Implementasi Protokol Keamanan Dan Segmentasi Jaringan Dalam Project Pembangunan WLAN Untuk PT Pan Pacific Insurance
Abstract
Keywords
Full Text:
PDFReferences
M. Rusdan and M. Sabar, “Analisis dan Perancangan Jaringan Wireless Dengan Wireless Distribution System Menggunakan User Authentication Berbasis Multi-Factor Authentication,” JOINT (Journal of Information Technology), vol. 2, no. 1, pp. 17–24, 2020.
A. N. Kadhim and S. B. Sadkhan, “Security Threats in Wireless Network Communication-Status, Challenges, and Future Trends,” Jul. 2021.
M. A. Abo-Soliman and M. A. Azer, “Enterprise WLAN Security Flaws: Current Attacks and relative Mitigations,” in Proceedings of the 13th International Conference on Availability, Reliability and Security, Aug. 2018, pp. 1–8. doi: 10.1145/3230833.3230836.
Y. Valaboju, “A Comprehensive Overview of WLAN Security Attacks,” International Journal of Scientific Research & Engineering Trends, vol. 7, no. 1, pp. 244–251, Jan. 2021.
Baihaqi, Y. Yanti, and Zulfan, “Implementasi Sistem Keamanan WPA2-PSK pada Jaringan WiFi,” Serambi Engineering, vol. III, no. 1, pp. 248–254, 2018.
Z. Akram, M. A. Saeed, and M. Daud, “Real Time Exploitation of Security Mechanisms of Residential WLAN Access Points,” in 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), Mar. 2018, pp. 1–5. doi: 10.1109/ICOMET.2018.8346378.
A. Acosta-Lopez, E. Y. Melo-Monroy, and P. A. Linares-Murcia, “Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools,” Revista Facultad de Ingeniería, vol. 27, no. 47, pp. 71–78, Sep. 2018, doi: 10.19053/01211129.v26.n46.2017.7309.
M. Rusdan and M. Sabar, “Pengembangan Jaringan Wireless Menggunakan User Authentication Berbasis Radius Dalam Industri 4.0,” INFOTECH Journal, vol. 5, no. 1, pp. 44–52, 2019.
Y. Ma and H. Ning, “Improvement of EAP Authentication Method Based on Radius Server,” in 2018 IEEE 18th International Conference on Communication Technology (ICCT), Oct. 2018, pp. 1324–1328. doi: 10.1109/ICCT.2018.8600077.
M. Ghazian, M. T. Kurniawan, and U. Y. K. S. Hediyanto, “Analisis dan Perancangan Security System Dalam Rancangan Berdasarkan Standar EN506002-5 Dengan Metode PPDIOO Life-Cycle Approach,” in e-Proceeding of Engineering, 2018, pp. 3140–3147.
M. F. Fahlepi, C. Iswahyudi, and E. Sutanta, “Analisis dan Perancangan Jaringan Nirkabel (WLAN) Studi Kasus di Jogjakarta Montessori School Menggunakan Metodologi PPDIOO,” Jurnal JARKOM, vol. 5, no. 2, 2017.
R. Froom, Sivasubramanian, and E. Frahim, Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide: Foundation learning for SWITCH 642-813. Cisco Press, 2010.
D. Yuliana and I. K. A. Mogi, “Computer Network Design Using PPDIOO Method With Case Study of SMA Negeri 1 Kunir,” Jurnal Elektronik Ilmu Komputer Udayana, vol. 9, no. 2, pp. 235–240, 2020.
M. F. Rahmat, E. Rohadi, I. Sirrajudin, and F. Chrissandy, “Study and Analysis of Network Topology Performance Using Wireless Distribution System Technology,” Journal of Information Technology and Computer Science, vol. 6, no. 2, pp. 130–136, 2021, [Online]. Available: www.jitecs.ub.ac.id
N. Darchis, “Web Authentication on WLAN Controller,” Cisco Systems Inc., 2022. https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlan-security/115951-web-auth-wlc-guide-00.html (accessed Mar. 18, 2022).
DOI: https://doi.org/10.26418/justin.v11i1.53745
Refbacks
- There are currently no refbacks.
Copyright (c) 2023 JUSTIN (Jurnal Sistem dan Teknologi Informasi)
View My Stats
All article in Justin is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License