Pelatihan Topologi Jaringan Menggunakan Cisco Packet Tracer untuk Meningkatkan Kompetensi Mahasiswa Politeknik Angkatan Darat Malang

2021 ◽  
Vol 2 (2) ◽  
pp. 117-123
Author(s):  
Priska Choirina ◽  
Muhammat Maariful Huda ◽  
Urnika Mudhifatul Jannah ◽  
Satria Utama ◽  
Erlillah Rizqi Kusuma Pradani

The positive value of the internet is that the information generated can facilitate everyday human work. One of the negative impacts caused by the internet is cyber crime. As the Indonesian Army who is conducting studies at the Politeknik Angkatan Darat, it is not only required to be professional and proficient in physical warfare strategies. But it also has to be sophisticated and not technologically illiterate in dealing with all threats in cyberspace, including cyber crime. One of the basic sciences for dealing with cyber crime is computer networks by implementing the concept of network topology. Network topology simulation training using packet tracer software in the context of community service activities has the aim of providing technological concepts about the use of packet tracers along with network topology simulations. This training begins with an introduction to network topology which discusses implementation in military life and its strengths and weaknesses. Furthermore, the implementation of this knowledge into a packet tracer and simulating the network topology. From the participants consisting of telkommil, it is hoped that all of them can take part in the training in order to understand how to design a good computer network using packet tracer software.

2020 ◽  
Vol 8 (4) ◽  
pp. 445
Author(s):  
Desak putu Sekar merta Putri ◽  
I Komang Ari Mogi

The internet is one part that can not be released in human life today. Every year internet users both in Indonesia and in the world have increased. This increase in internet users causes the availability of IP to decrease. That is because users who will use the internet must have an IP. The availability of IPv4 is currently decreasing. To overcome these problems, IPv6 was made which was announced to replace the existence of IPv4. But another solution that can be taken is using subnetting. With subnetting, IP can be used optimally according to the needs of the host or can make efficient use of IP. And subnetting also functions to avoid congestion resulting from too many hosts on the physical network. And to connect between subnets, routing will be done.


Author(s):  
Cyrille Clovis Tchouchoua Teyou ◽  
Pin Zhang

The growing volume of attacks on the Internet has increased the demand for more robust systems and sophisticated tools for vulnerability analysis, intrusion detection, forensic investigations, and possible responses. Current hacker tools and technologies warrant reengineering to address cyber crime and homeland security. The being aware of the flaws on a network is necessary to secure the information infrastructure by gathering network topology, intelligence, internal/external vulnerability analysis, and penetration testing. This paper has as main objective to minimize damages and preventing the attackers from exploiting weaknesses and vulnerabilities in the 4 ways handshake (WIFI).We equally present a detail study on various attacks and some solutions to avoid or prevent such attacks in WLAN.


Wajah Hukum ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 118
Author(s):  
Ryan Aditama

Crime in the field of cyberspace or commonly known as cyber crime basically refers to computer devices and technological devices that use a system connected to the internet as an element of its use. Progress in the field of information technology, which is the origin of the emergence of cyber crime, will legally bring both positive and negative impacts to the law itself. On the other hand, criminals, especially hackers who deliberately commit acts illegally to take someone's personal data, especially like Internet Banking users who are connected to the whatsapp number belonging to their bank account, of course many criminals have used this opportunity to break into the account. Someone's Internet Banking lately often happens because the operator asks for an OTP (One-Time-Passwrord) code. Related to the research made by this writer with the use of the type of research that is normative juridical here is related to research aimed at the rules of norms contained in a rule of law, while the conceptual approach used is an approach of legislation and a conceptual approach through disclosing several principles Laws relating to Law Enforcement of Cyber Crime Against Crime of Theft of Customer Money By Hijacking Internet Banking Accounts Through Social Media, discussions are conducted in a deductive manner to obtain qualitative conclusions. Related to the crime of cyber crime against the crime of theft of customer money by hijacking internet banking accounts via social media is a very urgent issue to be followed up, because in today's modern era, all human activities cannot be separated and kept away from the Internet and its users. Internet Banking account, where everything is currently being demanded to be modern due to the rapid development of technology and information at this time and is also something that must be resolved immediately. The Indonesian government in this case is part of the Ministry of Information and Communication which works with all stakeholders and strives to realize this hope.


