ANALISIS MONITORING UNTUK PENCEGAHAN AKSES ILEGAL DI DALAM JARINGAN DEPARTEMENT TI PT. PUSRI
DOI:
https://doi.org/10.33884/jif.v13i01.9915Keywords:
Wireshark, Monitoring, Teknologi, AksesAbstract
Technology plays an important role in human survival in daily activities that cannot be separated from technology. Information technology makes it easy for humans to share information or search for information. Cyber attacks such as malware attacks or hacking attempts are a serious threat to IT networks. The purpose of network security is to anticipate the risk of network threats that can disrupt daily computer network operations. In this study, the author used the Action Research method. This study aims to test and develop, find and design. The network in the IT Department of PT. Pupuk Srwidjaja Palembang is quite safe because when network monitoring was carried out for 10 days on June 6, 2023 to June 22, 2023, there was no illegal access.
References
H. Hasriadi, “Metode Pembelajaran Inovatif di Era Digitalisasi,” Jurnal Sinestesia, vol. 12, no. 1, Art. no. 1, Jun. 2022.
B. S. Permana, L. A. Hazizah, and Y. T. Herlambang, “Teknologi Pendidikan: Efektivitas Penggunaan Media Pembelajaran Berbasis Teknologi Di Era Digitalisasi,” Khatulistiwa: Jurnal Pendidikan dan Sosial Humaniora, vol. 4, no. 1, pp. 19–28, Jan. 2024, doi: 10.55606/khatulistiwa.v4i1.2702.
D. Wiryany, S. Natasha, and R. Kurniawan, “Perkembangan Teknologi Informasi dan Komunikasi terhadap Perubahan Sistem Komunikasi Indonesia,” jnk, vol. 8, no. 2, pp. 242–252, Nov. 2022, doi: 10.26905/nomosleca.v8i2.8821.
T. Ariyadi, M. Fikri, I. Irwansyah, and H. Yudiastuti, “PENERAPAN MONITORING JARINGAN DENGAN ZABBIX PADA PT. PLN (PERSERO) UIP BAGIAN SUMBAGSEL,” JURNAL ILMIAH INFORMATIKA, vol. 12, no. 02, Art. no. 02, Sep. 2024, doi: 10.33884/jif.v12i02.9283.
R. Raihana, S. S. Jagat, and R. Perdana, “Pengaruh Perkembangan Teknologi Terhadap Kemajuan Hukum Di Indonesia,” Jurnal Pendidikan dan Konseling (JPDK), vol. 5, no. 2, pp. 5628–5633, Apr. 2023, doi: 10.31004/jpdk.v5i2.14551.
M. Husaini, “PEMANFAATAN TEKNOLOGI INFORMASI DALAM BIDANG PENDIDIKAN (E-education),” MIKROTIK: Jurnal Manajemen Informatika, vol. 2, no. 1, Art. no. 1, Mar. 2017, Accessed: Feb. 14, 2025. [Online]. Available: https://ojs.ummetro.ac.id/index.php/mikrotik/article/view/314
S. Syahputra and C. E. Gunawan, “Perancangan Database Aplikasi Tabungan Sampah PT Pusri Palembang,” SEMASTER: Seminar Nasional Teknologi Informasi & Ilmu Komputer, vol. 2, no. 1, pp. 336–348, Dec. 2023, doi: 10.31849/semaster.v2i1.18648.
E. Fauzi, M. V. Sinatrya, N. D. Ramdhani, R. Ramadhan, and Z. M. R. Safari, “Pengaruh kemajuan teknologi informasi terhadap perkembangan akuntansi,” Jurnal Riset Pendidikan Ekonomi, vol. 7, no. 2, Art. no. 2, Oct. 2022, doi: 10.21067/jrpe.v7i2.6877.
T. Ariyadi and M. R. Pohan, “Implementation of Penetration Testing Tools to Test Wi-Fi Security Levels at the Directorate of Innovation and Business Incubators,” Jurnal Penelitian Pendidikan IPA, vol. 9, no. 12, Art. no. 12, Dec. 2023, doi: 10.29303/jppipa.v9i12.5551.
