scholarly journals Kerentanan yang Dapat Terjadi di Jaringan Komputer pada Umumnya

Author(s):  
Andre M. R. Wajong

The rapid development of computer technology allows ease of access, yet lurking threats. Security in computer networks are categorized into two, namely the physical and non physical security. Physical security is a security that is more likely to focus to all things physical. This type of security can be avoided by more careful guarding of the thieves’ threats by putting in locked places and so on. As with the non-physical security, the more important issue involved is such as data security where its physical value may be less important. Therefore, this article discussed the safety factor especially on a computer network, vulnerable points on the computer network, techniques often used on attacks and some things you can do to ward off them.

2014 ◽  
Vol 1003 ◽  
pp. 230-234
Author(s):  
Feng Long Fan ◽  
Xu Li ◽  
Xu Sheng Yu ◽  
Li Wang

With the development of computer technology, especially the rapid development and extensive application of database technology and computer network technology, the data quantity increases sharply, the accumulation of a large number of data in various fields, and rising fast. Enterprise database or data warehouse has stored a large number of customer data, these data include many aspects of the information of customers, but also contains the advantages and disadvantages of the enterprise operation. If we can use these data quickly, efficiently in-depth analysis and research, to find the rules and modes, to obtain the necessary knowledge from it, will help enterprises to better decision making. The system can successfully excavate students and staff of the tendency of consumption and consumption habits, analyze their satisfaction with each restaurant. The results of system analysis to a certain role for school students and teachers to understand and analyze the condition of daily consumption, so the establishment of this system has great practical value.


2021 ◽  
Vol 2074 (1) ◽  
pp. 012029
Author(s):  
Jun Lu

Abstract With the rapid development of modern economy and science and technology, my country’s computer technology has also been rapidly developed. In daily life, information technology has a great impact on people’s lives, such as the large-scale use of mobile media. Essentially, mobile media is a kind of remote network communication technology. With this technology, real-time sharing of information in society can be realized. This article mainly analyzes the application of computer remote network communication technology from the current situation.


2021 ◽  
Vol 2143 (1) ◽  
pp. 012019
Author(s):  
Qi Gao ◽  
Jinniu Bai

Abstract With the rapid development of Internet, network security occupies the primary position in computer technology. It is mainly to ensure the security of information, can make the information in the network safe transmission. Next, also want to prevent the invasion of soft virus infection. At present, there are many kinds of technologies to maintain network information security. Such as firewalls, anti-virus software technology, file encryption and digital signature technology. This paper describes the vulnerability of network security and the importance of maintaining its security, mainly study the role of Java in computer network security technology and its application in which, finally based on Java network security technology and some other comparison, draw its advantages.


2019 ◽  
Vol 3 (4) ◽  
Author(s):  
Jie Li

Informationization and automation are important in library management due to the development of computer technology and network technology. Although computer networks bring great convenience and improvement to library management’s efficiency and quality, there are many security issues that could tag along with networks. The library information is prone to leak due to virus and hackers as well as the transparency of the network. Thus, this leads to a high security risk in library management. Therefore, this paper mainly analyses the security management strategies of library computer networks.


2021 ◽  
Vol 10 (2) ◽  
pp. 170-175
Author(s):  
I Putu Agus Eka Pratama ◽  
Kevin Christopher Bakkara

The development of information technology and computer network from time to time is increasing along with the increase in user needs for both from the business, education, industrial, to data security side. Data of network traffic that is getting denser in communication and data exchange between users on computer networks can become a problem when using conventional computer network technology. For that, it needs a new technology that is implemented in computer networks, along with the measurement of Quality of Service (QoS) in it. Software-Defined Networking (SDN) is a solution for this, where the stages of network design, management and implementation, separate the data plane and the control plane. In this research, the implementation of SDN was carried out in the form of a simulation using both of Mininet and OpenDaylight with a Tree Topology, then the QoS measurements were carried out in it. The results of testing and measuring QoS on SDN simulations with Tree topology using Mininet and OpenDaylight, showed a Jitter value of 0.425 ms, a Packet Loss value of 0.266%, a Bandwith value of 9.3925 Mbps, a UDP Throughput value of 2.348 bits/sec, and a TCPThroughput value of 2.335 bits/sec.


