Claim Missing Document
Check
Articles

Found 40 Documents
Search

Mapping Information Asset Profile In The Implementation Of Risk Management Information System Using Octave Allergo Haeruddin, .
JITE (JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING) Vol 3, No 1 (2019): EDISI JULI
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (325.369 KB) | DOI: 10.31289/jite.v3i1.2601

Abstract

The development of information systems that are very fast nowadays, encourages every organization to follow in order to escalate the competition. The technology that is widely used today is web-based technology. Apart from being easily accessible and used, this technology is vulnerable to any attacks; so using this information system will bring access risks by those who are not authorized. Therefore, risk management is something that needs to be considered in an organization to minimize the risks that will arise. Mapping the information asset profile can help Universitas Internasional Batam to evaluate, manage risks, and protect assets from the risks that will occur. The researcher used OCTAVE Allergo method in mapping and measuring Information Systems at Universitas Internasional Batam, consists of Academic Information Systems, Academic Portals, Registration Information Systems, Financial Information Systems, HR Information Systems. From the results of this study, Universitas Internasional Batam finds out which impact areas are the most effected: the reputation and customers trust, recognize the information of critical assets, mitigate assets that have high risks, in order to minimize unwanted risks.
Security Design And Testing of Lan and Wlan Network in Mikrotik Router Using Penetration Testing Method FROM Mitm Attack Haeruddin .
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 4, No 1 (2020): ---> EDISI JULI
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (918.694 KB) | DOI: 10.31289/jite.v4i1.3832

Abstract

The growth of device user is always increasing and the costs are not expensive. Users already have several sophisticated end user networking tools for daily use, including laptops, smartphones and tablets. For internet access users use LAN and WLAN network services in several public areas such as restaurants, schools / campuses, hotels and offices. Activities done by the users are data and banking transactions. These activities relate to crucial data such as user data including usernames, passwords, accounts, emails and other sensitive data. Mikrotik Router is a router with an affordable price and complete features for both LAN and WLAN networks so that many administrators use this device. The most common attack used on the network is Man in the Middle Attack, which is actively tapping on the user's network connection, where traffic from the user before reaching the destination or when going through a Mikrotik router will be diverted through the attacker's network without the user's knowledge so that user communication can be read. Therefore a network security system on a Mikrotik router is needed to avoid such attacks. In testing the security system that has been made, it needs the right method, one of which is penetration testing. From the results of testing using the penetration testing method, results and solutions will be obtained to maintain network security.Keywords: Penetration Testing, Man in The Middle Attack, Wireless Security, Router dan Wireless Mikrotik.
Mapping Information Asset Profile In The Implementation Of Risk Management Information System Using Octave Allergo . Haeruddin
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 3, No 1 (2019): EDISI JULI
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31289/jite.v3i1.2601

Abstract

The development of information systems that are very fast nowadays, encourages every organization to follow in order to escalate the competition. The technology that is widely used today is web-based technology. Apart from being easily accessible and used, this technology is vulnerable to any attacks; so using this information system will bring access risks by those who are not authorized. Therefore, risk management is something that needs to be considered in an organization to minimize the risks that will arise. Mapping the information asset profile can help Universitas Internasional Batam to evaluate, manage risks, and protect assets from the risks that will occur. The researcher used OCTAVE Allergo method in mapping and measuring Information Systems at Universitas Internasional Batam, consists of Academic Information Systems, Academic Portals, Registration Information Systems, Financial Information Systems, HR Information Systems. From the results of this study, Universitas Internasional Batam finds out which impact areas are the most effected: the reputation and customers trust, recognize the information of critical assets, mitigate assets that have high risks, in order to minimize unwanted risks.
Perbandingan Performa VPN Menggunakan PPTP Dan SSTP Over SSL Dengan Metode Quality of Service Moezes Rasuanda; Haeruddin haeruddin
Journal of Information System and Technology (JOINT) Vol 1 No 2 (2020): Journal of Information System and Technology (JOINT)
Publisher : Program Sarjana Sistem Informasi, Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/joint.v1i2.4314

