scholarly journals Analisis Firewall Demilitarized Zone dan Switch Port Security pada Jaringan Universitas Putra Indonesia YPTK

KOMTEKINFO ◽  
2019 ◽  
Vol 6 (1) ◽  
pp. 29-29
Author(s):  
Syafri Arlis ◽  
Sahari

The development of information technology so rapidly, greatly helped the works of man. On the one hand man to be very helpful, but on the other side of the system's security level to rise sharply so that in essence the sides of human life is in a threatened position. The techniques of network security systems and precautions against attacks on information systems continue to be developed so that the integrity, availability and confidentiality in an information system becomes more secure. One way is by building a network security system and attack prevention system. In this paper, the authors construct a computer network security systems using a firewall Demiliteralized Zone (DMZ) by using IPtables which is the standard of Linux systems and and Switch Port Security (SPS). Utilization by combining these two technologies to achieve maximum levels of security and is able to block the intruder will attempt an attack with a variety of attacks identified.

Compiler ◽  
2013 ◽  
Vol 2 (2) ◽  
Author(s):  
Alfian Firdaus ◽  
Haruno Sajati ◽  
Yuliani Indrianingsih

Development o f information technology and computer networks in particular its services on the one hand facilitate the work of human beings, but as the very widespread use of the internet, the security level of digital data has become more vulnerable to exploitation. The problem arises when the attacks happened on a computer network in a relatively fast, so that an administrator must always keep an eye on the computer network security. Limitations o f an administrator is exactly what underlies thecreation o f a system capable o f detecting and prevention of these attacks, so the time efficiency can be actually implemented. The system is built to prevent attacks on computer networks such as port scanning, ftp, ssh and telnet brute force. This system will analyze the number o f errors that occur on login these services, and makes a decision system if the login error exceeds the tolerance of an administrator. I f the number o f errors exceeds the tolerance, it will automatically create the firewall rules in a very short duration is one minute, so the system is able to prevent the attacks which happened in a very quick time.


2018 ◽  
Vol 10 (3) ◽  
pp. 11-25
Author(s):  
Rizki Nurdin

With the existence of this information will be easily obtained, the exchange of data that occurs in the virtual world will increase. In addition to the development of this technology, unwittingly evolved also crimes that occur in cyberspace that can harm users who access these sites, ranging from the delivery of viruses, spamming or other types of crime. So that institutions connected in an Internet network will be very vulnerable to network security at the institution. This is given that the productivity of an institution or company will depend on the performance of the network in it. Damage that occurs in a network will result in data exchange that occurs on the network will slow or even damage the network system. Therefore a mechanism that is used to analyze network security is required. Computer network security systems connected to the Internet must be planned and well understood in order to protect the resources within the network effectively. Keywords : Nessus and Ethereal, Internet Security


2014 ◽  
Vol 1044-1045 ◽  
pp. 965-967 ◽  
Author(s):  
Lan Jiang

With the rapid development of economy and society, the growing prosperous computer network technology has now become one of the indispensable elements in human life. Small to every household personal computer systems, large to computer systems concerned countries, they are incorporated into the scope of computer network security systems. Enterprises are social living cells, with important role of financial intermediation, the mining technology and training personnel. Corporate computer systems is an important part to ensure high-speed operation of enterprises, summarize business information and protect trade secrets, therefore, the more developed computer network technology is, the more important the development and maintenance of corporate computer network security systems is. This article will explore the design and function of enterprise computer network security system implementations based on the characteristics of computer network security and enterprise computer network system.


2000 ◽  
Author(s):  
James D. Johannes ◽  
Andrew Fanning ◽  
Kyle Hoover ◽  
Tim Lewis ◽  
Marsha Robinson

2020 ◽  
Vol 39 (3) ◽  
pp. 4427-4441
Author(s):  
Bin Xu

The concept of fuzzy number intuitionistic fuzzy sets (FNIFSs) is designed to effectively depict uncertain information in decision making problems which fundamental characteristic of the FNIFS is that the values of its membership function and non-membership function are depicted with triangular fuzzy numbers (TFNs). The dual Hamy mean (DHM) operator gets good performance in the process of information aggregation due to its ability to capturing the interrelationships among aggregated values. In this paper, we used the dual Hamy mean (DHM) operator and dual weighted Hamy mean (WDHM) operator with fuzzy number intuitionistic fuzzy numbers (FNIFNs) to propose the fuzzy number intuitionistic fuzzy dual Hamy mean (FNIFDHM) operator and fuzzy number intuitionistic fuzzy weighted dual Hamy mean (FNIFWDHM) operator. Then the MADM methods are proposed along with these operators. In the end, we utilize an applicable example for computer network security evaluation to prove the proposed methods.


Sign in / Sign up

Export Citation Format

Share Document