scholarly journals ANALISA SISTEM INFORMASI KEAMANAN INTERNET SPEEDY PADA PLASA TELKOM TANJUNGBALAI

2018 ◽  
Vol 1 (2) ◽  
pp. 137
Author(s):  
Khairul Saleh ◽  
Tini Fitriani

Abstrack - The application of information technology at this time is very closely related to everyday life. Komunikas which at first was only conveyed in a very simple way, namely "mouth by mouth" (coming directly between one human and another). In addition, the speedy internet network security system is also used as a process to prevent and identify unauthorized users (intruders) from the internet network. The aim is to anticipate the risk of internet networks that can be either physical or logical threats. What is meant by physical threat is that can damage the physical part of the computer or computer hardware while the threat of logic is in the form of theft of data or intruders who break into someone's account.   Keywords - Security System, Speedy Network

Author(s):  
Andreas Sebayang ◽  
Indrastanti Ratna Widiasari

Technology and internet networks are two things that are always related, because in today's era the internet has become a much-needed medium for learning, communicating, exchanging data, and even playing. With the activity of using the internet network, a problem will arise, namely network security. Network security is a very important aspect as a defense in a network, to minimize the risk of data theft and unwanted access in an internet network. The purpose of this study is to implement the control and security of internet use in an agency with minimal costs. namely using the Linux operating system Ubuntu Server 18.04, Proxy Server, and Snort. The result of the system that has been created has a function to perform caching so that it can save bandwidth and can function as filtering content to minimize unwanted things on the network. In addition, the system created is very helpful for network admins to monitor the network in real-time, even can also enforce rules to protect the network.


2021 ◽  
Vol 4 (2) ◽  
pp. 280-289
Author(s):  
Lian Fawahan ◽  
Ita Marianingsih Purnasari

The occurrence of the Covid-19 pandemic  makes many MSMEs have to lose money and go out of business, whereas in Indonesia the most important joint that sustains the wheels of the country's economy is MSMEs. In addition to the pandemic, the challenge of MSMEs is rise of the digital economy movement is very  rapid  for making    MSMEs  demanded to understand information technology. The covid-19 pandemic is increasingly encouraging human activity through the internet network. One of the simplest steps to build a brand through TikTok social media. In  2020 number of downloads amounted to 63.3 million both in the Apple store and the play store the best-selling application is TikTok. Indonesia  is the downloader of the application amounting to 11% of the total downloads of tiktok application, with tiktok MSME actors can build their product brand, considering it does not require a lot of cost and energy. The potential of the wider market and the future business will also be a consideration because tiktok social media is widely used by millennials who have high consumptive power.  This study uses qualitative descriptive, uses literature studies quoted from book journals as well as relevant websites. The purpose of this study is to encourage MSMEs to have a good brand so that they can compete with other products, and through social media, especially TikTok, the MSME market segment can be wider internationally. Considering that social media has eliminated geography, meaning that when it can go viral social media, everyone can see MSME products. Keywords: MSMEs, Branding, TikTok


2019 ◽  
Vol 10 (03) ◽  
pp. 114-121
Author(s):  
Armanto Armanto

ABSTRACT The problem in this study is that more and more internet users in the Bina Insan Lubuklinggau University building specifically the Faculty of Computer internet connection often experience problems, the internet network is still unstable, and ways to divide internet access points in the Computer Faculty. This study uses data collection methods by observing and recording directly at the research site (Observation), conducting question and answer directly to the source (Interview), and documentation by reading literature books. The results showed that the internet is often experiencing constraints and unstable internet networks and ways to divide internet access points at the Computer Faculty of the University of Bina Insan Lubuklinggau by using Policy Base Routing and Failover Implementation using a Mikrotik Router. It can be concluded that the internet network connection is stable and shows the results of the distribution of internet access points at the Faculty of Computer Bina Insan Lubuklinggau. Keywords: Mikrotik, Policy Base Routing, Failover


2014 ◽  
Vol 556-562 ◽  
pp. 5316-5320
Author(s):  
Yi Peng Zhang ◽  
Zheng Tao Jiang ◽  
Chen Yang

Routers are the key equipments connecting Wan, LAN and Internet network, and are the main part of the Internet. The reliability and security of routers is very important to the network performance and information data security. The analysis and research on the technologies of router security and protection is the core issue for network security. This paper mainly aims at providing a series of test and analysis on the vulnerabilities of Tenda wireless routers. Technically, it’s very difficult to crack the WPA /WPA2 wireless encryption. In this paper, we use the related vulnerabilities of wireless routers, and open Wifi Protection Setup (WPS) and Quick Security Settings (QSS) to get router PIN code, which can help us bypass the WPA/WPA2 encryption and, realizesd the router attack.


