Keamanan Infrastruktur TI


πŸ” 1. Pengantar Keamanan Infrastruktur TI

https://images.openai.com/static-rsc-4/cvWpM_7-Tu-KPbmmyUeQ1aExNWzaq-1hOsdeAUUojkK8hnJQ33043bc30h4Bsn3wBLC3PM1APQ1U5aJbki0uyys69-EqWM2k_9li7C2JE_uZhj9VFEHH8Gt1yIAJB4s5OKprmuDmTTzlwCA_Th5XW9iXdhhXqQgomI1PgWDzERL-rXqyLHpnjXHu8XCAKApH?purpose=fullsize
https://images.openai.com/static-rsc-4/d4MJh620nBwe9MvG0v3tSMGKNd_O69Bc_IAijFKJMwlNqnu899cBUFvkQT5uVsuzimZbikPfDgISbDO0e2iZw3ckIf82iAeyChkKG0BhxIzVUueX3EisLvsDeuwF8Wl-pVwtTDUB3r3gBLOKgoq75DI7N7kVVZsFfZkzTmm0uyZCzQRBx9wVy2zkimz1nIXx?purpose=fullsize
https://images.openai.com/static-rsc-4/jdpAr4H02iDupgw_BM3W3ELGvunY7WD7rQUe_1TpC6O6jiSZ8zX2SGXFNlm02Myd39uiqhjN1EN4STuODA0EFCAQ0nRHvXSmF-20W9fob-saSubgGa68q5oJkKtyhz9-b8a0abSLAgItNQbVKijCXxr2r0xLY8Y68BiVwVZ4uSzjvqADwnOQSlT0ecPWAxeK?purpose=fullsize

7

πŸ“– Deskripsi

Keamanan Infrastruktur TI adalah upaya melindungi seluruh komponen infrastruktur (hardware, software, jaringan, data) dari ancaman, serangan, dan akses tidak sah.

🧠 Narasi

Dalam dunia digital, ancaman bisa datang kapan sajaβ€”dari hacker, malware, hingga kesalahan manusia. Keamanan TI adalah β€œbenteng pertahanan” yang menjaga sistem tetap aman dan berjalan dengan baik.


🎯 2. Tujuan Keamanan TI

πŸ“Œ Tujuan:

  • Melindungi data
  • Menjaga privasi
  • Menjamin ketersediaan sistem
  • Mencegah akses ilegal

πŸ“Š Manfaat:

ManfaatPenjelasan
Data ProtectionMenghindari kebocoran
System IntegrityData tetap utuh
AvailabilitySistem selalu aktif

🧠 Narasi

Keamanan bukan hanya soal perlindungan, tetapi juga menjaga kepercayaan pengguna.


πŸ›‘οΈ 3. Konsep Dasar Keamanan

πŸ”— Model: CIA Triad

https://images.openai.com/static-rsc-4/Vwa7NnRqWnfFb6dGcEtk4oWLFE55Z0BgS0fV-bpcioHWjz8EJxYLomq3nghvw3jVoXHOFrSUQkbuFh5Lhzmicn41T2L-dFKp_Ody4AxtGXO6mmIja_PiYAJAjMJEar62RE-kTvuYYvj_ujdJDLTjDc6tyKWlplwE33bYMmlHkDT80br1tBzLERm-tBYdMEfL?purpose=fullsize
https://images.openai.com/static-rsc-4/X-a_g1UqYnH58dymRJcQm9bfB4OFJ35664quiId4lZfaSBNV2EpZtu9DN36X2eJrG2Dbe-nZ0xqxdxs3Td6xrDW2gJqr4G6tvrkfqKYUZ9aW_FZoX4d4Sy9IZNN8QmAfgs910wbhh8JJwpwIYLk94jFKCdqtO7v_p-tlLVYpnOEMlXMTsG6F2e0jJW92XDQO?purpose=fullsize
https://images.openai.com/static-rsc-4/my0CQ8kl9R6my-XqfpH_bTZSrwPcK0vHygJrNFK8O0HbJ6SIMHv1eiGX37sGpxGptPoTAmzi53DZxoeuYllxm1OW2rbJGTYsTT9qT9AX0phly7ZHxw0VQ6zAhVd9nLrGdu5SEHNp7acahGmErNLRB5Q3iRUZEarEVPs-YSG9VbrxCSwiaCxviUKuk6_wrbel?purpose=fullsize

6

πŸ“– Komponen:

  • Confidentiality β†’ kerahasiaan
  • Integrity β†’ keutuhan data
  • Availability β†’ ketersediaan

🧠 Narasi

CIA Triad adalah fondasi utama keamanan informasi yang harus selalu dijaga.