T. Ariyadi, T. D. Purwanto, and M. M. Fajar, “IMPLEMENTASI DESAIN JARINGAN HOTSPOT BERBASIS MIKROTIK DENGAN METODE NDLC (NETWORK DEVELOPMENT LIFE CYCLE) PADA PT KIRANA PERMATA,” JURNAL ILMIAH INFORMATIKA, vol. 11, no. 02, Art. no. 02, Sep. 2023, doi: 10.33884/jif.v11i02.8032.
W. Maula and T. Ariyadi, “PERANCANGAN TOPOLOGI JARINGAN BERBASIS OSPF DI SMA N 4 METRO LAMPUNG MENGGUNAKAN CISCO PACKET TRACER,” STORAGE: Jurnal Ilmiah Teknik dan Ilmu Komputer, vol. 3, no. 4, Art. no. 4, Nov. 2024, doi: 10.55123/storage.v3i4.4486.
F. A. Hasibuan and Subhiyanto, “Jaringan Komputer Berbasis Radius Server untuk Meningkatkan Pemanfaatan Internet di Madrasah Aliyah Al-Azhaar Ummu Suwanah,” Jurnal Teknik Informatika, vol. 7, no. 1, Art. no. 1, Feb. 2021, doi: 10.51998/jti.v7i1.349.
Y. R. Adi, O. D. Nurhayati, and E. D. Widianto, “Perancangan Sistem Cluster Server untuk Jaminan Ketersediaan Layanan Tinggi pada Lingkungan Virtual,” Jurnal Nasional Teknik Elektro dan Teknologi Informasi, vol. 5, no. 2, Art. no. 2, 2016.
T. G. Laksana and S. Mulyani, “PENGETAHUAN DASAR IDENTIFIKASI DINI DETEKSI SERANGAN KEJAHATAN SIBER UNTUK MENCEGAH PEMBOBOLAN DATA PERUSAHAAN,” Jurnal Ilmiah Multidisiplin, vol. 3, no. 01, pp. 109–122, Jan. 2024, doi: 10.56127/jukim.v3i01.1143.
A. Oktaviani and E. Rusdiana, “ALTERNATIF PIDANA BAGI PELAKU TINDAK PIDANA PERETASAN DI INDONESIA DALAM UNDANG-UNDANG INFORMASI DAN TRANSAKSI ELEKTRONIK,” NOVUM : JURNAL HUKUM, pp. 249–264, Jan. 2023, doi: 10.2674/novum.v0i0.50394.
J. A. Amien, “IMPLEMENTASI KEAMANAN JARINGAN DENGAN IPTABLES SEBAGAI FIREWALL MENGGUNAKAN METODE PORT KNOCKING,” JURNAL FASILKOM, vol. 10, no. 2, Art. no. 2, Aug. 2020, doi: 10.37859/jf.v10i2.2098.
“Design and Analysis of Light Fidelity Network for Indoor Wireless Connectivity | IEEE Journals & Magazine | IEEE Xplore.” Accessed: Feb. 25, 2025. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9567691
M. Fuentes-García, J. Camacho, and G. Maciá-Fernández, “Present and Future of Network Security Monitoring,” IEEE Access, vol. 9, pp. 112744–112760, 2021, doi: 10.1109/ACCESS.2021.3067106.
T. Ariyadi, I. Irwansyah, and M. S. H. Mubarok, “ANALISIS KEAMANAN JARINGAN WIFI MAHASISWA UBD DARI SERANGAN PACKET SNIFFING,” JURNAL ILMIAH INFORMATIKA, vol. 12, no. 01, Art. no. 01, Mar. 2024, doi: 10.33884/jif.v12i01.8739.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 JURNAL ILMIAH INFORMATIKA

This work is licensed under a Creative Commons Attribution 4.0 International License.