Network Security with Firewall using MikroTik RB941

e-NARODROID ◽  
2018 ◽  
Vol 4 (2) ◽  
pp. 13-24
Author(s):  
Siti Agustini ◽  
Ahmad Mudzakir

Abstract : The Internet is an advancement of information technology is very instrumental in various fields today. The Internet connects everyone despite being far apart. So the internet is very important role in terms of communication. The Internet is widely applied in the education sector, government, and even companies. Through the internet, data exchange in these sectors can be done. However, the exchange of such data must be secure or accessible only to the person entitled to the data. For that network security is needed to protect data owned by each agency or sector. Researchers in this paper develop network security with firewall using MikroTik RB941. In this research, built a server using MikroTik RB941 with Firewall feature to restrict visitor access rights, where only recognizable visitors will be able to access the server. So the firewall here filters the user's access to the server. From the test results obtained that the firewall applied to MIkroTik RB941 can perform filtration process on the user who tries to access to the server.   Kata Kunci : network security, firewall, mikrotik 

2020 ◽  
Vol 9 (3) ◽  
pp. 420-426
Author(s):  
Susan Dian Purnamasari ◽  
Firamon Syakti

One of the products of information technology that is common today is the school website. Where the school website is the spearhead for schools in disseminating information to related parties. The most important aspect of a website is the usability aspect because it greatly affects visitor convenience. The use of the website for disseminating information is also used by SMK Negeri Sumsel and the school's main portal on the internet. For that to see the importance of the usability aspect, this study aims to see the level of usability of the SMK Negeri Sumsel website. In measuring the level of usability, usability testing techniques are used with the stages of preparation, selecting respondents, data collection and data analysis. The test results show that the usability aspects on the website such as errors, learnability, memorability and satisfaction get good ratings while the efficiency aspects are not categorized as good.


2021 ◽  
Vol 7 (1) ◽  
pp. 30-39
Author(s):  
Fadlan Abdillah Hasibuan ◽  
Subhiyanto

Abstract— This research aims to create a proxy hotspot network to connect to the internet with a login system for users,namely teachers, staff and students at Madrasah Aliyah Al-Azhaar Ummu Suwanah and create a user management system on the hotspot so that network administrators can control and monitor users. and network security can be covered. Building a mikrotik hotspot network at Madrasah Aliyah Al-Azhaar Ummu Suwanah with the PIECES modeling analysis method using Winbox, while for network development with Usermanager. The test results conducted by the user have been connected to the proxy hotspot and got the bandwidth according to the package received. The design of the proxy hotspot network at Madrasah Aliyah Al-Azhaar Ummu Suwanah shows that the proxy hotspot provides convenience and practicality in using the internet. Intisari— Penilitian ini bertujuan untuk membuat sebuah jaringan hotspot mikrotik agar terhubung ke internet dengansistem login untuk para pengguna yaitu, guru, staff maupun siswa di Madrasah Aliyah Al-Azhaar Ummu Suwanah danmembuat sebuah sistem manajemen user pada hotspot sehingga administrator jaringan dapat mengontrol dan memonitoringuser serta keamanan jaringan bisa tertutupi. Membangun jaringan hotspot mikrotik di Madrasah Aliyah Al-Azhaar UmmuSuwanah dengan metode analisis pemodelan PIECES menggunakan winbox, sedangkan untuk pengembanganjaringan dengan usermanager. Hasil uji coba yang dilakukan pengguna sudah terhubung ke hotspot mikrotik dan mendapatbandwidth sesuai dengan paket yang didapat. Rancang bangun jaringan hotspot mikrotik di Madrasah Aliyah Al-Azhaar UmmuSuwanah ini menunjukkan bahwa hotspot mikrotik memberikan kemudahan dan kepraktisan dalam penggunaan internet.


2014 ◽  
Vol 701-702 ◽  
pp. 1049-1053
Author(s):  
Wei Wei Li ◽  
Cheng Zhou

To resolve the complexity and diversity of data exchange, the paper designed an data exchange system based on middleware technology, which realized different parsing and filtering capabilities. The method can meet the need of data exchange on the premise that network security can be guaranteed. The test results show that functionality and performance of the system meet the requirements of data isolation and exchange.