⚠️ 4. Ancaman Keamanan TI

https://images.openai.com/static-rsc-4/TzzrZ8OwUTJItxhVhsJ8Tk4AUhqlrW2SXKggIktwbjBAemAo2x3gUIJXMe35eDZoNAHfc7W9FIvrjY1uPR30LPnHZyajZNtZe1FRCfYY54TFIWTjOm8e7Lhjsyj_gvd7lpUJYD9OjkHYbTeQxnTVy6q6rVfW1XEElIh-6LGhdHzhjtZI0qaFP1F3BzsiWbS_?purpose=fullsize
https://images.openai.com/static-rsc-4/qF_dQAwhfWd4UchGWm0IEog5I-b09KDfjEk7RIr8NQECUtKqRQxN2FvFwQ52zeOhpbPW8nuXxgi560hvwyqDGWCSzhobe_tJAvMKZsfYj-ncuirFlm9SQL-Nrh70i0PTO8bo_f21u5tDjgJeamlBsL_HA8qpnyTRH6ww3SDR96n67TY-K2YyHHb2Y2BmFdh8?purpose=fullsize
https://images.openai.com/static-rsc-4/S7AjHqJjTpTXFjOfPGai8pd_BaB8BzTgtPHVEr0UliadWGFUf3F0CgsUmVHYxsXzHZagadrYMGB_Sl23S9Vb1FHMWrsJW7Wj3T-goHA_MrBsYL61-MUVcJWwvcM7LagWHipDuSNnVLq5Sdzg9N0mPQkF-eOGRZ10vctwpLGnPB8qBvVsUJ5LxB0BZusZLqA_?purpose=fullsize

5

πŸ“– Jenis Ancaman:

  • Malware
  • Phishing
  • Ransomware
  • DDoS Attack

🧠 Narasi

Ancaman terus berkembang seiring kemajuan teknologi, sehingga sistem keamanan harus selalu diperbarui.


🧱 5. Lapisan Keamanan Infrastruktur

https://images.openai.com/static-rsc-4/onfzl03v-Pu88ze8G01Ih7jdp6IBnnsXiciYx9ySKC5suUlQ6Kmjp-mM4TldKZosGFGNBstKIAEP00bEnj_O_9wQjN3LTUqriAEtZhwLvlzgcx-zeuUVL0_EDDTO2U0uNV4qBzwkJg97PClnXZmY1Tpr2KGI6NLNaCmh_RSUSGURwn5Q4Z1ag855_xbbpkoe?purpose=fullsize
https://images.openai.com/static-rsc-4/IfXMnDkWKFwnxDKH3RL9hzBpHUDfzPPcSunSMsOQVMlSzzzZJcX8Y0WvhF4D1Ma7ut_pKvqEFrS1DXgvbLcs8qakVL6EaHC9soodhEiylPkTnI_z2ftLx0IOmthLH7pZ6CWjZ0ONXBLfvnPkcNB08EqUhUA6wTg--A92TjQzRKlyjQXigDOUJZNA3ylQRDDs?purpose=fullsize
https://images.openai.com/static-rsc-4/3BCLsa8nCtdu7cdyVsR7QOxdDLjIgWlxGlWPuOE4aC21EOAwXhloNGAzHxi-w9grvVFeQh_RtKY2Y1UyAlgrSvlHnmBXX1bEyATZaTuWpkklguMVO_Mws2HaL9pRpQyWhLJabF4kuM9t7geTtdbopqVnKZRi8KeG-La3X_G_XIN2ogs5fEq-fN7gN0itcIda?purpose=fullsize

7

πŸ“– Layer:

  1. Physical Security
  2. Network Security
  3. System Security
  4. Application Security

🧠 Narasi

Pendekatan berlapis (defense in depth) membuat sistem lebih sulit ditembus.


