Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 6 dokumen yang sesuai dengan query
cover
Jacobson, Douglas
Boca Raton: CRC Pres, 2009
005.8 JAC i
Buku Teks SO  Universitas Indonesia Library
cover
Stallings, William
Boston: Pearson , 2017
005.8 STA c
Buku Teks SO  Universitas Indonesia Library
cover
Kizza, Joseph Migga
"We will focus on these three components in a computer network. But what is a computer network? The reader should be aware that our use of the phrase computer network , from now on, will refer to the traditional computer network.
A computer network is a distributed system consisting of loosely coupled computers and other devices. Any two of these devices, which we will from now on
refer to as network elements or transmitting elements without loss of generality, can
communicate with each other through a communication medium. In order for these connected devices to be considered a communicating network, there must be a set of communicating rules or protocols each device in the network must follow to communicate with another device in the network. The resulting combination consisting of hardware and software is a computer communication network or computer network in short."
London: Springer-Verlag , 2015
e20528512
eBooks  Universitas Indonesia Library
cover
Muhammad Adhie Nugroho
"Seiring dengan pesatnya laju perkembangan teknologi, tingkat kerentanan dan an-caman terhadap jaringan komputer terus meningkat. Metode-metode yang digunakan un-tuk menembus suatu lapisan keamanan jaringan pun semakin canggih. Untuk mengantipisasi hal yang tidak diinginkan, seorang pemilik jaringan komputer, atau biasa disebut administrator, harus selalu memperhatikan keamanan pada jaringan miliknya agar bisa terus ditingkatkan dan meminimalisir kemungkinkan peretasan Umumnya, un-tuk jaringan komputer berskala besar, seperti jaringan milik perusahaan, sudah diper-hatikan sisi keamanannya dengan cara merekrut orang yang dinilai memiliki kompentensi dalam bidang keamanan jaringan. Proses menjaga keamanan jaringan tersebut juga sudah memiliki standar sendiri. Namun untuk jaringan komputer berskala kecil, misalnya jarin-gan internet rumahan atau kantor-kantor kecil (SOHO), Sering kali luput dari pengawasan. Faktor tersebut biasanya terjadi akibat mayoritas end user yang menggunakan jaringan SOHO adalah masyarakat awam yang belum terlalu paham akan pentingnya keamanan pada jaringan komputer mereka. Akibatnya jaringan tersebut akan mudah untuk disusupi oleh pihak yang kurang bertanggung jawab sehingga dapat men-imbulkan kerugian pada pihak pemilik jaringan.
Untuk mencegah terjadinya hal tersebut, dapat dilakukan suatu proses analisis yang bertujuan untuk mendeteksi adanya kerentanan yang dapat mengancam keamanan jaringan SOHO. Untuk melakukan analisis ini, banyak tools yang tersedia, baik yang ber-sifat open-source maupun yang berlisensi, yang dapat digunakan oleh pemilik jaringan. Salah satu organisasi penyedia tools untuk melakukan analisis kerentanan adalah Offen-sive Security. Offensive Security adalah organisasi yang menyediakan layanan sertifikasi profesional untuk Network Security Engineer. Mereka membuat distribusi sistem operasi linux yang diberi nama Kali Linux. Sistem operasi Kali Linux ini yang akan digunakan sebagai sistem utama untuk melakukan analisis kerentanan dalam bentuk serangan dengan skenario yang berbeda-beda

Along with the rapid pace of technological development, the level of vulnerability and threats to computer networks continues to increase. The methods used to penetrate a network security layer are increasingly sophisticated. To anticipate unwanted things, an owner of a computer network, or commonly called an administrator, must always pay attention to the security of his network so that it can continue to be increased and mini-mize the possibility of hacking Generally, for large-scale computer networks, such as company-owned networks, it is necessary pay attention to the security side by recruiting people who are considered competent in the field of network security. The process of maintaining network security also has its own standards. However, for small-scale com-puter networks, such as home internet networks or small offices (SOHO), they often go unnoticed. This factor usually occurs because the majority of end users who use SOHO networks are ordinary people who do not really understand the importance of security on their computer networks. As a result, the network will be easily infiltrated by irresponsi-ble parties so that it can cause losses to the network owner.
