Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 95623 dokumen yang sesuai dengan query
cover
Agus Suprayitno
"Perkembangan teknologi informasi yang semakin meningkat menyebabkan perubahan pola kehidupan masyarakat. Di lingkungan pemerintahan, pemerintah dituntut untuk dapat memberikan pelayanan terbaik dengan berbasis teknologi informasi. Terlebih lagi dengan diterapkannya Sistem Pemerintahan Berbasis Elektronik (SPBE), interaksi dengan dunia siber semakin besar. Hal ini tentunya akan meningkatkan potensi terjadinya insiden. Insiden siber yang kerap terjadi khususnya pada pemerintah adalah peretasan website. Hal ini juga terjadi pada Pemerintah Kota Depok yang tentunya sangat mengganggu terlebih lagi jika situs tersebut terkait pelayanan kepada masyarakat. Web Application Firewall (WAF) adalah sebuah sistem keamanan atau firewall yang berfungsi untuk melindungi website dari serangan siber. WAF merupakan sistem keamanan layer 7 (tujuh) yang dirancang untuk memantau, mendeteksi, menyaring, serta memblokir trafik berbahaya yang sekiranya dapat merusak website atau aplikasi web. WAF merupakan teknologi yang terus berkembang dan banyak digunakan di dunia security sehingga perlu dikaji bagaimana efektivitasnya terhadap keamanan suatu website. Penelitian ini mengkaji implementasi WAF terhadap keamanan website Pemerintah Kota Depok sehingga dari hasil analisis dapat diketahui apakah tools ini memberikan dampak positif terhadap peningkatan keamanan siber, khususnya website di Pemerintah Kota Depok

The development of information technology is increasingly causing changes in the pattern of people's lives. In the government environment, the government is required to be able to provide the best service based on information technology. the implementation of the Electronic-Based Government System (SPBE), interaction with the cyber world is getting bigger. This of course will increase the potential for incidents to occur. Cyber incidents that often occur, especially for the government, are website hacking. This has also happened to the Depok City Government, which is of course very disturbing, especially if the site is related to services to the community. A Web Application Firewall (WAF) is a security system or firewall that functions to protect websites from cyber attacks. WAF is a layer 7 (seven) security system designed to monitor, detect, filter, and block malicious traffic that could damage websites or web applications. WAF is a technology that continues to develop and is widely used in the world of security, so it is necessary to study how effective it is on the security of a website. This study examines the implementation of WAF on the security of the Depok City Government website so that from the results of the analysis it can be seen whether these tools have a positive impact on increasing cyber security, especially websites in the Depok City Government"
Jakarta: Sekolah Kajian Stratejik dan Global Universitas Indonesia, 2022
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
"Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collaboration pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collaboration in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.
"
Oxford : Chandos , 2013
e20427966
eBooks  Universitas Indonesia Library
cover
"Network and system security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors? respective areas of expertise. Coverage includes building a secure organization; cryptography; system intrusion; UNIX and Linux security; Internet security, intranet security; LAN security; wireless network security; cellular network security, RFID security, and more. This compilation of 13 chapters is tightly focused and ideally suited as an essential desk reference in this high-growth subject area.
"
Waltham, MA: Syngress, 2014
e20427443
eBooks  Universitas Indonesia Library
cover
Rafli Raditya
"Masalah kemanan di bidang informasi dan teknologi telah menjadi sesuatu yang penting dalam kinerja perusahaan. Keamanan jaringan yang digunakan patutnya dapat berjalan dengan optimal sehingga tidak membebani kinerja pekerjaan lainnya. Upaya optimasi sangat penting dan harus terus dilakukan untuk mendirikan sebuah jaringan berkeamanan tinggi dan mudah dikelola dalam jangkauan penggunaan yang luas. Firewall Fortigate sebagai perangkat yang dapat memberi keamanan jaringan dan kemudahan manajemen jaringan selayaknya dapat dikonfigurasi dengan optimal dan efisien. IPv4 Policy pada perangkat Firewall Fortigate merupakan konfigurasi yang sangat penting bagi kelangsungan kinerja jaringan yang aman dan optimal dengan memanfaatkan perangkat Firewall Fortigate di jaringan tersebut. Optimasi konfigurasi IPv4 Policy yang tepat pada perangkat Firewall Fortigate diharapkan akan menciptakan kinerja jaringan yang optimal dan efisien dengan nilai parameter QoL yang memenuhi standar kualitas yang telah ditentukan.

