Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Jurnal Nasional Teknologi Komputer

PERANCANGAN SISTEM RADIUS PADA MIKROTIK ROUTEROS DI PT.PUAN BALEO RAHMADSYAH Fachrid Wadly; Muslim; Wirda Fitriani
Jurnal Nasional Teknologi Komputer Vol 3 No 1 (2023): Volume 3 Nomor 1 Januari 2023
Publisher : CV. Hawari

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61306/jnastek.v3i1.68

Abstract

Penggunan jaringan wireless untuk kebutuhan kerja pada PT.Puan Baleo Rahmadsyah (PBR) telah menjadi salah satu kebutuhan yang sangat penting saat sekarang ini. Gangguan pada sinyal wireless sering terjadi karena banyaknya user yang menggunakan fasilitas Wifi tersebut . Semakin banyak user yang menggunakan jaringan tersebut juga bisa berdampak pada keamanan data di PT.PBR dalam beraktivitas menggunakan internet. Tujuan dari penelitian ini adalah untuk mengetahui bagaimana mengimplementasikan sistem RADIUS (Remote Autentication Dial-In User Service) yang terdapat pada Mikrotik RouterOS dimana berfungsi sebagai sistem autentikasi pengguna untuk jaringan nirkabel. Hasil dari perancangan Ssitem ini dapat diimplementasikan untuk mengamankan jaringan wireless pada PT.PBR
IMPLEMENTASI PLATFORM AS A SERVICE (PAAS) PADA DATABASE E-COMMERCE BERBASIS CLOUD COMPUTING Fachrid Wadly; Arpan; Muhammad Muttaqin
Jurnal Nasional Teknologi Komputer Vol 3 No 2 (2023): Volume 3 Nomor 2 April 2023
Publisher : CV. Hawari

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61306/jnastek.v3i2.88

Abstract

Business competition in the field of information technology continues to increase, one of the technologies itself is cloud computing. Cloud computing can be public or private. One type of cloud computing service used in this study is PaaS. The PaaS cloud computing service provides a platform that users can use to create applications. The Byna Cake shop is a shop that opens a cake business in Aceh, which is located on Pulau Tiga, Aceh, Tamiang. This shop sells various types of cakes which have been produced manually by themselves since 2021. The sales system uses WhatsApp and Instagram media and comes directly to the store, so this system is considered to be less effective and efficient. Therefore, an online sales system is needed, namely by building a web-based E-Commerce application. In implementing this web-based e-commerce application, the author utilizes cloud infrastructure as a cloud provider, namely Microsoft Azure. Computing service used in this research is CMS AbanteCart. Web-based e-commerce application at the Byna Cake store created by configuring a virtual machine to install CMS AbanteCart Packaged By Bitnami on the Microsoft Azure platform. The design used in creating web-based e-commerce applications at the Byna Cake store uses Use Cases and Class Diagrams.
Strategi Penanggulangan Kelemahan Terhadap Ancaman Keamanan Pada Jaringan Wireless Fachrid Wadly; Rio Septian; Zuhri Ramadhan
Jurnal Nasional Teknologi Komputer Vol 3 No 2 (2023): Volume 3 Nomor 2 April 2023
Publisher : CV. Hawari

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61306/jnastek.v3i2.89

Abstract

The use of wireless-based technology devices at this time is so much, good used for voice and data communications. Because wireless technology utilizes frequency high to deliver a communication, then the vulnerability to security is also higher compared to other communication technologies. Various security measures can be taken through communication devices used by users and by operators who provide services communication. Weaknesses of wireless networks in general can be divided into 2 types, namely weaknesses on the configuration and weakness on the type of encryption used. Broadly speaking, the gap on wireless network spans over four layers where the four layers actually are is the process of occurrence of data communication on wireless media. The four layers are layers physical layer, network layer, user layer, and application layer. The security handling models that occur in each layer of wireless technology can be done, among others, by: hide SSID, make use of WEP keys, WPA-PSK or WPA2-PSK, facility implementation, MAC filtering, installation of captive portal infrastructure.