Computer network (LAN, MAN, and WAN) an enterprise (organization / institution / company) in the past managed centralized (centralized) but now many do not centrally managed network (Decentralized) or terdistribusi (distributed). Computer networks, physical and non-physical, is a valuable asset that must be kept secure. Physical asset value is calculated easily since the beginning of the security by means of human assisted in the start gate, a layer up to the main enterprise computer room. Non-physical assets (software and data) can be calculated in part and may be most difficult to count other relative price, and pengamanannya also not easy. With the rapid development of internet and technology and its implementation in a LAN (intranet) that cause the flow of information from within or outside the enterprise to the more dense, non-security physical assets can be seen more important than physical assets.
How the security of physical assets, non-first generation, [1], began in early 1980 when James P. Anderson has published the concept of computer security threat monitoring and surveillance. The core concept is the design of a system form a set of tools (tool) that can be used to audit the security administrator's computer. Early 1987 Dorothy E. Denning mempubilkasikan an Intrusion-detection model, [7], an expert system model real-time (real-time expert system) that is able to detect a variety of computer abuse (computer abuse) with the results of the audit noted the abnormal pattern of the system. In addition to record the activity of abnormal Denning also contains the means of intrusion as a result, the concept can be called Intrusion detection and reporting / response system (IDRS).
How security is to install another firewall, first published in 1991 which serves to block unwanted traffic. Firewalls can be regarded as a fortress surrounding a building with satpam the gate, while the IDRS can be seen as the post-post satpam in each door. Two ways this is a business network for security system from the intrusion of intentionally or not.
In the field of AI and intelligent ideas appear entity called the agent and examined after a lot of internet technology to develop. 1994, General Magic Inc.. introduce the term mobile agent (MA) in a white paper related to the MA programming language, called Telescript, [4]. MA is a program that can do every time the migration from one server / host server to another as the new location will be in place in a computer network.
Need support in wisata seo sadau
0 komentar:
Post a Comment