The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS

  • Dwipo Setyantoro (1*) Institut Teknologi dan Bisnis Bank Rakyat Indonesia
  • Vivi Afifah (2) Institut Teknologi dan Bisnis Bank Rakyat Indonesia
  • Rika Astuti Hasibuan (3) Institut Teknologi dan Bisnis Bank Rakyat Indonesia
  • Novi Aprilia (4)
  • Novi Permata Sari (5) Universitas Persada indonesia YAI

  • (*) Corresponding Author
Keywords: Information Security, The Dude Mikrotik, Wireless Network

Abstract

The use of a wireless computer network in some institutions has become a very flexible option to connect all users of the existing computer network in the institution. This flexibility also has the disadvantage that anyone with a network password can take advantage of the wireless network. The possibility of threats to information security is very large, such as the presence of intruders on the network. Therefore, it is necessary to manage wireless networks that pay attention to information security issues on the network. The Directorate General of New, Renewable Energy and Energy Conservation at the Ministry of Energy and the Human Resources Republic of Indonesia was chosen as the research location given that computer network users in this institution are diverse and have also used The Dude MikroTik application to manage wireless computer networks, which are instruments to analyze information security. in this institution. The analysis was conducted to identify the activities and effectiveness of information security management in this institution. This study concludes that the use of The Dude MikroTik application is quite helpful in analyzing information security on wireless computer networks in this institution.

 

Downloads

Download data is not yet available.

References

W. Stallings, Data and Computer Communications, 8th ed. New Jersey: Pearson Education, Inc., 2007.

N. Y. Permana, “Tugas dan Fungsi,” Direktorat Jenderal EBTKE - Kementerian ESDM, 19-Feb-2014. [Online]. Available: https://ebtke.esdm.go.id/profile/2/tugas.dan.fungsi. [Accessed: 01-Mar-2022].

Kementerian Energi dan Sumber Daya Mineral, “Lokasi & Kontak,” ESDM, 2007. [Online]. Available: https://www.esdm.go.id/id/profil/lokasi-kontak.

S. Sujalwo, B. Handaga, and H. Supriyono, “Manajemen Jaringan Komputer Dengan Menggunakan Mikrotik Router (Computer Network Management Used With Microtic Router),” Komuniti J. Komun. dan Teknol. Inf., vol. 2, no. 2, pp. 32–43, Jan. 2011.

M. Subramanian, Network management: principles and practice. India: Pearson Education, 2010.

J. S. Beasley and P. Nilkaew, Networking Essentials. United Kingdom: Pearson, 2012.

J. Sen and S. Mehtab, Computer and Network Security. London: IntechOpen, 2020.

R. Dube, Internal Firewalls For Dummies®, VMware Special Edition, 1st ed. Hoboken: John Wiley & Sons, Inc., 2021.

H. Andrea, Cisco ASA Firewall Fundamentals, 3rd ed. Scotts Valley: CreateSpace Independent Publishing, 2014.

H. Andrea, “Cisco ASA 5505 5510 5520 5540 5550 5580 Throughput and Performance,” Network Training. [Online]. Available: https://www.networkstraining.com/cisco-asa-5505-5510-5520-5540-5550-5580/#Cisco_ASA_5520_Features_and_Specs. [Accessed: 10-Mar-2022].

A. Chopra, “Security Issues of Firewall,” Int. J. P2P Netw. Trends Technol., vol. 22, no. 1, pp. 4–9, Jan. 2016.

Sumarno, D. Hartama, I. Gunawan, H. S. Tambunan, and E. Irawan, “Optimization of Network Security Using Website Filtering With Microtic Routerboard,” J. Phys. Conf. Ser., vol. 1255, no. 1, p. 012076, Aug. 2019.

A. A. Astari, “Implementasi Keamanan Jaringan Dengan Metode Firewall Filtering Menggunakan Mikrotik,” Universitas Nusantara PGRI Kediri, Kediri, 2018.

MikroTik, “The Dude,” MikroTik. [Online]. Available: https://mikrotik.com/thedude. [Accessed: 10-Mar-2022].

Mikrotik ID, “Monitoring dengan aplikasi The Dude,” Mikrotik ID, 2022. [Online]. Available: http://mikrotik.co.id/artikel_lihat.php?id=172. [Accessed: 01-Mar-2022].

Published
2022-02-18
How to Cite
[1]
D. Setyantoro, V. Afifah, R. Hasibuan, N. Aprilia, and N. Sari, “The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS”, jitk, vol. 7, no. 2, pp. 105-110, Feb. 2022.
Article Metrics

Abstract viewed = 376 times
PDF downloaded = 295 times