KEAMANAN JARINGAN | 3.1.1 MEMAHAMI SISTEM KEAMANAN JARINGAN - FASE F (SMK TJKT) | Walid Umar | YouTubeToText
YouTube Transcript: KEAMANAN JARINGAN | 3.1.1 MEMAHAMI SISTEM KEAMANAN JARINGAN - FASE F (SMK TJKT)
Skip watching entire videos - get the full transcript, search for keywords, and copy with one click.
Share:
Video Transcript
Available languages:
View:
Assalamualaikum warahmatullahi
wabarakatuh in this video we
will start the discussion material related to
network security systems, yes, so on
this occasion we will start from
topic one, namely understanding
network security systems and the possibility of
potential threats, well, we
will divide the material into three video parts, yes,
or three video parts, so in
this first part we will learn
How network security systems network
security systems or network
security systems are
security systems that aim to identify,
identify,
analyze, and prevent unauthorized access
to a network system, well,
this effort aims to prevent
potential and attacks carried out
from both internal and external networks,
in other words, the network security system
functions to anticipate and
prevent threats of attacks to carry out
damage, yes, or attacks to
damage the network system, both
logically and physically, yes, the network
security system includes
personal networks, yes, private networks and
public networks, a network security system
or a protection system
must exist even on our personal devices
or laptops or our gadgets on
our laptops, we know Windows, if
we use a Windows-based operating system,
we know that there is a
built-in application, yes, Windows Defender,
where or firewall, yes, whose function
is to prevent attacks
aimed directly at
our personal devices, such as where the network
involves access, yes, authority to data
that is in one network as an
initial security effort to protect
our data or system Usually we use
use
authentication or
username and password authority
then the question is
How important is a
network security system technology as
we have explained above
security systems have an important role
in maintaining network security both in
small scale networks, medium scale
and large scale yes Global scale
the rise of cyber attack threats can
affect anyone indiscriminately yes
including private or
corporate networks yes we know together in the
near future we hear several
reports yes reports about
data loss or data theft yes this
makes us
aware that a network security system
is very important as for me I
can divide yes the
types of cyber threats into
several categories the first is
modification or network security threats
this is an attack that has the
most fatal impact because
modification is a condition where the
attacker yes or intruder has
changed and damaged the entire system
second interception this threat yes
related to access to a network
in this case the intruder yes or
attacker will do various ways to
to
gain access to information
to the network or to the user's device
third fabrication or Attacks
carried out by the perpetrator in the form of inserting
fake data or objects into the
the attacker can enter at any time using a
using a
backdoor or door that has been
created Yes, the next fourth is
interruption or Interaction is a
type of threat that can occur without
us realizing it, yes, by the administrator
or user, the intruder or
attacker usually has succeeded in
gaining access, usually without changing
any information. This means that the
administrator or user can still be
able to log in, but the
attacker can retrieve the data
he needs.
Of the four categories of cyber threats
above, network security is certainly an
important thing and cannot be
underestimated in a
network infrastructure in a company because
network security has several
benefits that can indirectly
increase the level of trust and
integrity of a company, including the
including the
first protecting the network system
from virus attacks, yes, Malware Spyware
or potential threats that have been
explained above, which are feared to be
able to endanger important data or
credentials in a company. Well, in the
last few months we
shared news about
ransomware attacks so that some of the data
in the company cannot be
accessed because the extension has changed.
Well, in exchange
for re-describing the
important data, the broadcaster
offers or requires the
user to pay a certain amount of
money to be able to access the
detrimental for the company or for individuals.
individuals.
Okay, let's continue with the second, yes, the
important thing, yes, the importance of a network
security system is to
minimize the risk. sabotage and
theft of sensitive information the third
ensures all information and data on the
network remains secure which then
detects suspicious activity and access
from users who do not
have access rights or authority from
some of the benefits that we have read
above we both already know the
importance of a network security system yes
yes
we have understood the importance of a
network economic system in the flow of
business processes Well next in the
next video we will discuss the types of
types of
systems that we can apply to
secure the network Okay now we
have reached the end of the video yes so
our goal is to conclude a little the purpose of
building a computer network security system
is to anticipate threats
in the form of physical or logical
both directly and
indirectly that can disrupt the
running of a network system or
application on the network we
need to know that there is no
perfect system But that does not mean we do
not need security for
our network system well At least we
can implement a network security system
to prevent
threats that can harm the company
in addition to implementing the system We can also
educate users or
administrators to know more
about network security okay that's all the
video discussion yes on the
tjkt learning playlist for
network security in phase F this time we will
continue in the next part regarding network security wassalamualaikum
wassalamualaikum
Click on any text or timestamp to jump to that moment in the video
Share:
Most transcripts ready in under 5 seconds
One-Click Copy125+ LanguagesSearch ContentJump to Timestamps
Paste YouTube URL
Enter any YouTube video link to get the full transcript
Transcript Extraction Form
Most transcripts ready in under 5 seconds
Get Our Chrome Extension
Get transcripts instantly without leaving YouTube. Install our Chrome extension for one-click access to any video's transcript directly on the watch page.