πŸ”₯ 6. Firewall

https://images.openai.com/static-rsc-4/HgXjIaqaCn2R2STKnkmLU62wdBf657F2QgW3kly4CFHFd0O--USDb-JWia6r3OBwbdx_tGkRGDWh6wnR-JIaZgbFGqBgydEBA2T_cDJ3nOs6laOI8gZIOzCniRpbXAAN_oELP9g5BvQABDW34zoAQvj3hCCmQsRLlkySXgZqlVFyaRxPnLfNgdZED6eAGiC5?purpose=fullsize
https://images.openai.com/static-rsc-4/XZEMxhCtNA39jfk1QTB25EXY6GmFuEETnK-pIAdSkZLxJ-ReBVlWRbh7AvnzYXw0bQCzLCvpWjVj0HCC7tVYak99B4r6mPRnfAc983-bsXBLhvNkqbzQmFbaWpKDJULy4DjaC0Y736bn86M3iE4yVng1NBG0MazKfHRPnWwK76BLeGBZKNkuRcaoud8TJ3dJ?purpose=fullsize
https://images.openai.com/static-rsc-4/mqsHds5EZIp7EC93l7CS57tTU9A3c4qhSDIdYtV_Ns1tuNhlj6Y-G0kr2sVh8KMcWs_gIV-Vlt1k7mB7w-iOc4OeenE3Rz9TXCcpMQ--pFFYxar8dGwK_8ykpg2bN4N1SzQE4tZdIeWts2e3vg3KlhCDfLq2SfoO3qMcezj0T_EmmZ8IeLc0TpvPOADEuspP?purpose=fullsize

7

πŸ“– Fungsi:

  • Menyaring trafik
  • Memblokir akses ilegal

🧠 Narasi

Firewall adalah β€œgerbang utama” yang mengontrol lalu lintas jaringan.


πŸ•΅οΈ 7. IDS & IPS

https://images.openai.com/static-rsc-4/qz2fnMZJpdCMoTF7SLDgkk64KEVD5orckg_EGJZ3oTT4iCRS413jL65ZMYCd0kJbxxmReOfPLpB0jzlTcYRUdF2T_rKBrXqqibkXNZeQ7bkkm4ihiAXOg8pqNAJXcwXbQrMNeYAB9nm_MX9dHo0YdFlImBnOc0usfM90KVKWtT5okaluWsd3GKjcq1LcX1kW?purpose=fullsize
https://images.openai.com/static-rsc-4/AIdVQEInmfz5ETS-831EsniuiNPcmQj4x7ZcfhCJXVc8aI815aKSMobWeXOGBk64EPvhsZ6sKJp37XFC_WFbG1Ah2wLFzKeFiR_6xiN_D46YkgFgFpvbuScWDf5pkyDSc-yGlGq09-o9viY9o-Z-S3XCriWIpRgyPJA37Ku74_jNvE8koO_yfAiNOhGVf4fC?purpose=fullsize
https://images.openai.com/static-rsc-4/u1eMCeHdCt9Tz_YW4GoW1Ws5cPDAEwjrs7W534FsZmjS_ZYmpv3sPwY3tIQ6Vmd_1ULvplB3h6bsRj2ZLn5A6_UAIq1tPu9vMOoSA941VN60QL5jCSKdkd0xOVhJTcQPXgZ8ypBKerSu31GijnB66NfgUpfXnHz16TzlNzqaEaFbpv2BureQodGne7AK1i9e?purpose=fullsize

7

πŸ“– Perbedaan:

  • IDS β†’ mendeteksi
  • IPS β†’ mencegah

🧠 Narasi

IDS seperti alarm, IPS seperti penjaga yang langsung bertindak.


πŸ”‘ 8. Autentikasi & Otorisasi

https://images.openai.com/static-rsc-4/AUm0Rfo9NBoLT20gR0WdoGLBjX_I0dc1frQ3-06qavrtmIxt7TcmqRaRUnwf4msV1HsbxFqGy8N325VpUsYdzx6q5p-AHwgy3J3UWCrxO17Fm8EC7TepkWZvrW30WW7R5wRGLpupJRZSjTw1Fk-DNeRWpo2amjNIEHOkGxuBc5RN7gPJyjaT41mg1C62zUqh?purpose=fullsize
https://images.openai.com/static-rsc-4/P3R7vAYiP3XOF8RHz8IeavzuPyhdrA4MUmy-nQj5KyCGwS_EnCy1j4ZEsBVNvC4gFjkb0XKEaCuWSpN1bpCraYlNCoaMx-QDIfye9HziJwu30pRRsu4JriLPAwSVIMxYmHCuQGhg7kw7QulT_VZpiTHPRw_R_-i2sisNWywVkIBNlbWeSERcFvPkeuo8tqsK?purpose=fullsize
https://images.openai.com/static-rsc-4/csmy-lLswU0H-JFLgAoNxHSwjoxJ_1GI7ads3WB5RSeYc1tF7mU4284W3gsQEGbUdhudBMgcwGyNsoE7ya_L-trhMwClUt3UBhihmT1LmbdM0p26ANzilxvghkVFpk386Kkq-2qe5alzH8ADRFeZR-gD4P7g-oPeUb6RgUkZBti2JaQfqSA-dQeuHJZjbaeA?purpose=fullsize

7

πŸ“– Konsep:

  • Authentication β†’ verifikasi identitas
  • Authorization β†’ hak akses

🧠 Narasi

Tidak semua pengguna boleh mengakses semua dataβ€”ini prinsip dasar keamanan.


