Claim Missing Document
Check
Articles

Found 2 Documents
Search

DISTRIBUSI JARINGAN PUBLIK MENGGUNAKAN ROUTING OSPF DENGAN METODE REDISTRIBUSI INFRASTRUKTUR TERPUSAT Syarief, Alfa Farhan; Rochmah, Dwi Anindyani
Jurnal Ilmiah Informatika Komputer Vol 26, No 3 (2021)
Publisher : Universitas Gunadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35760/ik.2021.v26i3.5478

Abstract

Internet Service Provider atau yang lebih di kenal ISP adalah suatu badan usaha yang mengelola layanan jaringan internet. Dalam menyediakan layanan internet, beberapa ISP belum cukup handal dalam menyediakan infrastruktur jaringan yang baik. Hal ini dikarenakan infrastruktur masih terbatas pada area cakupan tertentu dan tidak adanya manajemen sentralisasi untuk pusat distribusi. Penelitian ini dilakukan untuk membuat perancangan infrastruktur jaringan baru untuk di implementasikan dengan menggunakan model jaringan distribusi jaringan publik secara terpusat. Penelitian ini menggunakan teknologi routing dinamik OSPF dengan metode redistribusi. Tujuan dari penelitian ini adalah untuk menghasilkan rancangan jaringan yang berdampak pada infrastruktur jaringan yang lebih luas dan fleksibel, stabil dan tidak menurunnya performa jaringan serta efisiensi biaya operasional maupun efisiensi penggunaan ip publik. Hasil dari penelitian ini menunjukan bahwa distribusi jaringan menggunakan routing OSPF dengan metode redistribusi berhasil di implementasikan sehingga membuat infrastruktur jaringan menjadi lebih handal serta menunjukan tingkat latensi yang normal tanpa adanya pengurangan dengan rata-rata nilai latency sebesar 1ms.
Analisa Kerentanan Sistem Dengan Menerapkan Open Vulnerability Assessment System Menggunakan Greenbone Vulnerability Management (GVM) Ahsan, Muh.; Rochmah, Dwi Anindyani
INTECH Vol. 3 No. 2 (2022): INTECH (Informatika Dan Teknologi)
Publisher : Informatics Study Program, Faculty of Engineering and Computers, Baturaja University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54895/intech.v3i2.1509

Abstract

A computer network is a network telecommunication that connects one or more computers to exchange data and information with each other. Such huge benefit will certainly be reduced by the presence of interference that arises in the network, when the network only involves local devices or in other words, is not connected to the internet network then interference may be less calculated. However, when the local network is connected to the internet network, a security system will be something that must be considered. Every system and network will undoubtedly have vulnerabilities and can cause damage to the system and even data to cause losses. Tracing activities and identifying system vulnerabilities are effective ways to minimize the risk of continuous vulnerability, therefore this study aims to conduct network analysis to determine vulnerabilities system by applying the open vulnerability assessment system method using Greenbone Vulnerability Management (GVM) as a platform of network scanning and vulnerability management system. The results are achieved by doing the vulnerability analysis to evaluate the results of vulnerability findings and then categorized according to the level of risk, namely high, medium and low. Conducting a vulnerability assessment will improve information security and avoid bad risks that can cause losses. The results achieved doing the vulnerability assessment activity are to provide an evaluation of the risk of vulnerability found and the impact that can be generated and as a preventive measure to increase security system awareness.