Author(s):  
Ibnu Utomo Wahyu Mulyono ◽  
Ajib Susanto ◽  
Tiara Anggraeny ◽  
Christy Atika Sari

 The growing information technology is very rapidly, the more evolving crime techniques to find information that is confidential. The Internet is one of the main media in disseminating information. The use of security on the internet still needs to be developed. Based on these problems, the type of research undertaken in the writing of this final task is the type of experimental research by developing methods that have been done by previous researchers to hide secret data that is inserted into the audio * .wav so that the security and confidentiality of data can be guaranteed. data security can be done with various methods, including cryptography and steganography. Cryptography is a technique for encrypting messages and steganography is a message concealment technique. This insertion type uses binary ASCII character code. In the cryptographic process, using the Vigenere Cipher algorithm and in the steganography, process using the algorithm (LSB) Least Significant Bits. The merger of the two techniques resulted in a better new digital image security system and increased the value of MSE, PSNR and Execution time. Then the test results in the evaluation using BER and histogram analysis. Good audio quality has a minimum value of 30 dB PSNR. In the embedding process using combinations of vigenere and LSB methods, Audio 15 is the best audio compared to other audio. Audio 15 has a smaller MSE (0.001656) value and a larger PSNR (124.138499) value than any other audio when embeded messages *.txt file with character 4096.


2018 ◽  
Vol 10 (3) ◽  
pp. 11-25
Author(s):  
Rizki Nurdin

With the existence of this information will be easily obtained, the exchange of data that occurs in the virtual world will increase. In addition to the development of this technology, unwittingly evolved also crimes that occur in cyberspace that can harm users who access these sites, ranging from the delivery of viruses, spamming or other types of crime. So that institutions connected in an Internet network will be very vulnerable to network security at the institution. This is given that the productivity of an institution or company will depend on the performance of the network in it. Damage that occurs in a network will result in data exchange that occurs on the network will slow or even damage the network system. Therefore a mechanism that is used to analyze network security is required. Computer network security systems connected to the Internet must be planned and well understood in order to protect the resources within the network effectively. Keywords : Nessus and Ethereal, Internet Security


2018 ◽  
Vol 1 (2) ◽  
pp. 137
Author(s):  
Khairul Saleh ◽  
Tini Fitriani

Abstrack - The application of information technology at this time is very closely related to everyday life. Komunikas which at first was only conveyed in a very simple way, namely "mouth by mouth" (coming directly between one human and another). In addition, the speedy internet network security system is also used as a process to prevent and identify unauthorized users (intruders) from the internet network. The aim is to anticipate the risk of internet networks that can be either physical or logical threats. What is meant by physical threat is that can damage the physical part of the computer or computer hardware while the threat of logic is in the form of theft of data or intruders who break into someone's account.   Keywords - Security System, Speedy Network


Author(s):  
Firmansyah Firmansyah ◽  
Rachmat Adi Purnama ◽  
Rachmawati Darma Astuti

The use 802.11 wireless-based network services have become one of the most widely used network services, this will be directly proportional to the security holes that are in the wireless network. The rise of access rights theft in wireless networks is due to the large number of software and tools available on the internet to read encryption in wireless security. To minimize the occurrence of theft of access rights in wireless networks can use a layered security system by implementing security Hotspot login and MAC Address Filtering. This layered wireless network security is able to block users who try to access the network. This is because the wireless network security system has verified access rights 2 (two) times by matching the username and password in the hotspot login with the physical address or MAC address of the client. From the research results obtained by clients who use a username and password with different devices can not access the computer network. So every client who wants to connect to the internet network must use a device that has registered its MAC Address and in accordance with user access rights and passwords in the Hotspot login


2013 ◽  
Vol 680 ◽  
pp. 554-558
Author(s):  
Jin Song Hu

With the rapid development of the Internet, EC is growing rapidly. The use of information technology to transmit and process business information has inevitably brought the defects and shortcomings of its own into the field of EC.The security issue is becoming the primary factor restricting the development of electronic commerce ,and is the most important issues related to EC system can be run successfully. EC security issues can be basically divided into two parts, namely, computer network security and business transaction security. The paper discusess these two parts and gives the countermeasures in the last.


2022 ◽  
Vol 2146 (1) ◽  
pp. 012019
Author(s):  
Ang Zhou

Abstract Networking is one of the new technologies supported by our country’s national “125” strategic industry plan, mainly used in medicine, military industry, transportation and other fields. While enjoying the convenient business of the, people also pay more attention to the security of the Internet of Things information system. Therefore, this article mainly discusses security under the perspective of the IoT, and understands the relevant basic theoretical knowledge about the IoT and security on the basis of a large number of documents, and then conceives the security methods under the perspective of the IoT, and the designed method has been tested, and the test results show that the performance of the encryption algorithm in the network security scheme of this article is due to the traditional encryption algorithm. When the encrypted text is 15000 bytes, the encryption time is 40s.


Sign in / Sign up

Export Citation Format

Share Document