TECHNOTIK 2012, STMIK DIPANEGARA
   Seminar Keamanan Jaringan Komputer, 22 November 2012




OSI LAYER DAN PERSPEKTIF
       KEAMANANNYA




              Nurkholish Halim
        Email: nurkholish@IEEE.org
Introduction – computer security

   Network Security
    Intrusion Prevention/Detection Systems
    Packet Filtering
   Application Security
    Secure Coding
    Static Analysis
   User Security
    Awareness Training
    Social Engineering
The OSI Layer



                  Video




         Ref: http://www.youtube.com/watch?v=fiMswfo45DQ
Physical Layer
   Keystroke Logging
   Lockpicking
   Cutting (Cable Disconnect)
Data Link Layer
   Packet Sniffing
   MAC Address Spoofing
   ARP Cache Poisoning and Flooding (MITM)
   WEP Cracking
   VLAN Attack
Network Layer
   Ping Flood (ICMP Flood)
   Fingerprinting
   Port Knocking
   IPSec Attack
Transport layer
   TCP Flooding
   UDP Flooding
Session layer
   Session Hijacking
   NetBIOS user enumeration
   Attacks on the Session Description Protocol
    (SDP)
   and the Session Initiation Protocol (SIP)
   DNS Poisoning
   L2TP Attack
Presentation layer
   SSL MITM
   SSL DoS
   SMB Attack
   Kerberos Service Attack
Application layer
   BufferOverflow
   SQLi, RFI, LFI
   HTTP DoS
   APPS Auth BruteForce
Layer 8 ….???



   Social Engineering!
Attack And Secure!



            Demo…

More Related Content

PPTX
Web application attacks
PPT
Introduction To OWASP
PPTX
OWASP Top 10 2021 What's New
PDF
Secure Code Review 101
PDF
Broken access control
PDF
Penetration testing & Ethical Hacking
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PPTX
Penetration Testing
Web application attacks
Introduction To OWASP
OWASP Top 10 2021 What's New
Secure Code Review 101
Broken access control
Penetration testing & Ethical Hacking
Application Security | Application Security Tutorial | Cyber Security Certifi...
Penetration Testing

What's hot (20)

PPTX
Burp suite
PPTX
Malware- Types, Detection and Future
PPTX
Introduction to Metasploit
 
PDF
Web Application Security 101
PPTX
System hacking
 
PPTX
CSE-Ethical-Hacking-ppt.pptx
PDF
Cross site scripting attacks and defenses
PDF
OWASP Top 10 Web Application Vulnerabilities
PPTX
Mobile security
PPTX
iOS Application Static Analysis - Deepika Kumari.pptx
PPTX
VAPT PRESENTATION full.pptx
PPT
Web Application Security Testing
PPT
Introduction to Web Application Penetration Testing
PPT
Operating system vulnerability and control
PPTX
Denial of Service Attack
PPT
Intro to Web Application Security
PPTX
Advanced persistent threat (apt)
PPTX
Secure coding practices
PPTX
Brute force-attack presentation
Burp suite
Malware- Types, Detection and Future
Introduction to Metasploit
 
Web Application Security 101
System hacking
 
CSE-Ethical-Hacking-ppt.pptx
Cross site scripting attacks and defenses
OWASP Top 10 Web Application Vulnerabilities
Mobile security
iOS Application Static Analysis - Deepika Kumari.pptx
VAPT PRESENTATION full.pptx
Web Application Security Testing
Introduction to Web Application Penetration Testing
Operating system vulnerability and control
Denial of Service Attack
Intro to Web Application Security
Advanced persistent threat (apt)
Secure coding practices
Brute force-attack presentation
Ad

Similar to OSI Layer Security (20)

PPTX
The Network Protocol Stack Revisited
PPT
SYSTEM SECURITY - Chapter 1 introduction
PDF
ADVANCED PENETRATION TESTING.pdf
PDF
Cisel1 d
PPTX
LogChaos: Challenges and Opportunities of Security Log Standardization
PDF
watch out Hackersprey cybersecurity syllabus
DOCX
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
DOCX
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
DOCX
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
DOCX
Ceh certified ethical hacker
PDF
10. sig free a signature free buffer overflow attack blocker
PDF
OpenSource IoT Middleware Frameworks
PDF
Dns Hardening Linux Os
PPTX
Understanding the Threat Landscape by SOPHOS
PDF
Deepthi ratnayake
PPT
ECE 6570 Class01
PDF
Networking and communications security – network architecture design
PPTX
Automotive security (cvta)
PPTX
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
PPTX
OSI Model this seven features and works.pptx
The Network Protocol Stack Revisited
SYSTEM SECURITY - Chapter 1 introduction
ADVANCED PENETRATION TESTING.pdf
Cisel1 d
LogChaos: Challenges and Opportunities of Security Log Standardization
watch out Hackersprey cybersecurity syllabus
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
Ceh certified ethical hacker
10. sig free a signature free buffer overflow attack blocker
OpenSource IoT Middleware Frameworks
Dns Hardening Linux Os
Understanding the Threat Landscape by SOPHOS
Deepthi ratnayake
ECE 6570 Class01
Networking and communications security – network architecture design
Automotive security (cvta)
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
OSI Model this seven features and works.pptx
Ad

Recently uploaded (20)

PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
SaaS reusability assessment using machine learning techniques
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
The AI Revolution in Customer Service - 2025
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PPTX
Microsoft User Copilot Training Slide Deck
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
EIS-Webinar-Regulated-Industries-2025-08.pdf
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Electrocardiogram sequences data analytics and classification using unsupervi...
LMS bot: enhanced learning management systems for improved student learning e...
SaaS reusability assessment using machine learning techniques
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
Build Real-Time ML Apps with Python, Feast & NoSQL
SGT Report The Beast Plan and Cyberphysical Systems of Control
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Connector Corner: Transform Unstructured Documents with Agentic Automation
The AI Revolution in Customer Service - 2025
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
giants, standing on the shoulders of - by Daniel Stenberg
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Microsoft User Copilot Training Slide Deck
Rapid Prototyping: A lecture on prototyping techniques for interface design
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf

OSI Layer Security

  • 1. TECHNOTIK 2012, STMIK DIPANEGARA Seminar Keamanan Jaringan Komputer, 22 November 2012 OSI LAYER DAN PERSPEKTIF KEAMANANNYA Nurkholish Halim Email: [email protected]
  • 2. Introduction – computer security  Network Security Intrusion Prevention/Detection Systems Packet Filtering  Application Security Secure Coding Static Analysis  User Security Awareness Training Social Engineering
  • 3. The OSI Layer Video Ref: http://www.youtube.com/watch?v=fiMswfo45DQ
  • 4. Physical Layer  Keystroke Logging  Lockpicking  Cutting (Cable Disconnect)
  • 5. Data Link Layer  Packet Sniffing  MAC Address Spoofing  ARP Cache Poisoning and Flooding (MITM)  WEP Cracking  VLAN Attack
  • 6. Network Layer  Ping Flood (ICMP Flood)  Fingerprinting  Port Knocking  IPSec Attack
  • 7. Transport layer  TCP Flooding  UDP Flooding
  • 8. Session layer  Session Hijacking  NetBIOS user enumeration  Attacks on the Session Description Protocol (SDP)  and the Session Initiation Protocol (SIP)  DNS Poisoning  L2TP Attack
  • 9. Presentation layer  SSL MITM  SSL DoS  SMB Attack  Kerberos Service Attack
  • 10. Application layer  BufferOverflow  SQLi, RFI, LFI  HTTP DoS  APPS Auth BruteForce
  • 11. Layer 8 ….???  Social Engineering!