Claim Missing Document
Check
Articles

Found 4 Documents
Search

PENINGKATAN KEAMANAN JARINGAN WIRELESS DENGAN MENERAPKAN SECURITY POLICY PADA FIREWALL Muhammad Jufri; Heryanto Heryanto
JOISIE (Journal Of Information Systems And Informatics Engineering) Vol 5 No 2 (2021)
Publisher : Institut Bisnis dan Teknologi Pelita Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35145/joisie.v5i2.1759

Abstract

Perkembangan teknologi saat ini memiliki dampak signifikan terhadap kinerja manusia dalam memenuhi aktivitas sehari-hari. Perkembangan teknologi membuat kejahatan dalam jaringan semakin meluas sehingga keamanan jaringan sangat berpengaruh terhadap pencegahan serangan yang dilakukan oleh penyerang. Contoh kejahatan seperti pencurian data perusahaan yang menyebabkan kerugian bagi perusahaan serta kejahatan lainnya. Untuk itu, diperlukan sistem yang dapat mendeteksi serangan Seperti Denial of Service, Ping Attack, dan Port Scanning yaitu Intrusion Detection System (IDS) berfungsi memantau setiap lalu lintas jaringan yang berlalu. Tujuan penelitian yaitu untuk mendefinisikan keamanan jaringan wireless dan mendapatkan hasil dari pemakaian IDS. Implementasi ini dilakukan pada sistem operasi Linux Ubuntu versi 18.04 LTS menggunakan snort dan Iptables sebagai pencegah serangan. Setelah itu, menggunakan tools opensource wireshark sebagai analisa serangan yang terjadi dalam jaringan tersebut. Metode penelitian yang digunakan adalah Security Policy Development Life Cycle (SPDLC) dengan melewati beberapa tahapan, yaitu:. Analysis, Desain, Implementation, Enforcement, Enchancement. Hasil penelitian menyimpulkan bahwa serangan yang dilakukan oleh penyerang pada jaringan dapat diketahui dan ditangani sebelum kerusakan yang lebih luas terjadi serta penggunaan wireshark yang dapat menganalisa serangan dengan baik melalui flow graph yang disediakan.
Sosialisasi “Edukasi Pajak dan Mudahnya E-Tax Zaman Now” kepada Warga Blok 3 Batam Yudi Hartanto; Kelvin Kelvin; Heryanto Heryanto; Felix Derry; Jenry Winata; Erika Erika; Calvina Thai; Evelyn Claudia; Delfia Annisa; Venny Venny; Meilyanti Meilyanti; Evelyn Chai; Cindy Cindy; Febri Nurul Anisah; Ivonne Adeline; Winnie Cen; Jennifer Jennifer; Sarah Nakita Simarmata
National Conference for Community Service Project (NaCosPro) Vol 1 No 1 (2019): The First National Conference of Community Service Project 2019 (Accepted Papers)
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study examines the lack of adequate knowledge of residents of Batam Block 3 Lubuk Baja about online taxes. The purpose of this study is to provide an introduction to online tax and to encourage citizens of Block 3 to participate in paying taxes as an Indonesian citizen (WNI). The data collection process was carried out by observing the needs and constraints of local residents, as well as through interviews with the head of RT 01 Block 3 (Mr. Irwansyah). The material obtained from interviews was transcribed and analyzed. The results of the analysis raised 2 themes discussed here: social support and the goal of participation. The study of these two themes is very useful for understanding how to optimally increase the knowledge and motivation of citizens in carrying out online tax payments.
IMPROVING WIRELESS NETWORK SECURITY BY APPLYING SECURITY POLICY TO FIREWALL Muhammad Jufri; Heryanto Heryanto
CoMBInES - Conference on Management, Business, Innovation, Education and Social Sciences Vol 2 No 1 (2022): The 2nd Conference on Management, Business, Innovation, Education and Social Scie
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Current technological developments have a significant impact on human performance in fulfilling daily activities. The development of technology makes crime in the network more widespread so that network security is very influential on the prevention of attacks carried out by attackers. Examples of crimes such as theft of company data that cause harm to the company as well as other crimes. For that, a system that can detect attacks such as Denial of Service, Ping Attack, and Port Scanning. Intrusion Detection System (IDS) serves to monitor every network traffic that passes. The purpose of the study is to define the security of wireless networks and get results from the use of IDS. This implementation is carried out on the Linux Ubuntu operating system version 18.04 LTS using snort and Iptables as an attack deterrent. After that, use the opensource wireshark tool as an analysis of attacks that occur in the network. The research method used is the Security Policy Development Life Cycle (SPDLC) by passing through several stages, namely: Analysis, Design, Implementation, Enforcement, Enchancement. The results concluded that attacks carried out by attackers on the network can be known and handled before wider damage occurs as well as the use of wireshark that can analyze attacks properly through the flow graph provided.
Analisa dan Implementasi Wireless Outdoor Connection Menggunakan Unifi AC Mesh Pada PT.Bandar Abadi Muhammad Jufri; Heryanto Heryanto
Conference on Business, Social Sciences and Technology (CoNeScINTech) Vol 1 No 1 (2021): Conference on Business, Social Sciences and Technology (CoNeScINTech)
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

PT. Bandar Abadi is a company engaged in shipping and ship repair with 1000 employees working there. Currently, the company still does not have and is experiencing problems in providing interconnection services that are on employee devices or CCTV installed in the outside environment. This of course disrupts employee performance due to difficulties in data transmission and CCTV control due to the network that does not cover the area. The methodology applied in this research is the NDLC (Network Development Life Cycle) method where this method functions as an infrastructure development and design that allows monitoring of the network. The results of this study are in the form of applications that can cover a large area by utilizing the Unifi AC Mesh device so that with the implementation, it can solve the problem of wireless services that exist at PT. Bandar Abadi