Author(s):  
Andreas Andrie DJATMIKO

Community Service is one of the programs that are needed by the community today. This is done as an effort to respond to the needs of the community and is real program and realistic, especially in the fields of education, social, economic and cultural. Community Service Program is a program that is learning, studying and serving that is realized in the form of introduction and appreciation of community development through the clarity of planned change programs and problem solving methods regarding the ability to choose and use the right skills. A big nation is a nation that wants to respect its culture. Indonesia has a diversity of cultures that are characteristic and assets of the Indonesian nation. But most of the younger generation has forgotten a lot of the culture of the nation. The tendency of the younger generation now prefers outside cultures and many younger generations are less able to sort out most of which have negative impacts rather than a positive impact on themselves and others as well as the environment. There is a need for character education so that the younger generation can be relied upon in the future according to the nation's culture, such as being responsible for mutual cooperation, mutual assistance and good manners. Reog Kendhang's art proves that local culture can increase the sense of community nationalism and be able to become social controls so as not to fall into bad lifestyle. The formation of a national culture that can truly reunite all components of the nation's culture, therefore it is necessary to have a deeper introduction to history and cultural heritage in search of the identity of a pluralistic Indonesian society.


2019 ◽  
Author(s):  
Abhishek Verma ◽  
Virender Ranga

<div>We have thoroughly studied the paper of Perazzo et al., which presents a routing attack named DIO suppression attack with its impact analysis. However, the considered simulation grid of size 20mx20m does not correspond to the results presented in their paper. We believe that the incorrect simulation detail needs to be rectified further for the scientific correctness of the results. In this comment, it is shown that the suppression attack on such small sized network topology does not have any major impact on routing performance, and specific reason is discussed for such behavior.</div>


Author(s):  
Bojan Ljuijić

Beside the fact that the Internet was not primarily educational network (it didn’t emerge from the intention to be systematically used in the field of education), shortly after it emerged, possibilities of its application in education were recognised. This paper is dedicated to analysis of the most important chronological moments (technological and social in the first place) that were crucial in sense of comprehensive application of the Internet in service of education in general, but also in service of adult education. Having all mentioned in focus, in more details, we analysed emergence and development of the Internet observed as educational computer network in frame of general development of information and communication technologies. While realising mentioned analysis, our focus was on four historical periods of educational computer technologies. We also intended to emphasize the activities of international institutions that followed, encouraged and supported the development of the Internet use and the use of other information and communication technologies in the field of education. According to that, we distinguished the main moments referring activities of these organisations which describe in the best manner their contributions to growing application of the Internet in education in general, but also in adult education.


2013 ◽  
Vol 397-400 ◽  
pp. 2090-2093
Author(s):  
An Hong Tian ◽  
Cheng Biao Fu

Due to the problem of network structure, security, redundant path in traditional network, this can be solved by Virtual Local Area Network (VLAN) technology. As the network laboratory in colleges and universities is not perfect because of high cost, a virtual simulation tools named Packet Tracer has been introduced to computer network experimental curriculum, this paper put forwards the detail design scheme by the example of VLAN with three switches, and provides the experiment and theoretical analysis and simulation verification .The practice has proved this method not only deepens students comprehension of network, but also cultivates the students' actual comprehensive ability.


Temida ◽  
2009 ◽  
Vol 12 (3) ◽  
pp. 63-74
Author(s):  
Dejan Vuletic

The accelerated growth of the information-communication technology use brought about cyber crime as a new form of crime connected with the misuse of computer network. Human trafficking and human organ trafficking are changing in line with the state-of-art technological achievements i.e. becoming more and more characteristic of cyber space. Passing appropriate regulations at both national and international levels presents an important step in solving the problem of human organ trafficking through Internet.


2018 ◽  
Vol 8 (1) ◽  
pp. 1
Author(s):  
Ikka Puspitasari

<p>Perkembangan teknologi informasi yang sangat pesat telah mempengaruhi seluruh aspek kehidupan termasuk aspek hukum yang berlaku. Kemajuan teknologi informasi tersebut antara lain ditandai dengan maraknya penggunaan media elektronik mulai dari penggunaan handphone hingga komputer yang semakin canggih. Internet yang berkembang demikian pesat sebagai kultur masyarakat modern, karena melalui internet berbagai aktivitas di dunia maya seperti berpikir, berkreasi, dan bertindak dapat diekspresikan didalamnya, kapanpun dan dimanapun. Tidak dapat dipungkiri bahwa kemajuan teknologi dan pengetahuan ini juga berdampak pada berkembangnya tindak kejahatan. Pelaku kejahatan tidak mengenal tempat atau dengan cara apapun selama bisa dijadikan tempat melakukan kejahatan. Kejahatan yang terjadi di dalam Internet dikenal dengan istilah Cyber Crime (kejahatan dalam dunia maya).</p><p><em>The development of rapid information technology has affected all aspects of life including law aspects. Information technology advances, among others, is marked by the rampant use of electronic media ranging from the use of mobile phones to increasingly sophisticated computer.</em> <em>The Internet is growing so rapidly as modern society culture, because through various internet activity on cyber as thinking, creating, and act can be expressed therein, whenever and wherever. It is undeniable that techonology and knowledge also have an impact on the rise of crime. The perpetrator of any crime does not know the place or in any way as long as it can be used as a place of crime. Crimes that occur in the Internet known as Cyber Crime (crime in cyberspace).</em><em></em></p>


Sign in / Sign up

Export Citation Format

Share Document