Security in the field of information and technology have become so much more important than ever, especially for the important of company 39 s performance. Network security should run optimally so as not to burden the performances of other works. There has to be a lot of efforts being put to improve network security and its performance. Fortigate Firewall as a network security and network management devie is to be configured with utmost importancy and optimicy to reach its maximum potential to be an efficient network device. IPv4 Policy on Fortigate 39 s own implementation is a very important aspect for the device performance in securing and optimizing the network performance. Optimization on IPv4 Policy of Fortigate Firewall device is likely to become an important thing to improve the quality of network, such that the QoL parameters with good quality and desiganted standards."
Depok: Fakultas Teknik Universitas Indonesia, 2018
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Panko, Raymond R.
New Jersey : Prentice-Hall, 2004
005.8 PAN c
Buku Teks  Universitas Indonesia Library
cover
Shema, Mike
"How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps . The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there."
London: Elsevier , 2012
005.8 SHE h
Buku Teks  Universitas Indonesia Library
cover
Adityo Abdi Nugroho
"Rogue Access Point (RAP) menjadi salah satu ancaman dalam keamanan jaringan Wireless Local Area Network. Salah satu RAP bermodel Unauthorized AP yaitu RAP terkoneksi dalam jaringan melalui kabel secara ilegal. Deteksi terhadap keberadaan RAP sudah banyak dikembangkan dengan berbagai metoda, menggunakan hardware atau software. Dengan sistem pendeteksi Rogue Access Point dan auto response, RAP akan secara otomatis dideteksi dan di blocking, sehingga akses RAP akan terhenti. Selain itu, Sistem Deteksi RAP menggunakan aplikasi berbasis web yang mempermudah network administrator dalam mengoperasikan aplikasi ini. Sistem ini menggunakan 2 parameter penting untuk mendeteksi yaitu IP dan MAC Address serta memberikan respon ke firewall untuk blocking.
Dari hasil percobaan sistem pendeteksi RAP dan auto response, kehandalan sistem mendeteksi dan auto response RAP mencapai sebesar 92,5% hingga 100% pada 1 RAP, 88,75 % hingga 95% pada 2 RAP, 93,33% hingga 96,67% pada 3 RAP dan 95% hingga 97,5% pada 4 RAP dengan 2 variasi mode yaitu manual dan otomatis. Selain itu, waktu rata-rata pendeteksian dan auto response mencapai 6,97 detik (1 RAP) waktu tercepat dan 18,79 detik (4 RAP) waktu terlama.

Rogue Access Point is one of network security threats in Wireless Local Area Network. One of type RAP are models Unauthorized AP which RAP may connect to the network cable or wireless illegally. RAP detection system has been developed with variety of methods, using hardware or software rogue access point detection system and auto response. The rogue access point will be automatically detected and blocked, so that RAP stops communicating with the network. In addition, RAP Detection system and auto response using the web-based application that facilitates the operation of the network administrator to configure. This system uses two important parameters to iterately detect the IP and MAC address and then give the "trigger" to the firewall for blocking action.
The results of experiment shows that system reliability to detect and to response against RAP reaches 92.5% to 100% on 1 RAP, 88.75% to 95% on 2 RAPs, 93.33% to 96.67% on 3 RAPs and 95 % to 97.5% on 4 RAPs with 2 variations modes : manual and automatic. and the average time detection and auto fastest response time reaches 6.97 sec (1 RAP) and the longest time to reaches 18.79 seconds (4 RAPs).
"
Depok: Fakultas Teknik Universitas Indonesia, 2013
T35117
UI - Tesis Membership  Universitas Indonesia Library
cover
Andress, Jason
"As part of the syngress basics series, The basics of information security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
The basics of information security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects."
Waltham, MA: Syngress, 2014
e20427745
eBooks  Universitas Indonesia Library
cover
Raphael Bianco Huwae
"Keamanan pada suatu sistem jaringan perusahaan sangatlah diperlukan. Tingkat availability yang tinggi di suatu server perusahaan menjadi aset berharga untuk mencapai profit perusahaan tersebut. Gangguan jaringan yang dialami perusahaan akan berdampak ke seluruh stakeholder perusahaan. Keamanan yang dilakukan menggunakan aplikasi firewall dinilai belum cukup untuk melindungi jaringan perusahaan. Penggunaan IDS pada suatu jaringan juga membutuhkan keahlian khusus dari administrator untuk terus menerus dapat memantau keamanan jaringan. Agar dapat melakukan pemantauan yang efektif dan hemat tenaga maka dilakukan penelitian untuk mendeteksi intrusi pada suatu keamanan jaringan dan melakukan reporting dengan menggunakan suatu bot Telegram. Penggunaan bot Telegram ini diharapkan akan memberikan suatu sistem reporting otomatis yang menyederhanakan proses monitoring pada suatu kegiatan berulang agar informasi terhadap serangan dari luar akan lebih cepat terdeteksi. Peringatan bahaya dikirim berupa notifikasi yang diintegrasikan pada aplikasi Telegram baik melalui smartphone maupun PC dengan berbentuk log alert yang dapat menampilkan waktu kejadian, IP yang diserang, IP attacker dan jenis serangan yang dilakukan. Dengan melakukan implementasi monitoring secara realtime terhadap jaringan melalui telegram maka baik pihak “IT” maupun “non IT” akan dapat mendapat informasi terhadap intrusi tersebut agar dapat melakukan reporting secara cepat.

