Neosify - Buy, Stake & Earn Crypto
Neosify - Buy, Stake & Earn Crypto
Neosify - Buy, Stake & Earn Crypto
Fajar Purnama Academics
Fajar Purnama Academics

Fajar Purnama Academics

This blog contains anything that I wrote in academic sectors which includes essays, homeworks, publications, and reports. The contents unless copyrights are specified are licensed under creative commons attribution customized sharealike (cc-by-sa) where I Fajar Purnama as the creator customized the ShareAlike (sa) license here where you are also allowed to sell my contents but with a condition that you must mention that the free and open version is available here.


Choosing Between Host and Network Intrusion Detection System

2 Feb 2021 2 minute read 0 comments 0fajarpurnama0

Regarding to the deployment of IDS on the public cloud there are two cases. The first one is when we own the cloud the other one is if we borrow someone else's cloud. As for the first there are two types of network, one is the internal network and th...

Intrusion Detection System Important Specifications

2 Feb 2021 2 minute read 0 comments 0fajarpurnama0

The performance of an intrusion detection system (IDS) is how well an IDS can detect intrusions in a given network. There are many factors in measuring its performance, but in my opinion a good IDS can detect a variety of attacks, can function on a h...

Having Intrusion Detection System Despite Having Anti Virus and Firewall

1 Feb 2021 3 minute read 1 comment 0fajarpurnama0

My comment on why need an intrusion detection system (IDS) is to prevent intruders from the system. I agree on using IDS, with the more famous, larger, and more important of a corporation's or institution's network, the more IDS is needed. As we enjo...

Malware Counter Measure Standard Operation Procedure in Old Corporations

31 Jan 2021 4 minute read 1 comment 0fajarpurnama0

I have a few experience in playing around with cyber attacks, but it was merely a curiosity and I did this on my own PCs and virtual machines. Back then I tried exploiting the vulnerability on port 445 SMB using an exploit prepared by Metasploit. Met...

My Comments on Information Security Policy when I was a young student

28 Jan 2021 3 minute read 0 comments 0fajarpurnama0

The information security policies that were explained on this lecture are policies when handling vulnerabilities. I strongly agree to this policy due to my past experience in modifying systems. Most of the time I broke the system and the best way aft...

Dealing with Malware for Ordinary Users

27 Jan 2021 3 minute read 2 comments 0fajarpurnama0

The countermeasures of Malicious Ware (malware) are mitigation (prevention) or treatment like any other measures to cope against harmful substances. To prevent virus/worm infection is either we put up security to defend ourselves or avoid interacting...

My Comments on Network and Bots and Pentest when I was a young student

27 Jan 2021 2 minute read 0 comments 0fajarpurnama0

This is the first assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, license this assignment customized CC-BY-SA where anyone can share, copy, republish, and...

7,4 Hamming Codes

25 Jan 2021 14 minute read 0 comments 0fajarpurnama0

0. Note This is the fifth assignment from my Masters Applied Digital Information Theory Course which has never been published anywhere and I, as the author and copyright holder, license this assignment customized CC-BY-SA where anyone can share, copy...

(4,3)-Single Parity Check of Binary Sequence Skew Tent and PWL Map

25 Jan 2021 9 minute read 0 comments 0fajarpurnama0

0. Note This is the fourth assignment from my Masters Applied Digital Information Theory Course which has never been published anywhere and I, as the author and copyright holder, license this assignment customized CC-BY-SA where anyone can share, cop...

Markov Information Binary Sequences Based on Piecewise Linear Chaotic Maps

24 Jan 2021 10 minute read 1 comment 0fajarpurnama0

0. Note This is the third assignment from my Masters Applied Digital Information Theory Course which has never been published anywhere and I, as the author and copyright holder, license this assignment customized CC-BY-SA where anyone can share, copy...