NUGROHO, LUQMAN WIDIYANTO (2022) Keamanan Jaringan Berbasis Wireless. S1 thesis, Universitas Mercu Buana Jakarta.
Text (JURNAL MAHASISWA)
Jurnal 41516010030 LUQMAN WIDIYANTO NUGROHO.pdf Restricted to Registered users only Download (718kB) |
Abstract
Network security is a very significant thing at this time, especially in network security in the wireless hotspot. Wireless network security needs special handling, because most of the threats / threats that attack the network originate from internal users of the hotspot network itself. Therefore, control over every internal user connected to the network. This final project provides a solution in the form of a security method in the form of written rules that are aligned with system settings, a method used as a way to control internal user access on a wireless network. With this method, the internal user must first perform the authentication process on the hotspot security method before connecting to the network. So that only internal users who are authenticated and have a system that meets the requirements have the right to access the network according to their access authority. Through this final project, it is concluded that to achieve an optimal wireless network environment requires coordination between users and administrators as well as rules / regulations or authorization in the use of the network. Keywords: Security, Network, Wireless, Method, Hotspot, User Network security is a very significant thing at this time, especially in network security in the wireless hotspot. Wireless network security needs special handling, because most of the threats / threats that attack the network originate from internal users of the hotspot network itself. Therefore, control over every internal user connected to the network. This final project provides a solution in the form of a security method in the form of written rules that are aligned with system settings, a method used as a way to control internal user access on a wireless network. With this method, the internal user must first perform the authentication process on the hotspot security method before connecting to the network. So that only internal users who are authenticated and have a system that meets the requirements have the right to access the network according to their access authority. Through this final project, it is concluded that to achieve an optimal wireless network environment requires coordination between users and administrators as well as rules / regulations or authorization in the use of the network. Keywords: Security, Network, Wireless, Method, Hotspot, User
Item Type: | Thesis (S1) |
---|---|
Call Number CD: | JM/INFO. 22 004 |
NIM/NIDN Creators: | 41516010030 |
Uncontrolled Keywords: | Keamanan, Jaringan, Wireless, Metode, Hotspot, User |
Subjects: | 000 Computer Science, Information and General Works/Ilmu Komputer, Informasi, dan Karya Umum > 000. Computer Science, Information and General Works/Ilmu Komputer, Informasi, dan Karya Umum 000 Computer Science, Information and General Works/Ilmu Komputer, Informasi, dan Karya Umum > 000. Computer Science, Information and General Works/Ilmu Komputer, Informasi, dan Karya Umum > 004 Data Processing, Computer Science/Pemrosesan Data, Ilmu Komputer, Teknik Informatika 600 Technology/Teknologi > 620 Engineering and Applied Operations/Ilmu Teknik dan operasi Terapan > 629 Other Branches of Engineering/Cabang Teknik Lainnya |
Divisions: | Fakultas Ilmu Komputer > Informatika |
Depositing User: | Dede Muksin Lubis |
Date Deposited: | 10 Aug 2022 03:37 |
Last Modified: | 10 Aug 2022 03:37 |
URI: | http://repository.mercubuana.ac.id/id/eprint/67184 |
Actions (login required)
View Item |