To prevent this from happening, an analysis process can be carried out that aims to detect any vulnerabilities that could threaten the security of the SOHO network. To perform this analysis, many tools are available, both open-source and licensed, which the network owner can use. One organization providing tools for conducting vulnerability analysis is Offensive Security. Offensive Security is an organization that provides profes-sional certification services for Network Security Engineers. They created a Linux oper-ating system distribution which was named Kali Linux. This Kali Linux operating system will be used as the main system to perform vulnerability analysis in an attacking form with different scenarios
"
Depok: Fakultas Teknik Universitas Indonesia , 2020
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
"This volume presents the Proceedings of the Sixth International Conference on Green and Human Information Technology (ICGHIT), held in Chiang Mai, Thailand, Jan 31-Feb 2, 2018.
ICGHIT is the unique global conference for researchers, industry professionals, and academics interested in the latest development of green and human information technology. Its broad scope ranges from electronics to communications, computers, multimedia and signal processing, control and intelligent systems, IC and convergence technologies, which are related to green and human issues such as energy saving and human welfare. Specially in this volume, ICGHIT covers state-of-the-art technologies for the 4th industrial revolution, for example, cyber security, big data and cloud service, smart medical system, machine learning and its applications."
Singapore: Springer Singapore, 2019
e20501684
eBooks  Universitas Indonesia Library
cover
Muhammad Kharisma Ramadhan
"ABSTRAK
Seiring dengan laju perkembangan zaman, tingkat kerentanan dari keamanan jaringan komputer akan selalu meningkat. Oleh karena itu, berbagai macam perusahaan penyedia jasa keamanan jaringan komputer berlomba-lomba untuk menciptakan inovasi-inovasi baru. Salah satu inovasi baru dalam dunia keamanan jaringan komputer adalah Unified Threat Management (UTM). UTM adalah suatu perangkat jaringan yang mampu mengamankan jaringan dari berbagai ancaman dengan menyediakan berbagai skema pencegahan ancaman, seperti firewall, gateway antivirus dan intrusion detection.
Seiring dengan perkembangan UTM, diperlukan suatu metode analisis untuk menilai kemampuan dari UTM dalam mencegah ancaman keamanan jaringan komputer. Analisis yang dilakukan akan meninjau beberapa aspek untuk mendapatkan skema penggunaan UTM yang paling sesuai dalam berbagai macam kasus. Tujuan dari analisis ini agar pengguna dapat mengimplementasikan penggunaan UTM yang tepat sesuai dengan skema jaringan yang pengguna gunakan.
Hasil dari analisis menunjukkan bahwa skema penggunaan UTM yang tepat adalah sesuai dengan penggunaan jaringan. Jika jaringan komputer menyimpan berbagai macam data krusial, pengguna perlu menggunakan hardware UTM dari beberapa penyedia jasa keamanan jaringan terkemuka dengan mengimplementasikan skema backbone, karena dapat menjadi cadangan jika salah satu UTM mengalami kendala. Jika pengguna menggunakan jaringan komputer secara normal, maka dapat menggunakan UTM berbasis cloud maupun perangkat keras, karena memiliki nilai resiko yang rendah.
Dengan hasil analisis tersebut, diharapkan pengguna dapat mempertimbangkan penggunaan UTM dalam jaringan komputer. Dengan berbagai macam fitur dan skema keamanan jaringan yang digunakan, diharapkan berbagai kalangan pengguna dapat menggunakan UTM sesuai dengan kebutuhan yang ada.

ABSTRACT
As time goes on, the level of vulnerability of computer network security will always increase. Therefore, various computer network security service providers are competing to create new innovations. One of the new innovations in the world of computer network security is Unified Threat Management (UTM). UTM is a network device that is able to secure networks from various threats by providing various threat prevention schemes, such as firewalls, antivirus gateways and intrusion detection.
Along with the development of UTM, we need an analytical method to assess the ability of UTM in preventing threats. The analysis will review several aspects to get the most suitable UTM usage scheme in a variety of cases. The purpose of this analysis is so that users can implement the use of UTM in accordance with the network scheme that the user is using.
The results of the analysis show that the right UTM usage scheme is in accordance with network usage. If a computer network stores a variety of crucial data, users need to use UTM hardware from several leading network security service providers by implementing a backbone scheme, because it can become a backup if one of the UTM experiences problems. If the user uses a computer network normally, then it can use cloud-based UTM or hardware, because it has a low risk value.
With the results of the analysis, it is expected that users can consider the use of UTM in computer networks. With a variety of features and network security schemes that are used, it is expected that various users can use UTM according to existing needs."
Depok: Fakultas Teknik Universitas Indonesia, 2020
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library