Claim Missing Document
Check
Articles

Found 4 Documents
Search

An Analysis and Design of Network Security Using Firewall at the Library and Archives Services of Bengkulu province Defri Riyanto; Khairil Khairil; Eko Prasetiyo Rohmawan
Jurnal Komputer, Informasi dan Teknologi (JKOMITEK) Vol. 1 No. 2 (2021): DESEMBER
Publisher : Penerbit ADM

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4158.541 KB) | DOI: 10.53697/jkomitek.v1i2.280

Abstract

This study is based on the problems that are often encountered in the research location, namely how to secure the inlislite server by designing network security using Packet Filter Firewall of IPtables. The purpose of this study is to optimize the data security of the inlislite system in the Library and Archives Service of Bengkulu Province. The method used is the Network Development Life Cycle (NDLC) method, a cycle of network design stages that can guide a network design, which depends on the size of the project to be implemented and the purpose of the project. By testing a Denial of Service (DoS) attack against inlislite using hping3 on linux, the inlislite website can no longer be accessed. Therefore, the author designed a new system to secure the inlislite server from unwanted attacks using the IPTables firewall filter then it can become a firewall that will ward off Distributed Denial of Service and Denial of Service attacks on inlislite servers. From the results of research and testing that has been carried out, the IPTables firewall is very good for securing servers in the Library and Archives Service of Bengkulu Province and applying more rules to clients in terms of internet use.
Network-Based Text Message Security System Using the Data Encryption Standard (DES) Algorithm Horas Aryanto Simanjuntak; Hari Aspriyono; Eko Prasetiyo Rohmawan
Jurnal Komputer, Informasi dan Teknologi (JKOMITEK) Vol. 2 No. 2 (2022): Desember
Publisher : Penerbit ADM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v2i2.1042

Abstract

UPT. Puskom as practicum manager has the responsibility to provide facilities including applications needed for each course. In this research, the development of a network-based text security system was carried out by implementing one of the cryptographic algorithms that had been packaged into an application so that students could find out the encryption and decryption processes of the Cryptographic algorithm, namely the Data Encryption Standard (DES) Algorithm. A network-based text message security system using the Data Encryption Standard (DES) Algorithm was built using the Visual Basic .Net Programming Language and SQL Server database. The security system built can help keep messages sent secret from the sender to the recipient of the message through the DES algorithm. The encryption process can be carried out by the user who will send a text message to the intended user, who can open the encryption form and select the intended user, the encrypted message will be stored in the database. Meanwhile, decryption can be done by users who receive text messages by opening the decryption form and displaying the messages sent by the message sender. Based on the tests that have been carried out, it can be concluded that the application is capable of encrypting and decrypting text messages using the DES algorithm.
Implementation of a Computer Network Monitoring System Using Icinga Linux-Based Ubuntu Server at SMA N 1 Bengkulu Tengah Iwan Junaidi; Jusuf Wahyudi; Eko Prasetiyo Rohmawan
Jurnal Komputer, Informasi dan Teknologi (JKOMITEK) Vol. 2 No. 2 (2022): Desember
Publisher : Penerbit ADM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v2i2.1047

Abstract

One of the network monitoring applications is using Icinga with the Linux Ubuntu server operating system. Icinga is a Linux application or tool that can be used to monitor computer networks. Monitoring computer networks using Icinga can monitor data traffic, network traffic and errors that occur on the network. Monitoring traffic and traffic on the network is displayed in graphical form, making it easier to do the analysis. Meanwhile, in monitoring the errors that occur on the network, they are grouped based on the client and service, so it is easy to see which error occurred from the client and what service was used. In operating the network monitoring system with Icinga using the Linux Ubuntu server operating system, the use of computer resources is very small, which is less than 20%.
Pemanfaatan Cloud Computing Untuk Pengamanan Data Bagi Dunia Pendidikan Jusuf Wahyudi; Nofi Qurniati; Eko Prasetiyo Rohmawan; Adriyani Prawitasari; Nia Ade DO; Andre Pranata
Jurnal PADAMU NEGERI (Pengabdian pada Masyarakat Bidang Eksakta) Vol 3, No 2 (2022)
Publisher : Perkumpulan Dosen Muda (PDM) Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37638/padamunegeri.v3i2.601

Abstract

Kegiatan pengabdian pada masyarakat berupa sosialisasi tentang Pemanfaatan Cloud Computing Untuk Pengamanan Data Bagi Dunia Pendidikan dengan tujuan untuk membantu para siswa SMA Negeri 3 Bengkulu Utara untuk dapat mengikuti perkembangan teknologi secara global saat ini mulai muncul berbagai terobosan. Subjek pada kegiatan pengabdian ini adalah siswa SMA Negeri 3 Bengkulu Utara. Proses sosialisasi ini dilakukan dengan memberikan informasi tentang Cloud Computing adalah suatu teknologi komputasi yang berfokus pada pemanfaatan kemampuan internet dalam melakukan tugas komputer pada umumnya. Cloud Computing juga memiliki peranan yang besar dalam mewujudkan pendidikan yang modern, namun tetap efektif dan efisien baik dalam pendanaan, infrastruktur, dan juga hal hal lain yang berhubungan di dalamnya.