.dag/

    cofco nupc m`pclc *gcrt phao` s`durity t`rutcgcoyc t`n`pao bigbit ycof likcncomcoan`h ?aafn` Colrail. 4an`h fuocmco pcoluco ioi s`bcfci p`rguncco.

    http;//b`odhgcrms.dis`durity.arf/`o-us/raut`la(onacls.sha(.siofn`.colrail.3::

    https://google-gruyere.appspot.com/http://benchmarks.cisecurity.org/en-us/?route=downloads.show.single.android.100https://google-gruyere.appspot.com/http://benchmarks.cisecurity.org/en-us/?route=downloads.show.single.android.100
  • 7/31/2019 Panduan Belajar Keselamatan Ict Internet Security

    4/4

    Ncgco-ncgco w`b ycof lidclcofmco uotum lincwcti uotum b`ritc bufs lcogcscnch m`s`ncgctco ID\

    http;//(((.niou.dag/

    http;//(((.scos.arf/

    http;//(((.dyb`rs`durity.gy/

    Lcpctmco oatis m`s`ncgctco t`rmioi lcripclc ncgco-ncgco w`b b`rimut ;-

    http;//(((.mb.d`rt.arf/vuns/

    http;//pcdm`tstargs`durity.arf/

    http;//(((.gyd`rt.arf.gy/

    http;//isd.scos.`lu/$ot`ro`t *targ !`ot`r&

    ?uocmco ?aafn` uotum g`of`tchui gcoc-gcoc ncgco (`b ycof guofmio g`gpuoycigcscnch bufs ctcu `pnait.

    http;//(((.`pnait-lb.dag/faafn -larms/

    Colc ban`h lctcrmco ncgco (`b colc l`ofco ?aafn` 7`bgcst`r "aans uotum

    g`of`tchui s`bcrcof p`rubchco ycof b`rncmu lcncg isi mcoluofco ncgco (`b colc.

    https;//(((.faafn`.dag/(`bgcst`rs/taans/

    %afc ic g`okcli pcoluco s`guc.

    crisecinnch *cg`n cmc Niou&Gcncysic

    5 'av 2:32

    "his (arm is nid`os`l uol`r th` !r`ctiv` !aggaos Cttributiao-'ao!agg`rdicn-

    *hcr`Cnim` 2.J %cncysic ,id`os`. "a vi`( c dapy a this nid`os`+ visithttp;//dr`ctiv`daggaos.arf/nid`os`s/by-od-sc/2.J/gy/ ar s`ol c n`tt`r ta !r`ctiv`

    !aggaos+ J) 8a(crl *tr``t+ Jth Bnaar+ *co Brcodisda+ !cniaroic+ D3:J+ *C.

    http://www.linux.com/http://www.sans.org/http://www.cybersecurity.my/http://www.kb.cert.org/vuls/http://packetstormsecurity.org/http://www.mycert.org.my/http://isc.sans.edu/http://www.exploit-db.com/google-dorks/https://www.google.com/webmasters/tools/http://creativecommons.org/licenses/by-nc-sa/2.5/my/http://www.linux.com/http://www.sans.org/http://www.cybersecurity.my/http://www.kb.cert.org/vuls/http://packetstormsecurity.org/http://www.mycert.org.my/http://isc.sans.edu/http://www.exploit-db.com/google-dorks/https://www.google.com/webmasters/tools/http://creativecommons.org/licenses/by-nc-sa/2.5/my/