Abstract

Technology advancement requires high level of security. There are multiple ways for user to improve network security because network security is highly crucial for users with data streaming within the network. Some users of network security are banks, large enterprises, government agencies and other users requiring high network security due to enormous amount of transaction and work-related processes being executed online. Therefore, this becomes important support of network security. Among the ways to secure network is by using VPN which is an easy and commonly used way by users to secure their network. VPN has many types or protocol namely PPTP, L2TP, IPSec, IKEv2, MPLS, SSTP and SSL-VPN. This research is aimed to evaluate and compare performance of two predetermined VPN protocols which are PPTP and SSL protocol using a method called Quality of Service. The method acts as a measure of how well a certain network is, as well as to ensure users achieve best quality and available performance. Keyword: VPN, Virtual Private Network, PPTP, SSL-VPN, Networking
Analisa Dan Perancangan Keamanan Jaringan End User Dari Serangan Exploit Menggunakan Metode Penetration Ari Prayoga Hutabarat; Haeruddin haeruddin
Journal of Information System and Technology (JOINT) Vol 1 No 2 (2020): Journal of Information System and Technology (JOINT)
Publisher : Program Sarjana Sistem Informasi, Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/joint.v1i2.4308

Abstract

As global information and communication technology develops, everyone must be able to accept these changes. At this time everyone must compete in learning the development of technology, if they cannot keep up with the development of the technology, they will not be able to survive technological developments and miss technology. With the development of technology, increasing use of technology will increase. So that many people will learn the latest technology. With so many people who are just learning about technological developments, there are many cases of cybercrime that use people who are not "technology literate" who assume that a person's security or privacy is not important enough. This final project aims to analyze the security system on the network end users of Exploit attacks using the Penetration Testing Method. This final project produces a form of research reports along with end user network security solutions from exploit attacks. In testing, this study exploited using the Fatrat tool installed on the Parrot OS operating system. In this study utilizing the gap from the Address Resolution Protocol (ARP), namely ARP Spoofing. ARP aims to map the IP address into a physical address or what is known as the MAC Address that matches the purpose. In ARP use the "trust" system, where all trusted machines provide the correct ARP Reply. The results of this study are a way of dealing with end user network security problems, namely by adding mikrotik router configuration so as to make the end user network safe from Exploit attacks that utilize the ARP Spoofing technique.
Analisa Dan Perancangan Keamanan Jaringan Lokal Menggunakan Security Onion Dan Mikrotik Febrison Yohaness; Haeruddin haeruddin
Journal of Information System and Technology (JOINT) Vol 1 No 2 (2020): Journal of Information System and Technology (JOINT)
Publisher : Program Sarjana Sistem Informasi, Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/joint.v1i2.4309

Abstract

With the advancement of technology on this digitalized era, almost every aspect and field has implemented information technology in the work system of companies, yet there are still security gaps that can lead to cybercrime. The purpose of this research is to both provide an analysis and design a system that can prevent and tackle cybercrime issues. The testing method used in this project is Penetration Test on network virtualization and is connected to local network. The end result of this project is a system that is fused with MikroTik software to monitor attacks to the local network. The security system used is Security Onion.
Analisa dan Perancangan Dynamic Vlan menggunakan Metode PPDIOO Development Life Cycle Haeruddin Haeruddin; Rahman Syahputra
Telcomatics Vol 4 No 2 (2019)
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/telcomatics.v4i2.627

Abstract

In the development of technology at this time, like computers, software, networks and others have given the effect of high infrastructure needs on its users, resulting in increased competition in terms of developing new technologies by the vendors. With the different conditions and requirements of each user, it raises the thought of a system solution that is well integrated in overall. The use of conventional LAN networks is currently very much avoided by the world for various reasons, for example the management of infrastructure that is difficult and unsystematic, complicated system troubleshooting, the application of single segmentation on the network that raises network security issues is very weak and vulnerable to data theft. Especially if this happens in a large organization or company, of course it will have a very bad impact. The solution is to implement a Virtual Local Area Network (VLAN) to solve problems on the network. This is because VLANs are useful for separating networks into different segments and reducing the size of broadcast domains. With VLAN, it also makes it easy to manage the network, any changes in the network will be easily resolved automatically, namely Dynamic VLAN. To be able to design a good and effective VLAN, an appropriate design method is needed too. This study uses a product method from Cisco, namely PPDIOO Development Life Cycle as the design path for VLANs with type Dynamic VLAN, which aims to get optimal results in the final design according to the process of the method.
Analisa dan Implementasi Sistem Keamanan Router Mikrotik dari Serangan Winbox Exploitation, Brute-Force, DoS Haeruddin Haeruddin
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 5, No 3 (2021): Juli 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v5i3.2979