2020 ◽  
Vol 2 (2) ◽  
pp. 70
Author(s):  
Galih Fanani ◽  
Imam Riadi

This research is carried out an analysis and investigation of digital log file data retrieval from DoS (Denial of Service) attacks, on internet networks that have been detected by IDS (Intrusion Detection System) and using Wireshark as Tools Analysis Network. The research phase begins with the design of an experimental scenario which is often carried out daily where users access the internet network. The next stage is an attack in the form of ping flood on the target computer connected to the internet network, the final stage of data retrieval which will be analyzed later. Testing research using UAT (User Acceptance Test), to prove that the analysis has been received by the user. The results of research conducted to obtain data in the form of an attacker's IP (Internet Protocol), target IP, protocol type, the port used and the time of the attack. In the UAT test results, the obtained value of 18% of students disagrees, 58% of students agree, and 24% of students strongly agree. This research has conducted an analysis of random data attacks using Wireshark applications received by users.


MATICS ◽  
2016 ◽  
Vol 8 (1) ◽  
pp. 1
Author(s):  
Ali Mahmudi ◽  
Sandy Nataly Mantja ◽  
Achmad Rozikin

<p style="text-align: justify;"> With the development of technology, especially in the IT field, the more developed also the current exchange of information using internet technology. Security of information transmitted via the Internet network is a must to maintain the confidentiality and originality of the information. Technology to maintain the security of the information used in this paper is a cryptography and steganography. Application cryptography to secure information on the text, then the information is hidden in digital images. So that only users who have a lock / unlock passwords only, can read the message in greeting such information.</p>


2021 ◽  
Vol 6 (1) ◽  
pp. 14
Author(s):  
Mohamad As'ad ◽  
Nasrul Firdaus ◽  
Ali Syaifullah

<p><strong><em>Abstract.</em></strong> <em>Information technology is one of the tools in various fields, including in the field of Islamic da'wah. Islamic da'wah with information technology in the form of live streaming recitation to youtube (online da'wah) is viral now. This online da'wah was the wish of Takmir and the congregation of Masjid Jami' Manarul Huda. Setting up the internet network with Mikrotik and making channels on youtube at the Masjid Jami' Manarul Huda was community empowerment, namely the application of science and technology to the community at the Masjid Jami' Manarul Huda. This program was a form of community service from STMIK PPKIA Pradnya Paramita (STIMATA) Malang. This community service aims to apply the knowledge that was on campus to the wider community, especially the </em><em>Masjid </em><em>Jami 'Manarul Huda so that they can carry out wider preaching and serve the congregation. The installation of the Telkom Indihome network was carried out at the end of December 2018 and also proxy settings and the creation of a youtube channel, namely "manarul_huda official" completed in early January 2019. After the internet network and hotspot were built, congregations could use free internet access at the mosque and from routine religious studies could do live streaming or upload videos about da'wah activities at the mosque so that it can be accessed by fellow Muslims even though they don't come to the mosque. Hopefully, this program can provide benefits for the congregation and Takmir of Masjid Jami 'Manarul Huda Malang City.</em></p><p><strong><em> </em></strong></p><p><strong>Abstrak.</strong> Teknologi informasi merupakan salah satu alat bantu dalam berbagai bidang tidak terkecuali dalam bidang dakwah Islam. Dakwah Islam dengan teknologi informasi yang berupa pengajian live streaming ke youtube (dakwah online) sekarang ini lagi viral. Dakwah online ini merupakan keinginan dari takmir dan jama’ah Masjid Jami’ Manarul Huda. Setting jaringan internet dengan mikrotik dan pembuatan channel di youtube di Masjid Jami’ Manarul Huda ini merupakan pemberdayaan masyarakat yaitu program penerapan iptek pada masyarakat di Masjid Jami’ Manarul Huda. Program ini sebagai bentuk pengabdian masyarakat dari STMIK PPKIA Pradnya Paramita (STIMATA) Malang. Tujuan Pengabdian masyarakat ini adalah untuk mengaplikasikan keilmuan yang ada pada kampus ke masyarkat luas kususnya Masjid Jami’ Manarul Huda, supaya bisa melakukan dakwahnya lebih luas lagi dan melayani jama’ah. Pemasangan jaringan Telkom Indihome dilakukan pada akhir Desember 2018 dan juga settting mikrotik serta pembuatan channel youtube yaitu “manarul_huda official” selesai awal Januari 2019. Setelah terbangun jaringan internet dan hotspotnya, maka jamaah bisa menggunakan akses internet gratis di masjid dan dari kajian rutin keagamaan bisa melakukan live streaming atau upload video tentang aktifitas dakwah dimasjid supaya bisa diakses oleh sesama muslim walaupun tidak datang ke masjid. Mudah-mudahan program ini bisa memberikan manfaat bagi jama’ah dan takmir Masjid Jami’ Manarul Huda Kota malang.</p><p> </p>


2019 ◽  
Vol 3 (02) ◽  
pp. 179-188
Author(s):  
Ayouvi Poerna Wardhanie ◽  
Puspita Kartikasari ◽  
Sri Hariani Eko Wulandari

