Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING

Mapping Information Asset Profile In The Implementation Of Risk Management Information System Using Octave Allergo Haeruddin, .
JITE (JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING) Vol 3, No 1 (2019): EDISI JULI
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (325.369 KB) | DOI: 10.31289/jite.v3i1.2601

Abstract

The development of information systems that are very fast nowadays, encourages every organization to follow in order to escalate the competition. The technology that is widely used today is web-based technology. Apart from being easily accessible and used, this technology is vulnerable to any attacks; so using this information system will bring access risks by those who are not authorized. Therefore, risk management is something that needs to be considered in an organization to minimize the risks that will arise. Mapping the information asset profile can help Universitas Internasional Batam to evaluate, manage risks, and protect assets from the risks that will occur. The researcher used OCTAVE Allergo method in mapping and measuring Information Systems at Universitas Internasional Batam, consists of Academic Information Systems, Academic Portals, Registration Information Systems, Financial Information Systems, HR Information Systems. From the results of this study, Universitas Internasional Batam finds out which impact areas are the most effected: the reputation and customers trust, recognize the information of critical assets, mitigate assets that have high risks, in order to minimize unwanted risks.
Security Design And Testing of Lan and Wlan Network in Mikrotik Router Using Penetration Testing Method FROM Mitm Attack Haeruddin .
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 4, No 1 (2020): ---> EDISI JULI
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (918.694 KB) | DOI: 10.31289/jite.v4i1.3832

Abstract

The growth of device user is always increasing and the costs are not expensive. Users already have several sophisticated end user networking tools for daily use, including laptops, smartphones and tablets. For internet access users use LAN and WLAN network services in several public areas such as restaurants, schools / campuses, hotels and offices. Activities done by the users are data and banking transactions. These activities relate to crucial data such as user data including usernames, passwords, accounts, emails and other sensitive data. Mikrotik Router is a router with an affordable price and complete features for both LAN and WLAN networks so that many administrators use this device. The most common attack used on the network is Man in the Middle Attack, which is actively tapping on the user's network connection, where traffic from the user before reaching the destination or when going through a Mikrotik router will be diverted through the attacker's network without the user's knowledge so that user communication can be read. Therefore a network security system on a Mikrotik router is needed to avoid such attacks. In testing the security system that has been made, it needs the right method, one of which is penetration testing. From the results of testing using the penetration testing method, results and solutions will be obtained to maintain network security.Keywords: Penetration Testing, Man in The Middle Attack, Wireless Security, Router dan Wireless Mikrotik.
Mapping Information Asset Profile In The Implementation Of Risk Management Information System Using Octave Allergo . Haeruddin
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 3, No 1 (2019): EDISI JULI
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31289/jite.v3i1.2601

Abstract

The development of information systems that are very fast nowadays, encourages every organization to follow in order to escalate the competition. The technology that is widely used today is web-based technology. Apart from being easily accessible and used, this technology is vulnerable to any attacks; so using this information system will bring access risks by those who are not authorized. Therefore, risk management is something that needs to be considered in an organization to minimize the risks that will arise. Mapping the information asset profile can help Universitas Internasional Batam to evaluate, manage risks, and protect assets from the risks that will occur. The researcher used OCTAVE Allergo method in mapping and measuring Information Systems at Universitas Internasional Batam, consists of Academic Information Systems, Academic Portals, Registration Information Systems, Financial Information Systems, HR Information Systems. From the results of this study, Universitas Internasional Batam finds out which impact areas are the most effected: the reputation and customers trust, recognize the information of critical assets, mitigate assets that have high risks, in order to minimize unwanted risks.