Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Journal of Information System and Technology (JOINT)

Perbandingan Performa VPN Menggunakan PPTP Dan SSTP Over SSL Dengan Metode Quality of Service Moezes Rasuanda; Haeruddin haeruddin
Journal of Information System and Technology (JOINT) Vol 1 No 2 (2020): Journal of Information System and Technology (JOINT)
Publisher : Program Sarjana Sistem Informasi, Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/joint.v1i2.4314

Abstract

Technology advancement requires high level of security. There are multiple ways for user to improve network security because network security is highly crucial for users with data streaming within the network. Some users of network security are banks, large enterprises, government agencies and other users requiring high network security due to enormous amount of transaction and work-related processes being executed online. Therefore, this becomes important support of network security. Among the ways to secure network is by using VPN which is an easy and commonly used way by users to secure their network. VPN has many types or protocol namely PPTP, L2TP, IPSec, IKEv2, MPLS, SSTP and SSL-VPN. This research is aimed to evaluate and compare performance of two predetermined VPN protocols which are PPTP and SSL protocol using a method called Quality of Service. The method acts as a measure of how well a certain network is, as well as to ensure users achieve best quality and available performance. Keyword: VPN, Virtual Private Network, PPTP, SSL-VPN, Networking
Analisa Dan Perancangan Keamanan Jaringan End User Dari Serangan Exploit Menggunakan Metode Penetration Ari Prayoga Hutabarat; Haeruddin haeruddin
Journal of Information System and Technology (JOINT) Vol 1 No 2 (2020): Journal of Information System and Technology (JOINT)
Publisher : Program Sarjana Sistem Informasi, Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/joint.v1i2.4308

Abstract

As global information and communication technology develops, everyone must be able to accept these changes. At this time everyone must compete in learning the development of technology, if they cannot keep up with the development of the technology, they will not be able to survive technological developments and miss technology. With the development of technology, increasing use of technology will increase. So that many people will learn the latest technology. With so many people who are just learning about technological developments, there are many cases of cybercrime that use people who are not "technology literate" who assume that a person's security or privacy is not important enough. This final project aims to analyze the security system on the network end users of Exploit attacks using the Penetration Testing Method. This final project produces a form of research reports along with end user network security solutions from exploit attacks. In testing, this study exploited using the Fatrat tool installed on the Parrot OS operating system. In this study utilizing the gap from the Address Resolution Protocol (ARP), namely ARP Spoofing. ARP aims to map the IP address into a physical address or what is known as the MAC Address that matches the purpose. In ARP use the "trust" system, where all trusted machines provide the correct ARP Reply. The results of this study are a way of dealing with end user network security problems, namely by adding mikrotik router configuration so as to make the end user network safe from Exploit attacks that utilize the ARP Spoofing technique.
Analisa Dan Perancangan Keamanan Jaringan Lokal Menggunakan Security Onion Dan Mikrotik Febrison Yohaness; Haeruddin haeruddin
Journal of Information System and Technology (JOINT) Vol 1 No 2 (2020): Journal of Information System and Technology (JOINT)
Publisher : Program Sarjana Sistem Informasi, Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/joint.v1i2.4309

Abstract

With the advancement of technology on this digitalized era, almost every aspect and field has implemented information technology in the work system of companies, yet there are still security gaps that can lead to cybercrime. The purpose of this research is to both provide an analysis and design a system that can prevent and tackle cybercrime issues. The testing method used in this project is Penetration Test on network virtualization and is connected to local network. The end result of this project is a system that is fused with MikroTik software to monitor attacks to the local network. The security system used is Security Onion.