EMAIL: PASSWORD:
Front Office
UPT. PERPUSTAKAAN
Institut Teknologi Sepuluh Nopember Surabaya


Kampus ITS Sukolilo - Surabaya 60111

Phone : 031-5921733 , 5923623
Fax : 031-5937774
E-mail : libits@its.ac.id
Website : http://library.its.ac.id

Support (Customer Service) :
timit_perpus@its.ac.id




Welcome..guys!

Have a problem with your access?
Please, contact our technical support below:
LIVE SUPPORT


Moh. Fandika Aqsa


Davi Wahyuni


Tondo Indra Nyata


Anis Wulandari


Ansi Aflacha




ITS » Non Degree » Teknologi Informasi
Posted by dewi@its.ac.id at 10/03/2010 17:19:50  •  2544 Views


IMPLEMENTASI NETWORK ACCESS CONTROL PADA JARINGAN EEPIS

IMPLEMENTATION OF NETWORK ACCESS CONTROL ON THE EEPIS NETWORK

Author :
Aprianto, Ali Latiful ( 7406030058 )




ABSTRAK

Belakangan ini pencurian identitas pribadi melalui media internet semakin marak. Berbagai cara bisa digunakan misalnya melalui phishing email scan ataupun menggunakan piranti yang sanggup melacak gerak-gerik kebiasaan user ketika mengakses situssitus web di internet. Kebocoran informasi ini tidak hanya terjadi secara personal tapi juga dapat terjadi secara korporat. Yang mana tidak tertutup kemungkinan kebocoran itu datang dari orang dalam sendiri. Karena itulah diperlukan adanya pengaman jaringan diantaranya dengan menggunakan metode NAC Network Access Control. Dengan menggunakan metode NAC seorang administrator jaringan dapat mengontrol dan mengamankan jaringannya dari aksi para user yang tidak bertanggung jawab dengan cara mengisolasi komputer user tersebut dari koneksi jaringan. Dalam pengerjaan tugas akhir ini terdapat sebuah komponen tambahan yang digunakan yaitu SNORT NIDS. NAC dapat dikembangkan lebih lanjut dengan menambah komponen-komponen pendukung lain. Komponen-komponen tersebut diantaranya adalah hping nmap nessus ethereal dan masih banyak lagi. Dengan NAC ini diharapkan keamanan dalam jaringan akan semakin terjamin.


ABSTRACT

Lately stealing personal identity through the internet media are become popular. Various ways can be done such as through phishing email scanning or use tools that able to track the movements when users access the web sites on the Internet. Leakage of this information does not occur only in personal but can also occur in the corporate. Which is not closed the possibility of leaks coming from the inside people. Therefore network security required by using of these NAC Network Access Control methods. By using the method of NAC a network administrator can control and secure the network from the user that his action are not responsible in network connection. In fulfillment of this final task there is an additional component that is used the Snort NIDS. NAC can be further developed by adding more supporting components. Those components are hping nmap nessus ethereal and more. With NAC expected in the network the network security will be more guaranteed.



KeywordsNetwork Access Control ; NAC ; Isolasi VLAN ; Jaringan
 
Subject:  jaringan komputer
Contributor
  1. Idris Winarno, S.ST, M.Kom
Date Create: 10/03/2010
Type: Text
Format: pdf.
Language: Indonesian
Identifier: ITS-NonDegree-3100010037570
Collection ID: 3100010037570
Call Number: RSEP 004.6 Apr i


Source
Non Degree of Informatics Engineering, RSEP 004.6 Apr i, 2009

Coverage
ITS Community Only

Rights
Copyright @2009 by ITS Library. This publication is protected by copyright and permission should be obtained from the ITS Library prior to any prohibited reproduction, storage in a retrievel system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permission(s), write to ITS Library




[ Download - Open Access ]

  1.  ITS-NonDegree-8813-7406030058-Abstract_en.pdf - 84 KB
  2.  ITS-NonDegree-8813-7406030058-Conclusion.pdf - 79 KB




 Similar Document...




! ATTENTION !

To facilitate the activation process, please fill out the member application form correctly and completely

Registration activation of our members will process up to max 24 hours (confirm by email). Please wait patiently

POLLING

Bagaimana pendapat Anda tentang layanan repository kami ?

Bagus Sekali
Baik
Biasa
Jelek
Mengecewakan





You are connected from 18.210.11.249
using CCBot/2.0 (https://commoncrawl.org/faq/)



Copyright © ITS Library 2006 - 2020 - All rights reserved.
Dublin Core Metadata Initiative and OpenArchives Compatible
Developed by Hassan