Corporate network system security is very important. A high level of availability on a company's server becomes a valuable asset to achieve the company's profit. Server or network disruptions experienced by the company will affect all stakeholders of the company. Security measure carried out using a firewall application is not enough to protect corporate networks. The use of IDS on a network also requires special expertise from the administrator to continuously be able to monitor network security. In order to be able to carry out effective and energy-efficient monitoring, a study was conducted to detect intrusion in a network security and report it using a Telegram bot. The use of this Telegram bot is expected to provide an automatic reporting system that simplifies the process of monitoring a recurring activity so that information on attacks from outside will be responded more quickly. Danger alerts are sent in the form of messages that are integrated into Telegram applications both via smartphones and PCs in the form of log alerts that can display the time of occurrence, server IP being attacked, IP attacker and type of attack carried out. By implementing real-time monitoring of the network via telegram, both "IT" and "non-IT" parties will be able to obtain information on the intrusion so that they can make fast responses."
Depok: Fakultas Teknik Universitas Indonesia, 2021
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Abi Jam An Kurnia
"ABSTRAK
Skripsi ini membahas tentang analisis hukum terhadap ketahanan dan keamanan nasional negara Indonesia dari adanya potensi konglomerasi industri informasi dan komunikasi yang ditimbulkan oleh perusahaan asing di Indonesia. Perkembangan dan akselerasi teknologi digital di bidang industri informasi dan komunikasi di masing-masing negara di dunia juga mempengaruhi persaingan industri secara global, termasuk Indonesia. Penelitian hukum dalam skripsi ini menggunakan pendekatan normatif dengan menganalisis kaedah-kaedah hukum dalam peraturan perundang-undangan yang terkait, dengan sifat peneltian yaitu preskriptif-analitis. Dengan mengambil kasus dari Google Application dan Google Loon di Indonesia, penelitian ini menemukan bahwa struktur industri informasi dan komunikasi yang tadinya terpisah satu sama lain berubah menjadi terintegrasi, karena dua atau lebih produk atau layanan yang sebelumnya diselenggarakan oleh perusahaan yang berbeda, kemudian diselenggarakan oleh perusahaan yang sama. Perlindungan hukum yang diberikan negara Indonesia terhadap potensi konglomerasi dalam industri informasi dan komunikasi dalam kasus Google Application dan Google Loon didasarkan pada ketentuan khusus mengenai larangan praktek monopoli dan persaingan usaha tidak sehat dalam UU No. 5 Tahun 1999. Untuk penerapan Google Loon di Indonesia, dari hasil kajian yang telah ada, opsi yang menjadi pilihan pertama adalah opsi Status Quo atau Loon tidak diimplementasikan. Oleh karena itu, diharapkan pemerintah harus bisa bertindak tegas terhadap produk-produk asing dalam industri informasi dan komunikasi yang tidak mentaati regulasi yang ada di Indonesia.

ABSTRAK
This thesis discusses the legal analysis of Indonesian national resilience and security against potential conglomeration of information and communication industry which is caused by foreign companies in Indonesia. The development and acceleration of digital technology in the field of information and communication industry in each country in the world also affect the industry competition globally, including Indonesia. The legal research in this thesis uses normative approach by analyzing the legal principles in the related laws and regulations, with the nature of research that is the prescriptive analytical. Taking the case of Google Application and Google Loon in Indonesia, the study found that the information and communication industry structure that was once separate from one another turned into integrated, because two or more products or services previously held by different companies became organized by the same company. Legal protection granted by the state of Indonesia to potential conglomeration in the information and communication industry in the case of Google Application and Google Loon is based on special provisions concerning the ban on monopolistic practices and unfair business competition in Law of Republic of Indonesia Number 5 of 1999. For the implementation of Google Loon in Indonesia, from the results of existing studies, the option that became the first choice is the Status Quo or Loon option is not implemented. Therefore, it is expected that the government should be able to act firmly against foreign products in the information and communication industries that do not comply with the existing regulations in Indonesia."
2017
S69494
UI - Skripsi Membership  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>