Implementasi Security Policy Pada Firewall Di SMA Negeri 1 Una-Una

Andi Baso, Sofyan Sofyan, Musfira Musfira

Abstract


This research is a qualitative research. This research aims to make it easier for school operators to improve the security of computer network systems. The data of this research was obtained from primary data or data on the implementation of security policies on computer networks connected to the internet and secondary data or data about the research object obtained from the SMA Negeri 1 Una-una school. Meanwhile, data analysis techniques are obtained from observations, interviews, literature, documentation. The results of this study show that this study found that one computer network connected to the internet does not have a computer network security policy. The security policy application is called Security Policy with the aim of making it easier for school operators to improve the security of computer network systems connected to the internet effectively and efficiently.Β 

Keywords


Security Policy; Firewall; Web; Internet; Computer network security

Full Text:

PDF

References


Albar, R., & Putra, O. (2022). Implementasi Keamanan Jaringan Pada Mikrotik Router os V6.48.3 Menggunakan Metode Port Knocking. Informatics and Computer Science, 8(2), 50-62. https://doi.org/10.33143/jics.Vol8.Iss1.1997

Yassir, A., & Ismaeel, A. A. K. (2016). Current computer network security issues/threats. International Journal of Computer Applications, 155(1), 1-5. https://doi.org/10.5120/ijca2016912255

Boukhtouta, A., Mouheb, D., Debbabi, M., Alfandi, O., Iqbal, F., & El Barachi, M. (2015). Graph-theoretic characterization of cyber-threat infrastructures. Digital Investigation, 14(1), S3-S15. https://doi.org/10.1016/j.diin.2015.05.002

Bjelajac, Ž., & Vesić, S. (2020). Security of information systems. Pravo - Teorija i Praksa, 37(2), 63-76. https://doi.org/10.5937/ptp2002063B

Wan Abdul Rahman, W. F., Hassan Abdalla Hashim, A., & Islam, M. R. (2017). Security aspects and efforts towards secure Internet of things. Journal of Telecommunication, Electronic and Computer Engineering, 9(2-2), 147-152. https://jtec.utem.edu.my/jtec/article/view/2235

HΓΆne, K., & Eloff, J. H. P. (2017). Information security policy – What do international information security standards say?. Computers & Security, 21(5), 402–409. https://doi.org/10.1016/S0167-4048(02)00504-7

Sholikhatin, S. A., Setyanto, A., & Luthfi, E. T. (2018). Analisis keamanan sistem informasi dengan ISO 27001 (Studi kasus: Sistem informasi akademik Universitas Muhammadiyah Purwokerto). Jurnal Ilmiah IT CIDA, 4(1), 1–10. https://doi.org/10.55635/jic.v4i1.75

Christian, Y., Yulia, Y., & Setiabudi, D. H. (2018). Pembuatan sistem informasi manajemen aset berbasis website pada perusahaan elektronika X. Jurnal Infra, 6(1), 1–6. https://publication.petra.ac.id/index.php/teknik-informatika/article/view/6343

Jannah, M., Suhartono, S., & Sidin, U. S. (2021). Sistem Informasi Aset (SIMaset) Barang Dan Dokumen Berbasis Web. Teknosains: Media Informasi Sains Dan Teknologi, 15(3), 367–380. https://doi.org/10.24252/teknosains.v15i3.23363

Silha, P. M., & Setyowati, T. (2019). Perancangan sistem informasi manajemen aset tetap berbasis web (Studi kasus pada Perusahaan Daerah Pengelolaan Air Limbah DKI Jakarta). Prosiding Industrial Research Workshop and National Seminar, 10(1), 556–563. https://jurnal.polban.ac.id/proceeding/article/view/140




DOI: http://dx.doi.org/10.66202/jesik.v11i1.154

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Sekolah Tinggi Manajemen Informatika dan Komputer (STMIK) Bina Mulia Palu