Ni Komang Ayu Sri Anggreni
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Sistem Pengamanan Anonym dengan Menggunakan Algoritma Kriptografi ElGamal Ni Komang Ayu Sri Anggreni; Linawati Linawati; Nyoman Putra Sastra
Jurnal Teknologi Elektro Vol 18 No 2 (2019): (Mei-Agustus) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (300.811 KB) | DOI: 10.24843/MITE.2019.v18i02.P07

Abstract

Reporting on act of domestic violence to Integrated Services Center for Woman and Children (Pusat Pelayanan Terpadu Pemberdayaan Perempuan dan Anak (P2TP2A)) Kota Denpasar city is kind of sensitive and vulnerable data to tapping. As a result, security guarantee for the reporter is needed to protect their identity. Security guarantee with anonym reporting system, which uses EIGamal cryptographic algorithm for encryption process and description process. EIGamal cryptographic algorithm is one of asymmetric cryptography which consist of 3 processes, that are process of generate key, encryption process and description process On this security system identity of the reporter will be protected through process of authentication, authorization, and encryption. In this study the researcher uses Android platform and EIGamal cryptographic algorithm for encryption and description, Firebase Auth for authentication, Firebase Rules for authorization and Avalanche Effect for knowing the quality of cryptographic algorithm. The result of the trials which used 10 different ciphet texts of avalanche effect is 58,2%. That result can be categorized as good because a good result of avalanche effect.
Literatur Review Analisis metode De-Militarized Zone (DMZ) dan Switch Port Security Sebagai Metode Keamanan Jaringan Ni Komang Ayu Sri Anggreni; Lie Jasa
Jurnal Teknologi Elektro Vol 21 No 2 (2022): (Juli - Desember) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/MITE.2022.v21i02.P06

Abstract

Over time, the development of technology is very rapid. It is certainly inseparable from the role of networks that can connect devices to be able to exchange information. Therefore, there is a need to secure computer networks to prevent cyber crime. The most commonly used attacks are Port Scanning and DoS (Denial Of Service). There are various ways to secure a computer network, one of which is by Switching port security. In addition to using Switch port security, the technique for securing network crimes is to use the De-Militarized Zone (DMZ). This study aims to compare network security performance with the Port security and DMZ methods where the tests obtained based on the review literature concluded that the use of the DMZ method carries out security by filtering requests by clients through firewall routers while Port security can provide security to the network by providing access to the server to registered ports only.