Abstract

The advancement of technology development makes it easier to find and share any information using computer networks. Computer networks have been widely applied in homes and offices. The ease of exchanging data on the network makes the availability of computer networks and information security are vulnerable to attacks by threats. On a computer network, the device which has the vulnerability is a router. A router is the outermost device that connects the Local Area Network (LAN) to the internet so that it can be easily attacked by irresponsible parties. The Mikrotik router is a product that is widely used as a gateway router that connects LANs and the Internet. There are so many tools that can be used to carry out attacks on Mikrotik routers such as Hping3 (DoS), Hydra (Brute-Force), and Exploitation Script (Winbox Exploitation). To find out the security loop in Mikrotik routers, this study uses penetration testing methods and attack techniques such as Winbox Exploit, Brute-force, and DoS. After knowing the security gap, the next step is to provide and implementation recommendations so that similar attacks do not occur any more in the future.
Rancangan Sistem Keamanan Rumah Berbasis IoT dengan Cisco Packet Tracer Haeruddin Haeruddin; Boby Candra; Deven Lee; Firman Adiyasa; Hadi Hadi; Sepbianto Sepbianto; Jefferson Richtan
Telcomatics Vol 7 No 1 (2022)
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/telcomatics.v7i1.6767

Abstract

Penelitian model sistem ini bertujuan untuk memberikan solusi baru bagi masyarakat mengenai keamanan rumah yang berbasis IoT sehingga dapat mencegah terjadinya kemalingan dan kebakaran. Model sistem ini dibuat dengan motion detector dan laser trip karena dinilai sensor ini lebih efektif dalam mendeteksi suatu gerakan dan lebih efektif diimplementasikan sebagai alat perangkap, serta fire monitor dan water sprinkler yang dinilai lebih efektif dalam pecegahan kebakaran. Berdasarkan dari model yang dirancang, metodologi yang digunakan adalah dengan menggunakan metode PPDIOO. Metode PPDIOO merupakan metode yang digunakan untuk merancang suatu sistem. Dengan adanya sistem keamanan ini, rumah-rumah masyarakat akan terhindar dari kemalingan dan kebakaran.
Perancangan Dan Implementasi Active Directory Domain Controller Menggunakan Windows Server 2012 R2 Di Pt. Flextronics Technology Indonesia Haeruddin Haeruddin; Bobby Fernando Pangaribuan
National Conference for Community Service Project (NaCosPro) Vol 3 No 1 (2021): The 3rd National Conference of Community Service Project 2021
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/nacospro.v3i1.6067

Abstract

Di Era Globalisasi saat ini teknologi dapat mempermudah dalam pengolahan data, salah satunya adalah dengan pengelolahan hak akses user. Administrator dapat melakukan pengelolahan hak akses user dapat dilakukan menggunakan Active Directory pada windows server 2012 R2. Administrator bisa memberikan hak akses pengguna data, baik secara lokal akses maupun akses lintas lokasi. PT Flextronics Technology Indonesia adalah perusahaan manufaktur yang bergerak dalam bidang jasa perakitan pembuatan komponen dan papan PCBA (Printed Circuit Board Assembly) dimana anak perusahaannya terletak di Batam. Dengan asalan ini, Akses data pada PT Flextronics Technology Indonesia menggunakan sistem data terpusat, dimana data tersebut bisa diakses oleh user disemua anak perusahaan PT Flextronics Technology Indonesia. Oleh sebab itu, implementasi single domain dengan Active Directory dapat mempermudah Administrator dalam mengatur serta mengelolah hak akses semua pengguna berdaasarakan kebijakan perusahaan. Dalam mengimplementasikan manajemen user dengan Active Directory menggunakan metode NDLC yang meliputi perancangan, desain, implementasi, dan monitoring