2020 ◽  
Author(s):  
Dedy Agung Prabowo ◽  
Ujang Juhardi ◽  
Bambang Agus Herlambang

Recently, Information technology develops rapidly. It is possible for us to get some informationquickly, properly and efficiently. The information technology also has many advantages fo r people. Theneed for information is increasing according to the need of its users. This proves that informationtechnology can make our job easier and it can help us to save our time particularly for the job thatrelated to information and data processin g. With the increasing use of computer technology today, italso brings up some problems. One of them is security and confidentiality problem which is animportant aspect in an information system. Data security is an important thing in maintaining theconf identiality of particular data that only can be known by those who have right. RC6 is a symmetrickey algorithm which encrypts 128 bit plaintext blocks to 128 bit ciphertext blocks. The encryptionprocess involves four operations which is the critical arit hmetic operation of this block cipher. As alegal state, Indonesia has issued a regulation in a form of laws governing information and electronictransaction or commonly referred to UU ITE. Besides, Islam is a religion that comprehensively givesthe guidan ce of life for people. Islam has provided guidance in the various fields ranging from social,politics, economics and various other fields.


2013 ◽  
Vol 433-435 ◽  
pp. 1720-1723
Author(s):  
Jun Ruan ◽  
Pan Zhang ◽  
Hong Bi Ding

With the rapid development of computer network technology, global information has become mega-trend of modern social development. But due to all kinds of defects existing in the network itself and variety and openness of network interconnection form, network security has become the focus of social attention. So in this paper, a lot of current advanced network security technologies and products are used in order to make network security, which is under the general principles of network security situation.


2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


Author(s):  
Zhenni Wu ◽  
Hengxin Chen ◽  
Bin Fang ◽  
Zihao Li ◽  
Xinrun Chen

With the rapid development of computer technology, building pose estimation combined with Augmented Reality (AR) can play a crucial role in the field of urban planning and architectural design. For example, a virtual building model can be placed into a realistic scenario acquired by a Unmanned Aerial Vehicle (UAV) to visually observe whether the building can integrate well with its surroundings, thus optimizing the design of the building. In the work, we contribute a building dataset for pose estimation named BD3D. To obtain accurate building pose, we use a physical camera which can simulate realistic cameras in Unity3D to simulate UAVs perspective and use virtual building models as objects. We propose a novel neural network that combines MultiBin module with PoseNet architecture to estimate the building pose. Sometimes, the building is symmetry and ambiguity causes its different surfaces to have similar features, making it difficult for CNNs to learn the differential features between the different surfaces. We propose a generalized world coordinate system repositioning strategy to deal with it. We evaluate our network with the strategy on BD3D, and the angle error is reduced to [Formula: see text] from [Formula: see text]. Code and dataset have been made available at: https://github.com/JellyFive/Building-pose-estimation-from-the-perspective-of-UAVs-based-on-CNNs .


2021 ◽  
Author(s):  
Zhangyue Shi ◽  
Chenang Liu ◽  
Chen Kan ◽  
Wenmeng Tian ◽  
Yang Chen

Abstract With the rapid development of the Internet of Things and information technologies, more and more manufacturing systems become cyber-enabled, which significantly improves the flexibility and productivity of manufacturing. Furthermore, a large variety of online sensors are also commonly incorporated in the manufacturing systems for online quality monitoring and control. However, the cyber-enabled environment may pose the collected online stream sensor data under high risks of cyber-physical attacks as well. Specifically, cyber-physical attacks could occur during the manufacturing process to maliciously tamper the sensor data, which could result in false alarms or failures of anomaly detection. In addition, the cyber-physical attacks may also illegally access the collected data without authorization and cause leakage of key information. Therefore, it becomes critical to develop an effective approach to protect online stream data from these attacks so that the cyber-physical security of the manufacturing systems could be assured. To achieve this goal, an integrative blockchain-enabled method, is proposed by leveraging both asymmetry encryption and camouflage techniques. A real-world case study that protects cyber-physical security of collected stream data in additive manufacturing is provided to demonstrate the effectiveness of the proposed method. The results demonstrate that malicious tampering could be detected in a relatively short time and the risk of unauthorized data access is significantly reduced as well.


Sign in / Sign up

Export Citation Format

Share Document