Keamanan Komputer – Tugas I

Soal Latihan:

  1. Jelaskan perbedaan vulnerability, threat, dan control!
  2. Pencurian biasanya mengakibatkan beberapa dampak buruk. Misalnya, jika seseorang mencuri mobil anda, anda akan mengalami kerugian finansial, ketidaknyamanan (karena kehilangan moda transportasi), menjadi temperamental (karena pembajakan hak milik pribadi). Sebutkan tiga dampak negatif yang dialami sebuah perusahaan jika terjadi pencurian terhadap perangkat komputer!
  3. Apa yang anda ketahui tentang serangan SQL Injection?
  4. Consider a program that allows consumers to order products from the web. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?
  5. Consider a program to accept and tabulate votes in an election. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?
  6. Consider a program that allows a surgeon in one city to assist in an operation on a patient in another city via an Internet connection. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?
This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *