Analisis Keamanan Jaringan Menggunakan Metode Security Policy Development Life Cycle (SPDLC)
DOI:
https://doi.org/10.30865/klik.v4i1.1157Keywords:
Analysis; Security; Firewall; Mikrotik; SPDLCAbstract
Security is a system for carrying out prevention on a network that can be done using various methods, such as firewalls, port scanning, and DDoS. A firewall is a security system that can open or close certain port access through the firewall on the router according to the role that is built. One of the network security methods applied to Mikrotik Router OS is Port Knocking, which opens or closes certain port access through the firewall on the router according to the role that is built. However, a common problem that is often experienced in the provision of internet services such as the security network of the Tapangpass Cafe network is the problem of access rights. Several problems are encountered such as the need for internet in network security, so there is concern about hacking on the proxy network, therefore researchers will conduct an analysis on network security at Tangpass Cafe. Using the Security policy development life cycle method, then the results of this analysis researchers apply firewall network security from port scanning and denial of service attacks. The test results on the Tapangpass Café Mikrotik network are vulnerable to attack gaps, so security is needed on the firewall rules, Secure Routerboard RB941-2nD Settings, Periodic testing on the network used, and Upgrade the Operating System on Mikrotik
Downloads
References
R. Umar and A. P. Marsaid, “Analisis Keamanan Jaringan LAN Terhadap Kerentanan Jaringan Ancaman DDoS Menggunakan Metode Penetration Testing,” vol. 10, no. 1, pp. 317–329, 2023, doi: 10.30865/jurikom.v10i1.5835.
C. D. Berliana, T. A. Saputra, and I. Gunawan, “Analisis Serangan dan Keamanan pada Denial of Service (DOS): Sebuah Review Sistematik,” JIIFKOM (Jurnal Ilm. Inform. Komputer) STTR Cepu, vol. 1, no. 2, pp. 33–38, 2022, [Online]. Available: https://www.sttrcepu.ac.id/jurnal/index.php/jiifkom/article/view/229/140.
M. A. Ridho and M. Arman, “Analisis Serangan DDoS Menggunakan Metode Jaringan Saraf Tiruan,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 9, no. 3, pp. 373–379, 2020, doi: 10.32736/sisfokom.v9i3.945.
I. Riadi, A. Yudhana, and Y. W, “Analisis Keamanan Website Open Journal System Menggunakan Metode Vulnerability Assessment,” J. Teknol. Inf. dan Ilmu Komput., vol. 7, no. 4, p. 853, 2020, doi: 10.25126/jtiik.2020701928.
Yunanri. W and Yasinta Bella Fitriana, “Analisis Network Security Komputer Tingkat Desa Menggunakan Metode Security Policy Development Life Cycle (SPDLC),” J. Tek. Juara Aktif Glob. Optimis, vol. 1, no. 2, pp. 11–21, 2021, doi: 10.53620/jtg.v1i2.28.
M. Jufri and H. Heryanto, “Peningkatan Keamanan Jaringan Wireless Dengan Menerapkan Security Policy Pada Firewall,” JOISIE (Journal Inf. Syst. Informatics Eng., vol. 5, no. 2, pp. 98–108, 2021, doi: 10.35145/joisie.v5i2.1759.
Y. W, R. Anto, D. Teguh Yuwono, and Y. Yuliadi, “Deteksi Serangan Vulnerability Pada Open Jurnal System Menggunakan Metode Black-Box,” J. Inform. dan Rekayasa Elektron., vol. 4, no. 1, pp. 68–77, 2021, doi: 10.36595/jire.v4i1.365.
R. Yasuda and G. J. Augustine, “Teknologi informasi dan Komunikasi sebagai Media Pembelajaran,” Brain Cell Biol., vol. 36, no. 1–4, pp. 1–2, 2008, doi: 10.1007/s11068-008-9037-4.
T. H. Damayanti and I. R. Hikmah, “Network Forensic Serangan DoS pada Jaringan Cloud berdasarkan Generic Framework for Network Forensics (GFNF),” Edumatic J. Pendidik. Inform., vol. 6, no. 2, pp. 334–343, 2022, doi: 10.29408/edumatic.v6i2.6466.
F. Antony and R. Gustriansyah, “Deteksi Serangan Denial of Service pada Internet of Things Menggunakan Finite-State Automata,” MATRIK J. Manajemen, Tek. Inform. dan Rekayasa Komput., vol. 21, no. 1, pp. 43–52, 2021, doi: 10.30812/matrik.v21i1.1078.
J. Hu et al., “A memory-related vulnerability detection approach based on vulnerability features,” Tsinghua Sci. Technol., vol. 25, no. 5, pp. 604–613, 2020, doi: 10.26599/TST.2019.9010068.
D. Pasha, A. thyo Priandika, and Y. Indonesian, “Analisis Tata Kelola It Dengan Domain Dss Pada Instansi Xyz Menggunakan Cobit 5,” J. Ilm. Infrastruktur Teknol. Inf., vol. 1, no. 1, pp. 7–12, 2020, doi: 10.33365/jiiti.v1i1.268.
A. Ranitania and A. Fahmi, “Analisis Tata Kelola Proses Layanan Keamanan Kegiatan E-Procurement Pada Lpse Provinsi Jawa Tengah Berdasarkan Kerangka Kerja COBIT 5,” pp. 1–7, 2015.
A. Schröter, N. Bettenburg, and R. Premraj, “Do stack traces help developers fix bugs?,” Proc. - Int. Conf. Softw. Eng., pp. 118–121, 2010, doi: 10.1109/MSR.2010.5463280.
M. Alenezi, A. Agrawal, R. Kumar, and R. A. Khan, “Evaluating Performance of Web Application Security through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective,” IEEE Access, vol. 8, pp. 25543–25556, 2020, doi: 10.1109/ACCESS.2020.2970784.
R. Hermawan, “Analisis Konsep Dan Cara Kerja Serangan Komputer Distributed Denial of Service ( Ddos ),” Anal. Konsep Dan Cara Kerja Serangan Komput. Distrib. Denial Serv., vol. 5, no. 1, pp. 1–14, 2013.
M. A. Ridho and M. Arman, “Analisis Serangan DDoS Menggunakan Metode Jaringan Saraf Tiruan,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 9, no. 3, pp. 373–379, 2020, doi: 10.32736/sisfokom.v9i3.945.
J. D. Santoso, “Keamanan Jaringan Nirkabel Menggunakan Wireless Intrusion Detection System,” Infos, vol. 1, no. 3, pp. 44–50, 2019.
T. Mahjabin, Y. Xiao, T. Li, and C. L. P. Chen, “Load Distributed and Benign-Bot Mitigation Methods for IoT DNS Flood Attacks,” IEEE Internet Things J., vol. 7, no. 2, pp. 986–1000, 2020, doi: 10.1109/JIOT.2019.2947659.
A. Alzahrani, A. Alqazzaz, N. Almashfi, H. Fu, and Y. Zhu, “Web Application Security Tools Analysis,” Stud. Media Commun., vol. 5, no. 2, p. 118, 2017, doi: 10.11114/smc.v5i2.2663.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Analisis Keamanan Jaringan Menggunakan Metode Security Policy Development Life Cycle (SPDLC)
ARTICLE HISTORY
Issue
Section
Copyright (c) 2023 Yunanri W; Yuliadi Yuliadi, Shinta Esabella, Yasinta Bella Fitriana

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).