Claim Missing Document
Check
Articles

Found 2 Documents
Search

Chance Evaluation and Improvement of Get to Control Data Security Administration Based On ISO/IEC 27001 at Telkom University Jakarta Campus Fachrur Rozi, Nurwan Reza; Agustav Wirabudi, Andri; Arandiant Rozano, Seandy
International Journal of Science Education and Cultural Studies Vol. 3 No. 2 (2024): ijsecs
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/ijsecs.v3i2.246

Abstract

The digital-based smart campus system, consisting of components such as the campus application, digital presence with QR code, and campus development dashboard, is one of the services offered by Telkom University Jakarta Campus. In addition, it utilizes artificial intelligence (AI) technology, especially image recognition, to support the Green Campus concept and increase environmental protection efforts, demonstrating the university's dedication to utilizing innovative technologies for a sustainable future. Therefore, the security of information assets is very important. Issues of confidentiality, integrity, and availability can arise if the information security system is not properly managed. This research aims to improve the security information system by conducting a risk assessment using the OCTAVE method. This risk assessment aims to identify the most significant impacts when risks occur and prioritize the most important risks. According to ISO/IEC 27001:2013, safety controls and targets are established. The results of this research are purpose and security management documents, risk management documents, and operational standards of procedures (SOPs). Risk management documents related to information security include risk assessment, risk identification, risk analysis, and evaluation at the campus. Standard Operational Procedures (SOP) documentation includes policy documents, work instructions, and work records that are consistent with the selection of objective controls and security controls for risk management.
Implementation OSPFv3 For Internet Protocol Verses 6 (IPv6) Based On Juniper Routers Use Emulator Virtual Engine – Next Generation (Eve-NG) Fachrur Rozi, Nurwan Reza; Nurhayati, Ade; Arandiant Rozano, Seandy
International Journal of Engineering Continuity Vol. 3 No. 1 (2024): ijec
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/ijec.v3i1.141

Abstract

Advances in computer network technology and increased use of Internet information have reduced IPv4 offerings. This requires a computer network protocol that can replace the role of IPv4 which is currently limited/loose. Also known as Internet Protocol Verses 6 (IPv6), it aims to improve on IPv4 and does not represent a fundamental change from IPv4. Features that are available in IPv4 are also available in IPv6, but features that do not work in IPv4 are available in IPv4. IPv6 is no longer used. A transition mechanism is required to forward IPv6 packets to an existing IPv4 network and vice versa. One of the available mechanisms is automatic tunneling (abbreviated as Tunneling). The EVE-NG simulator is used to implement and study the routing protocol (OSPFv3) on IPv6 networks. To check the results, use the traceroute, ping command. The Juniper platform is implemented in this small virtual network to test the OSPFv3 protocol on an IPv6 network. This research explains how to assign IPv6 addresses on Juniper routers and end devices as well as their configuration. The Internet protocol layer is responsible for receiving and sending data packets within the network. In the virtual environment simulation mode, Juniper packets are analyzed and packet forwarding via IPv6 on OSPFv3 is used to make decisions for protocols in the IPv6 environment that are faster, and more secure.