πŸ” 9. Enkripsi Data

https://images.openai.com/static-rsc-4/X7H3VxQLfHkF-Nlhz3BBd7MDRjF7Lcza1SjADbdGkDnY3_0PkkDU5udMHkshLo4ZyL1uoDe7Xto0YYqOkPQ0I-8cca5_bWAjHIP_6Gp5gts8m5_a3CWwCeTioMcAffnNJv1clSq6_1ZUv0woTQ9wISEMwE7d6Ao5kUB7QgikQHxpT13Fq07ZjdE6AhSw6w3X?purpose=fullsize
https://images.openai.com/static-rsc-4/fWYpBiHOWkfEWL5gyAUe4jWd2YB9U8PtsO0CxF3psnrL3PsWBEWgZdQHAkUumq8D1RSUSAC3eG6zToJ_cgjHA6T5-OgRdVqh7o3v_S1uTnbD08nJb6bQvfSxgXwetm9bCJgWDvKiP-3Ks5YgNSHqqVXcz7PmTm2LAkQApyt-rrO1dp0wc-1HuZ3hs4XfPePQ?purpose=fullsize
https://images.openai.com/static-rsc-4/OCu9gSx8qZEPVbNCCHBbrxNAv1CQGlsjCHtgd5VhClYsgBBK_VkyclW4715ZaIGwqNnIey6Z1b5n6y8cI23I11BDO4UQw5lNKXPEfe8WcsmLyjdIvHLMxp1SuVRiJBRvMp1v77disyX66N8mJFGSUx6rzJCe0dh8a6Dbnasmk9TfBYL2EUOZnY735bTs9RzL?purpose=fullsize

6

πŸ“– Jenis:

  • Symmetric
  • Asymmetric

🧠 Narasi

Enkripsi mengubah data menjadi kode agar tidak bisa dibaca pihak lain.


🌐 10. Keamanan Jaringan

https://images.openai.com/static-rsc-4/2zTUjPpls0XYtmsDAhHW9bUO0mi_KzTaNn4NFaOwsn6v38vbNbYtR3mtPFiTvnjnYk_cvGa0sSiNsObdkxjK-jL7T5Llz4DLY2BgK9XZph2o8FStCSo9AUka2P45X3c7tD71Wzf2mCr3nFEKan8eAV3-eHLKfOGo54aX1lvlyBicCmxmpJVC77T9OTZu3iO1?purpose=fullsize
https://images.openai.com/static-rsc-4/uQ7Dx9kTu_idKRteEB-RjqUmC33WlIe7Wf2TxX9x3l2B_A954Wmew_kIpN0SW63307U61RwqfnnvQJLhW7MxujuE7QYxcmOQ_VJnjTi3gn4M-dL53C0uD4Ft3HZ1WEj3FVfu4AQQAQ1thxAGHpcpBW5hPa8ggW03gl_8R_wFhMznV8dhlFP06ZijJJ287njf?purpose=fullsize
https://images.openai.com/static-rsc-4/XsimvAEACM2xyu0D1mIz524FdRQS6EctiMXS0HZGWUEGfVCYkSh6E8XwgrPi9U8RbYuhydMYXW6l64t_tp2TD5bcKKkRJ54g0w8x6depsoPjpF0IV7DCc3HYVc7K3iuCeoYHdnlwikrfuI2bUr4mVqWGzC-jXdmYbarjszcCVl6wEo6z-XCmsLkaHxiPr4Du?purpose=fullsize

6

πŸ“– Teknologi:

  • VPN
  • Firewall
  • Segmentation

🧠 Narasi

Keamanan jaringan memastikan komunikasi data tetap aman.


