In a few latter years, growth and usage of technology of Internet fast once. just More and more of business circle, organizational, white colars, education, military, till individual**individual******* use this information technology service which is a more regular recognized by " the Information Superhighway".
In line with growth rate usage of Internet very, hence progressively there are also many applicationses required by consumer, like at application in free trade world by elektronik ( commerce electronic). But, this matter rather than without a hitch badness so that aspect security of computer network ( security network computer) becoming very important and popular and also is a[n absolute requirement or compulsion [in] future <> That way also in action Irak-As, visible of]usage of Internet very wide, start from report pervasion of TV, radio, communications of to warrior, antarsatuan combat, till warfare cyber [in] all area. This is first cyberwar in world where disinformasi is one of the peruntuh of Iraq soldier morale. Pursuant to result research into and survey and also various report concerning badness of computer that happened these days, known that in this time [there] no one even also computer network able to be assumed by 100% of peaceful computer virus attack, spam, e-mail of bomb, or infiltrated direct by all hackers. A experienced hacker easily hacking or enter computer network becoming his goals. Don’t be pursued by fact of the network have had peacemaker system.
Is added again a lot of site web in Internet offering informations concerning how to penetrate computer network ( penetrated) and deceive system security of him ( compromised security). Information " infernal" ad for in the form of program corps, or documentation of utiliti. Is more and more depended by modern society him of Indonesia to Internet disturb writer to try to to give picture in general regarding aspect security of computer network and also grow awareness security for user of Internet. Have many seminars, symposium, and also discussion with especial topic [regarding/ hit] security of computer network. A lot of questions which often pop out like: Is that computer network is peaceful enough? Do peaceful if/when going shopping through the internet without worrying someone steal information concerning our credit card? Do possibly someone know others password and use him without soybean cake? Can someone steal or others file manipulation? Can we have a peaceful communications path [in] Internet? What need to be studied concerning systems firewall, enkripsi, dekripsi, otentifikasi? etcetera. To reply all the questions very depended from his own problems level, very depended to each;every case that happened.
Why security of computer network needed? Description following could probably answer the the question simply and sensible. Cause, basically all of us wish privasi, security, and safeness in life, included in usage of network of Internet.<> We expect result of work of peaceful us and far possibility stolen, di-copy, or vanished. We also wish security when each other sending e-mail ( mail electronic) without worrying there is irresponsible ( users malicious) which can read, altering or vanishing e-mail news content. And last, we also wish moment security [do/conduct] purchasing transaction through the internet without having cold feet one can steal information in our credit card so that harm later.
Security of former computer network and now. At period of year 70-an, computer network usually only there are [in] big companies. the Computer network each other connecting each;every department and each;every branch to a operation center ( point control central). During the period understanding of security network also there are, but the principal focus of just for requirement all user in itselves network ( intranet) utilize minimization mount security risk ( risk security). Knowledge and also information concerning how to leak a computer network only known by people segelintir have special profession to, like consultant network, administrator network, etcetera. Until then a technology of fenomenal so called of Internet appear in year 1974, initiative of Bob Taylor, Director a Body Research Into Departmental Computer Defence of America ( Department Of Defence / dod), in a named by project is Advance of Research Project Agency ( ARPA). Initially, the project prepared to develop;build data communications network of antarpangkalan-pangkalan military, some universities, and joined company is in bond work with Dod. In this time, three a decay later;then, millions of consumer in all the world have exploited the technology. But, besides bringing very positive impact, Internet also have negative impact, like knowledge concerning leaking or meng- crack one computer network have become enough go forward.
Items of can be taken in direct studied last Internet even isn't it, most by [all] adolescent for the agenda of " trying" science which have the acquisition of. The example, only typed word " hacking" at most searcher machines ( engine search) like Yahoo, Google, Alta Vista, Web Crawler, etcetera, each and everyone earn easily get knowledge and information concerning activities hacking. Also the this topic of or classified by]erstwhile problem of secret or supersecret ( secret top) like way assemble explosive or bomb, or assemble fire arm etcetera now can be got in Internet only with mouse meng-click in computer sail. Proven in so many terrorism case like case terorist of Legian, always there exploiting the mentioned for the benefit of or target of his negativity. In this time many there are site- site hidden ( site hidden or of underground site) which do not enlist engine search even also offering immeasurable and information of utiliti program concerning security network able to di-downloaded free of charge, usefulness of to destroy or confuse a computer network system. But, like within reason endless encounter kindliness and badness, hence on the other side knowledge to protect a computer network also expand at full speed. Many Internet situs which also provide and informations of utiliti program to protect computer network, one of the example are Firewall.
This matter prove that in this time " Internet & Computer Network Securities" becoming cynosure to all consumers of good Internet evaluated from badness side and side kindliness of him. Security pass the way of pengaburan ( obscurity through security). Security system by pengaburan or make ketidakjelasan ( obscurity) use principle that a[n computer network can only be protected as long as there no from outside which enabled know everything concerning internal mechanism of network. A philosophy is which is very liked by many communities, as in military, governance, and industry.<> hidden information concerning the network system assumed or assumed that any him have peaceful, but in fact is not that way. These days all consumers of computer have educated better and soybean cake better also the way of overcoming a[n problems of computer. studied how a computer network and system work, to be added again with existence of transfer of information among humanity consumer of Internet, beside the existence of standardization and openness of desain computer system progressively make the way of the security effective becoming not again.
