Keamanan Jaringan Berbasis Wireless

NUGROHO, LUQMAN WIDIYANTO (2022) Keamanan Jaringan Berbasis Wireless. S1 thesis, Universitas Mercu Buana Jakarta.

[img] Text (JURNAL MAHASISWA)
Jurnal 41516010030 LUQMAN WIDIYANTO NUGROHO.pdf
Restricted to Registered users only

Download (718kB)

Abstract

Network security is a very significant thing at this time, especially in network security in the wireless hotspot. Wireless network security needs special handling, because most of the threats / threats that attack the network originate from internal users of the hotspot network itself. Therefore, control over every internal user connected to the network. This final project provides a solution in the form of a security method in the form of written rules that are aligned with system settings, a method used as a way to control internal user access on a wireless network. With this method, the internal user must first perform the authentication process on the hotspot security method before connecting to the network. So that only internal users who are authenticated and have a system that meets the requirements have the right to access the network according to their access authority. Through this final project, it is concluded that to achieve an optimal wireless network environment requires coordination between users and administrators as well as rules / regulations or authorization in the use of the network. Keywords: Security, Network, Wireless, Method, Hotspot, User Network security is a very significant thing at this time, especially in network security in the wireless hotspot. Wireless network security needs special handling, because most of the threats / threats that attack the network originate from internal users of the hotspot network itself. Therefore, control over every internal user connected to the network. This final project provides a solution in the form of a security method in the form of written rules that are aligned with system settings, a method used as a way to control internal user access on a wireless network. With this method, the internal user must first perform the authentication process on the hotspot security method before connecting to the network. So that only internal users who are authenticated and have a system that meets the requirements have the right to access the network according to their access authority. Through this final project, it is concluded that to achieve an optimal wireless network environment requires coordination between users and administrators as well as rules / regulations or authorization in the use of the network. Keywords: Security, Network, Wireless, Method, Hotspot, User

Item Type: Thesis (S1)
Call Number CD: JM/INFO. 22 004
NIM/NIDN Creators: 41516010030
Uncontrolled Keywords: Keamanan, Jaringan, Wireless, Metode, Hotspot, User
Subjects: 000 Computer Science, Information and General Works/Ilmu Komputer, Informasi, dan Karya Umum > 000. Computer Science, Information and General Works/Ilmu Komputer, Informasi, dan Karya Umum
000 Computer Science, Information and General Works/Ilmu Komputer, Informasi, dan Karya Umum > 000. Computer Science, Information and General Works/Ilmu Komputer, Informasi, dan Karya Umum > 004 Data Processing, Computer Science/Pemrosesan Data, Ilmu Komputer, Teknik Informatika
600 Technology/Teknologi > 620 Engineering and Applied Operations/Ilmu Teknik dan operasi Terapan > 629 Other Branches of Engineering/Cabang Teknik Lainnya
Divisions: Fakultas Ilmu Komputer > Informatika
Depositing User: Dede Muksin Lubis
Date Deposited: 10 Aug 2022 03:37
Last Modified: 10 Aug 2022 03:37
URI: http://repository.mercubuana.ac.id/id/eprint/67184

Actions (login required)

View Item View Item