☁️ 11. Keamanan Cloud

https://images.openai.com/static-rsc-4/b2WnKZ5FdxE7mIOpDs29UtxB43BVPYXMfzyIxY-xs4CmzMxkoyBdPC4dlGkB2RwTz_XzSrp5a2E0rytRK979k-noJ8-8aTsg5XvQQaZOvy8QB5kYbYaWlfD0vm9czWrJqP7oI1qOlC8YASh841dqbTHUsOHawwbtItUeCNSpHx1jhR4D9cNImZ0nujDEn7wv?purpose=fullsize
https://images.openai.com/static-rsc-4/KoTinAzrvdnJL4eHA6TMHbYpkUtqchCLzRxSipgSsD7JEw0xLogkpV67uqplEAeHhgjwWXLdWJIqRuZSYNdxFop9FVt2ftuqv4Wh-BQyoTMuB9VHWF92zYjUEinLOZ1oTVQQN_YY8i8p_jB1CaIFre731mmVJFtQEuzNcaBRhO_RvWS8HIyR6Y4J8I6pSo1B?purpose=fullsize
https://images.openai.com/static-rsc-4/-Y1auzY4fwusKZV_q9cXaCQwt5jh4-QvUoW5pyIVm9IQErwnkNTcZhg4H_FnqyrhoYwnb26gTe_L7r5qaybaLDrEtgfguZUtXSU6So0TnzdXr8Ga5vKoPUn-lk5LSrL5nQKrewlgTy0uNYhHRIE7gLhWg3L7gf_7Evn_plamBqZ7PhjeU6I2W5pJ8oElie9t?purpose=fullsize

7

πŸ“– Konsep:

  • Shared Responsibility
  • IAM
  • Data Encryption

🧠 Narasi

Pengguna tetap bertanggung jawab atas data meskipun menggunakan cloud.


🏒 12. Keamanan Fisik

https://images.openai.com/static-rsc-4/loTo6sWcBwybWD0EnGKhGabpoQ1sldLyMzu1eREQnKYi7Z9RO6DcN28fi83HzCiWE5LueALRJ5ClEvPuONKvN_Uig8VG5ot2pkAUxKxS2p1DK5IkTcCDGA3UXe_ytWcy7IqWnPr_kq3Nv6_NsKjaTNvrq5oYDooUAt8hBvlvyKoO0Rt-WkD_fZmC6zSLmTFq?purpose=fullsize
https://images.openai.com/static-rsc-4/pEuKGzvDwLUmbnwqztJLBCD-1lmhtpmptStfPVn36agKf6-D9V6G5-BAdjjFumszqDmK0_N8YxZeF7wULQBoK0JiNqHA-DLh7cVtJ1AnseBCkzuqiVMoUcSfweMWhNYBRKDUoWXttQaoA3rRU2VvCUNzrUf6yZ_vd4R16qeD0nXCPtyvd9Z5NJfW174pNgIa?purpose=fullsize
https://images.openai.com/static-rsc-4/EeC9hqtWQ8ty01FL4NXYcWrTgiqsFQRcWKU9IEgTwc3Hap8orxiVvv_qG_tksYXGEH-tPKPqn4uQ2ShO2pB84tKXmckOWU1Wnu25xV1TOC3b8T6ihru_-kR40qVZXfYJQl6nH94qpT1gBBtwUtnFDbJ5EQlXqglBAm3FJdO64Wjb--XYSvNtdRD9pR8Z8h18?purpose=fullsize

6

πŸ“– Contoh:

  • CCTV
  • Biometrik
  • Akses terbatas

🧠 Narasi

Keamanan fisik sering diabaikan, padahal sangat penting.


πŸ› οΈ 13. Tutorial Praktikum (Keamanan Dasar Linux)

🎯 Tujuan:

Mengamankan server

πŸ“‹ Langkah:

sudo ufw enable
sudo ufw allow 22
sudo ufw status

πŸ“‹ Tambahan:

passwd
chmod 700 file.txt

🧠 Narasi

Perintah ini digunakan untuk mengatur firewall dan hak akses file.


πŸ“Š 14. Studi Kasus

πŸ’Ό Kasus:

Perusahaan terkena ransomware

πŸ“‹ Solusi:

  • Backup data
  • Update sistem
  • Gunakan antivirus
  • Edukasi pengguna

🧠 Analisis

Keamanan bukan hanya teknologi, tetapi juga perilaku manusia.


⚠️ 15. Tantangan Keamanan TI

❗ Masalah:

  • Serangan semakin canggih
  • Human error
  • Kurangnya awareness

🧠 Narasi

Keamanan TI adalah proses berkelanjutan, bukan sekali selesai.


πŸ“ 16. Kesimpulan

πŸ“Œ Inti:

  • Keamanan TI melindungi sistem dan data
  • Menggunakan pendekatan berlapis
  • Sangat penting dalam infrastruktur modern

🧠 Penutup

Tanpa keamanan, semua sistem TI berisiko tinggi terhadap kerusakan dan kehilangan data.


πŸ“š 17. Latihan & Diskusi

πŸ’¬ Pertanyaan:

  1. Apa itu CIA Triad?
  2. Perbedaan IDS dan IPS?
  3. Mengapa enkripsi penting?