Evaluating aspect security of computer network. Technically very difficult to evaluate a computer network specificly. That all depended from many matterses, for example to the number of amounts of user or of client in computer networks by various existing points access, later;then model the network of and also version and type of Operating Systems-Nya added with deftness and membership and also knowledge of Administrator system or of Network Administrator-Nya alone. But, easy to and modestly there is a way to evaluate computer network security aspect, that is exploited entire/all or program of utiliti-utiliti concerning hacking ( tools hacking) which there are in Internet. Later;Then isn't it the computer network so that will earn to be seen hard how negative impacts which generated. Some or programs of utility the for example IP Scanner, IP Sniffer, Network Analyzer, Enamel of Bombs, Spamming, TCP Wrapper, Password Cracking, etcetera. In this way immediately can be seen by ability of the computer network security and security which is often referred by " Security Holes" or " Back Doors". Later;Then immediately can be taken by step of preventif for the memproteksi of computer network. About and hacking of cracking, in general able to isn't it activity of hacking is each;every activity or effort outside or permit of sepengetahuan the owner of network to enter a network and also try to steal file like file of password etcetera.
Or effort for the manipulation of data, stealing important files, or mortify others falsified identity-nya user. Perpetrator of referred as by hacker which consist of a or a group of people which is out for to on an ongoing basis penetrate system peacemaker of system operating a[n computer. All hacker which have experienced earn immediately know weakness of security system ( holes security) in a computer network system. Besides habit of hacker is continuing to look for new knowledge or new goals and they will each other informing one another him. But, basically all real hacker have an eye to to destroy datas in network. They are only trying ability to conquer a[n computer security system for the shake of separate satisfaction. Whereas a or a group of people which (it) is true intentionally intend to destroy and break integrity in all computer system network referred as action and the cracker of named by cracking. In general all cracker after succeeding to come into computer networks will direct activity of mutilation and crushing of important data till cause chaos to all user in using his computers. Activity of this craker is recognized easy and can is immediately known from impact result of activity which they conduct. Some job/activity way or methods which was often used by and hacker of cracker for example SPOOFING, that is a form activity of forgery where a hacker falsify ( masquerade to) identity a user till he/she succeed by ilegal or logon of login into one computer network impressing like user the genuiness.
SCANNER is a program which automatically will detect weakness ( weaknesses security) a computer in local network ( host local) and or computer in network with other location ( host remote). Therefore, by using this program, a hacker which by fisik reside in English earn easily find weaknesses security at a server in America and or in other world cleft, including in Indonesia, without having to leave his room! SNIFFER is word of is differ from " analyser network" functioning as a means of to monitor computer network. This appliance can be operated almost [at] entire/all protocol type like Ethernet, TCP / ip, IPX, and other. PASSWORD CRACKER is a program able to open enkripsi a password or on the contrary oppositely also to kill system security of password. DESTRUCTIVE DEVICES is a group of special made virus program to crushing of datas, among others Trojan Horse, Worms, Enamel of Bombs, and Nukes.
computer network protect.
There are some steps able to be used for to protec or improve ability of computer network system protec, for example formulated and make a policy concerning security system which is pledge ( policy security higher) and explain to all consumers concerning their rights and obligations in using network system. Later;Then consultancy with all experts security of computer system to get professional input concerning how to improve ability of system security of network had. newest version installation of or software of utility able to assist to solve problems of security of computer network. Employing a network administrator which have experienced to handle the network. Using system mechanism of authentikasi newest in network ( mechanism authentication advanced).
Always use technique of enkripsi in each;every the transfer of data communications or data. And do not less important installation a system of Firewall at computer network to protect Proxy Server. Equipments for the memproteksi of computer network. Administator Network or of system administrator of course need various equipments ( tools) to assist to to protect his computer network. Some tools even is (it) is true made special for the agenda of conducting network systems testing to know weakness and strength from a computer network system. Among Others, SATAN ( Security Administrator'S Tool Analysing Network for) later;then there is TCP WRAPPER to monitor last computer network of CRACK to security password testing. FIREWALL, is a system of protec to execute observation of data package traffic going to or leaving a computer network so that data package which have been checked can be accepted or refused or was even modified beforehand before entering or leaving the network.
Although equipments to conduct available hacking in number which many, do not all the equipmentseses can be utilized effectively, even some the equipmentses have date of out in this time so that not such a threat again. But so other equipments still very ampuh as weapon all hacker. Thereby, a consultant network is also required by professional opinion of him and also the aid of to improve total ability entire/all computer network system.don’t less important is to execute data up back by reguler ( daily, weekly, or monthly) to anticipate if/when happened loss or damage entire/all important data which caused by attack of hacker so that easily and quickly can be done by recovery entire/all computer network system. Later;Then all administrator system also have to diligent inform to all consumerses ( user) concerning rights and obligations of in using network. All user require to teach by the way of correctness use computer network safely like how to make password the goodness etcetera. In the end " security" are something which have never there is or will never there is in the world of network of Internet. Because, what we assume peacefully ( secure) at present moment proven*****proven**** will peaceful becoming not ( insecure) at a period of/to to come. Thus in principle Internet security only lah a story which will never end ( Is story never-ending another just It).