The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS
The use of a wireless computer network in some institutions has become a very flexible option to connect all users of the existing computer network in the institution. This flexibility also has the disadvantage that anyone with a network password can take advantage of the wireless network. The possibility of threats to information security is very large, such as the presence of intruders on the network. Therefore, it is necessary to manage wireless networks that pay attention to information security issues on the network. The Directorate General of New, Renewable Energy and Energy Conservation at the Ministry of Energy and the Human Resources Republic of Indonesia was chosen as the research location given that computer network users in this institution are diverse and have also used The Dude MikroTik application to manage wireless computer networks, which are instruments to analyze information security. in this institution. The analysis was conducted to identify the activities and effectiveness of information security management in this institution. This study concludes that the use of The Dude MikroTik application is quite helpful in analyzing information security on wireless computer networks in this institution.
W. Stallings, Data and Computer Communications, 8th ed. New Jersey: Pearson Education, Inc., 2007.
N. Y. Permana, “Tugas dan Fungsi,” Direktorat Jenderal EBTKE - Kementerian ESDM, 19-Feb-2014. [Online]. Available: https://ebtke.esdm.go.id/profile/2/tugas.dan.fungsi. [Accessed: 01-Mar-2022].
Kementerian Energi dan Sumber Daya Mineral, “Lokasi & Kontak,” ESDM, 2007. [Online]. Available: https://www.esdm.go.id/id/profil/lokasi-kontak.
S. Sujalwo, B. Handaga, and H. Supriyono, “Manajemen Jaringan Komputer Dengan Menggunakan Mikrotik Router (Computer Network Management Used With Microtic Router),” Komuniti J. Komun. dan Teknol. Inf., vol. 2, no. 2, pp. 32–43, Jan. 2011.
M. Subramanian, Network management: principles and practice. India: Pearson Education, 2010.
J. S. Beasley and P. Nilkaew, Networking Essentials. United Kingdom: Pearson, 2012.
J. Sen and S. Mehtab, Computer and Network Security. London: IntechOpen, 2020.
R. Dube, Internal Firewalls For Dummies®, VMware Special Edition, 1st ed. Hoboken: John Wiley & Sons, Inc., 2021.
H. Andrea, Cisco ASA Firewall Fundamentals, 3rd ed. Scotts Valley: CreateSpace Independent Publishing, 2014.
H. Andrea, “Cisco ASA 5505 5510 5520 5540 5550 5580 Throughput and Performance,” Network Training. [Online]. Available: https://www.networkstraining.com/cisco-asa-5505-5510-5520-5540-5550-5580/#Cisco_ASA_5520_Features_and_Specs. [Accessed: 10-Mar-2022].
A. Chopra, “Security Issues of Firewall,” Int. J. P2P Netw. Trends Technol., vol. 22, no. 1, pp. 4–9, Jan. 2016.
Sumarno, D. Hartama, I. Gunawan, H. S. Tambunan, and E. Irawan, “Optimization of Network Security Using Website Filtering With Microtic Routerboard,” J. Phys. Conf. Ser., vol. 1255, no. 1, p. 012076, Aug. 2019.
A. A. Astari, “Implementasi Keamanan Jaringan Dengan Metode Firewall Filtering Menggunakan Mikrotik,” Universitas Nusantara PGRI Kediri, Kediri, 2018.
MikroTik, “The Dude,” MikroTik. [Online]. Available: https://mikrotik.com/thedude. [Accessed: 10-Mar-2022].
Mikrotik ID, “Monitoring dengan aplikasi The Dude,” Mikrotik ID, 2022. [Online]. Available: http://mikrotik.co.id/artikel_lihat.php?id=172. [Accessed: 01-Mar-2022].
Abstract viewed = 269 times
PDF downloaded = 187 times
Copyright (c) 2022 Dwipo Setyantoro, Vivi Afifah; Rika Astuti Hasibuan; Novi Aprilia, Novi Permata Sari
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.