This study aims to determine how the use of internet media in the Micro, Small, and Medium Enterprises (MSMEs) of East Java to penetrate the Global Market with the O2O Method. MSME is a business activity that plays a major role in the economic development of a nation, but one of the obstacles in the development of MSMEs, especially in Indonesia is the number of business people who are still reluctant to know internet technology, even though with utilizing information technology and internet networks that are more easily accessible and used can help develop the businesses many times. Therefore, the existence of this research is expected to be  able to contribute in identifying internet facility and infrastructure ownership in MSMEs, MSME perceptions of the usefulness of information technology in their business, and the interest and mastery of MSME entrepreneurs’ technology in adopting the internet for business development in the global market. The analytical method used is descriptive statistics, with questionnaire instruments. The number of samples in this study are 102 MSMEs in East Java, especially in the fields of trade, hotels, and restaurants. The results of this study are: 87% of MSMEs have not utilized the Marketplace, 79.41% of MSMEs have not utilized E-Commerce, 82.35% of MSMEs have not utilized Crowdsourcing, 78.14% of MSMEs have not marketed their businesses through social media, so it can be concluded that MSMEs at East Java is not ready to penetrate the market global, because of the internet media used so far, most are only used as personal communication tools.


2018 ◽  
Vol 10 (3) ◽  
pp. 11-25
Author(s):  
Rizki Nurdin

With the existence of this information will be easily obtained, the exchange of data that occurs in the virtual world will increase. In addition to the development of this technology, unwittingly evolved also crimes that occur in cyberspace that can harm users who access these sites, ranging from the delivery of viruses, spamming or other types of crime. So that institutions connected in an Internet network will be very vulnerable to network security at the institution. This is given that the productivity of an institution or company will depend on the performance of the network in it. Damage that occurs in a network will result in data exchange that occurs on the network will slow or even damage the network system. Therefore a mechanism that is used to analyze network security is required. Computer network security systems connected to the Internet must be planned and well understood in order to protect the resources within the network effectively. Keywords : Nessus and Ethereal, Internet Security


2019 ◽  
Vol 3 (2) ◽  
pp. 169
Author(s):  
Oris Krianto Sulaiman

Abstrak - The acceleration of data communication in the world of information technology is developing very fast, more than millions of digital messages are exchanging every day in cyberspace. These digital messages are freely communicating on internet networks or public networks that result in anyone being able to access these digital messages. Because the openness of the internet network that involves many people can take digital messages, the protection for the messages should be good. Digital message protection is used so that digital messages are directed to their intended destination, for this reason, a method is needed to maintain the confidentiality of the digital message. Cryptogafi is the study of encoding. By using cryptography digital messages can be changed into passwords so that the confidentiality of digital messages is maintained. Many algorithms can be used to change the original message (plaintext) into a password (ciphertext), one of which is the XOR cipher that utilizes the binary of each character. XOR cipher has a security hole that can be used by cryptanalysts such as using known-plaintext attack, ciphertext-only attack, and flip bit attack. Therefore, to increase the confidentiality of the message, the binary plaintext generated by the XOR cipher will be encrypted again using the Merkle-Hellman Knapsack. The results of this hybrid cryptosystem add a high level of digital message security because the binary ciphertext will re-form the ciphertext with Merkle-Hellman Knapsack, thus forming twice the protection.Keywords - Digital Message, Hybrid Cryptosystem, XOR Cipher and Merkle–Hellman Knapsack Abstract – Percepatan komunikasi data dalam dunia teknologi informasi berkembang sangat cepat, lebih dari jutaan pesan-pesan digital setiap harinya saling bertukar didunia maya. Pertukan pesan digital ini secara bebas berkomunikasi di jejaring internet atau jaringan umum yang mengakibatkan setiap orang dapat mengakses pesan digital tersebut. Sebab keterbukaan jaringan internet yang melibatkan banyak orang bisa mengambil pesan digital tersebut maka sudah seharusnya perlindungan untuk pesan tersebut harus baik. Perlindungan pesan digital tersebut digunakan agar pesan digital tertuju ke tujuan yang semestinya, untuk itu perlu adanya metode untuk menjaga kerahasiaan pesan digital tersebut. Kriptogafi merupakan ilmu yang mempelajari tentang penyandian. Dengan menggunakan kriptografi pesan digital dapat diubah menjadi sandi sehingga kerahasiaan pesan digital terjaga. Ada banyak algoritma yang dapat digunakan untuk merubah pesan asli (plaintext) menjadi sandi (ciphertext) salah satunya XOR cipher yang memanfaatkan binary dari setiap karakter. XOR cipher mempunyai celah keamanan yang dapat dimanfaatkan kriptanalis seperti menggunakan known-plaintext attack, ciphertext-only attack dan flip bit attack. Oleh sebab itu untuk meningkatkan kerahasiaan pesan maka binary plaintext yang dihasilkan oleh XOR cipher akan enkripsi lagi menggunakan Merkle–Hellman Knapsack. Hasil dari hybrid cryptosystem ini menambahkan tinggat keamanan pesan digital karena pada binary ciphertex akan membentuk ciphertext kembali dengan Merkle–Hellman Knapsack, sehingga membentuk dua kali perlindungan.Kata kunci – Pesan digital, Hybrid Cryptosystem, XOR Cipher dan Merkle–Hellman Knapsack


Sign in / Sign up

Export Citation Format

Share Document