Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Jurnal Media Computer Science

The Design And Implementation Of Backup Server Using The Failover Method Karneli, Septi; Sapri, Sapri; Akbar, Abdussalam Al
Jurnal Media Computer Science Vol 3 No 2 (2024): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v3i2.6086

Abstract

One of the most widely used data storage in databases today is using MySQL. MySQL is able to store many data items in it, even up to millions of items. So with so much data in this database, it is very necessary to replicate data to maintain data safety and security. Linux ubuntu server 18.04 is an open source operating system, this operating system is very well used as a server because it does not require high hardware specifications and can also be obtained for free because it is open source. The replication technique is very well applied to the Bengkulu Province Communication and Information Service, this is because the Bengkulu Province Communication and Information Service holds a lot of data. Both internal data and external data. In communicating data to the database using the replication technique, it is very fast with a time of +/- 3 seconds of data communication, this time will also be affected by the condition of the computer network and the device used. The replication technique is very good for agencies that have a very large database and require a long storage time.
Implementation Of Security Information And Event Management (Siem) In Monitoring Networks At SMA 1 Muhammadiyah Boarding School Paw, M. Reyza Putra; Aspriyono, Hari; Akbar, Abdussalam Al
Jurnal Media Computer Science Vol 3 No 2 (2024): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v3i2.6591

Abstract

Implementation of Security Information Event Management (SIEM) for Network Monitoring at SMA Muhammadiyah Boarding School can help network administrators know the activity and status of devices connected to the network whether UP or Down, can help provide information in the form of logs of services that run and log security events on each device connected to the network. This of course can make it easier for network administrators to deal with problems found on network devices connected to OSSIM AlienVault. In OSSIM AlienVault there is a web UI platform that can make it easier for network administrators to monitor the network at SMA Muhammadiyah Boarding School. Where the OSSIM AlienVault Web UI can be accessed via the IP Address Server in the browser. Based on the tests carried out, the results show that the Implementation of Security Information Event Management (SIEM) for Network Monitoring at SMA Muhammadiyah Boarding School runs well and can help network administrators in network monitoring and can provide information in the form of event logs on each device connected to the network.
Application Of Wazuh To Conduct Monitoring Network Security System (Case Study Of SMK N 1 Bengkulu City) Aripilahi, Edwin; Khairil, Khairil; Akbar, Abdussalam Al
Jurnal Media Computer Science Vol 3 No 2 (2024): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v3i2.6592

Abstract

The application of Wazuh to monitor network security systems at SMK Negeri 1 Bengkulu City can help network operators monitor security systems, computers and make it easier to control the devices being monitored, so that they can take action as soon as possible if there is a disruption to the system and network based on the monitoring results. Wazuh can monitor files in the directory folder. The information provided is in the form of adding, modifying and deleting files contained in the directory folder. Based on the tests carried out, the results showed that the application of Wazuh to monitor the network security system at SMK Negeri 1 Bengkulu City was running well and could help network administrators by providing information related to the agent device being monitored.
Qos Analysis In The Application Of HTB At Computer Laboratory Of Engineering Faculty Of Universitas Muhammadiyah Bengkulu Rahmadhan, Ihsan; Khairil, Khairil; Akbar, Abdussalam Al
Jurnal Media Computer Science Vol 3 No 2 (2024): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v3i2.6595

Abstract

Bandwidth management is needed therefore the existing bandwidth is divided according to the needs of each connected connection. One method that can stabilize the distribution of bandwidth is the Hierarchical Token Bucket (HTB) method. This study aims to adjust the amount of bandwidth to suit the needs of internet usage for each user without making one user dominate the use of bandwidth on the internet network. The research was conducted in 5 stages, namely: problem analysis, data collection, HTB design and implementation, HTB implementation and analysis of the final results of the system with HTB. Problem analysis and data collection are obtained through direct observation and observation. Design and implementation are done with the HTB method on the proxy router. The HTB method allows us to make the queue more structured, by doing multilevel groupings. The test results show that the HTB method can manage bandwidth usage for each user when using the internet simultaneously. From the analysis of the application of the HTB method in the computer laboratory of engineering faculty in Universitas Muhammadiyah Bengkulu, it shows that loyal users get bandwidth based on their limit-at and priority, which is equal to