Pembatasan Akses Menggunakan MAC Address dengan Metode Access Control List
DOI:
https://doi.org/10.14421/jiska.2022.7.3.143-162Keywords:
Computer, Intranet Network, MAC Address, Access Control List, Security, QuestionnaireAbstract
The Cangehgar Cyber Command Center of the 14th Arhanud/ PWY Battalion from Cirebon City is one of the offices with IT equipment to assist the job. The servers, like the office PCs, are connected via the local network. Due to the risk of leaking secret data from within, network security concerns must be handled so that unauthorized users cannot mistakenly access the server. It seeks to limit access when there are administrative customers and employees in each room by utilizing the access control list approach using a MAC address. Access to the server is restricted to the administrator's computer, while access to the employee's PC is disallowed. Then the questionnaire was distributed to find out the respondent's assessment of the access control list. According to the results of the study on security indicators, access control lists containing MAC addresses are useful in limiting access to server computers.
References
Ahmad, T., Imtihan, K., & Wire, B. (2020). Implementasi Jaringan Inter-VLAN Routing Berbasis Mikrotik Rb260Gs Dan Mikrotik Rb1100Ahx4. JIRE (Jurnal Informatika & Rekayasa Elektronika), 3(1), 77–84. https://doi.org/10.36595/jire.v3i1.221
Ardiansyah, A. H., & Yudiastuti, H. (2021). Perancangan Jaringan Intervlan Routing Dan Penerapan Acls Pada Pt. Sinar Alam Permai Dengan Simulasi Menggunakan Packet Tracer. Prosiding Semhavok, 3(1), 210–218.
Bustami, A., & Bahri, S. (2020). Ancaman, Serangan dan Tindakan Perlindungan pada Keamanan Jaringan atau Sistem Informasi : Systematic Review. UNISTEK, 7(2), 59–70. https://doi.org/10.33592/unistek.v7i2.645
Dianta, I. A., & Zusrony, E. (2019). Analisis Pengaruh Sistem Keamanan Informasi Perbankan Pada Nasabah Pengguna Internet Banking. INTENSIF: Jurnal Ilmiah Penelitian Dan Penerapan Teknologi Sistem Informasi, 3(1), 1. https://doi.org/10.29407/intensif.v3i1.12125
Dohot, S., Khairina, N., & Robin. (2020). Pembuatan Media Pembelajaran Fisika Berbasis Hots Untuk Tingkat Smp. Pendidikan Fisika, 9(1), 63–67. https://doi.org/10.22611/jpf.v9i1.18173
Erliana, H., Akos, M., & Priono, S. (2019). Pengaruh Disiplin Kerja Terhadap Kinerja Dengan Kepuasan Kerja Sebagai Variabel Intervening. Administraus, 3(2), 31–58. https://doi.org/10.56662/administraus.v3i2.75
Gunawan, J., & Agung, H. (2019). Implementation of PPTP and BCP with Inter-VLAN on the Topology that Uses 2 ISP as Inter-Division Connectors (Case Study: PT Kenari Djaja Prima). Jurnal Algoritma, Logika Dan Komputasi, 2(1), 138–150. https://doi.org/10.30813/j-alu.v2i1.1574
Hafizhan, M., Wahyuddin, M. I., & Komalasari, R. T. (2020). Implementasi Packet Filtering Menggunakan Metode Extended Access Control List (ACL) Pada Protokol EIGRP. JURNAL MEDIA INFORMATIKA BUDIDARMA, 4(1), 185. https://doi.org/10.30865/mib.v4i1.1926
Hasan, U., & Dewi, S. (2022). Penerapan Metode Access Control List Pada Jaringan VLAN Menggunakan Router Cisco. IMTechno: Journal of Industrial Management and Technology, 3(1), 37–41. https://doi.org/10.31294/imtechno.v3i1.927
Herawati, L., & Irwandi. (2019). Pengaruh Model Pembelajaran Kooperatif Tipe Jigsaw Terhadap Hasil Belajar dan Berpikir Kritis Siswa Pada Mata Pelajaran IPA di SMP Negeri 09 Lebong. Prosiding Seminar Nasional Sains Dan Entrepreneunship Vi, 1–9.
Irwansyah, I., & Novariansyah, D. (2019). Pengembangan Keamanan Jaringan Vlan Dan Acls Pt. Taspen (Persero) Palembang Menggunakan Simulasi Packet Tracer. Prosiding Semhavok, 1(1), 95–102.
Kartini, D., & Eko, A. (2019). Upgrade Skill Komputer Perangkat Desa Pemakuan. Jurnal Pengabdian Kepada Masyarakat MEDITEG, 4(2), 7–11. https://doi.org/10.34128/mediteg.v4i2.48
Kelrey, A. R., & Muzaki, A. (2019). Pengaruh Ethical Hacking Bagi Keamanan Data Perusahaan. Cyber Security Dan Forensik Digital, 2(2), 77–81. https://doi.org/10.14421/csecurity.2019.2.2.1625
Kurniati, K., & Dasmen, R. N. (2019). The Simulation of Access Control List (ACLs) Network Security for Frame Relay Network at PT. KAI Palembang. Lontar Komputer : Jurnal Ilmiah Teknologi Informasi, 10(1), 49. https://doi.org/10.24843/LKJITI.2019.v10.i01.p06
Munawar, Z., & Putri, N. I. (2020). Keamanan Jaringan Komputer pada Era Big Data. J-SIKA|Jurnal Sistem Informasi Karya Anak Bangsa, 2(01), 14–20.
Nugroho, F. E., & Daniarti, Y. (2021). Rancang Bangun QoS (Quality of Service) Jaringan Wireless Local Area Network Menggunakan Metode NDLC (Network Development Life Cycle) di PT Trimitra Kolaborasi Mandiri (3KOM). JIKA (Jurnal Informatika), 5(1), 79. https://doi.org/10.31000/jika.v5i1.3970
Pairingan, A., Allo Layuk, P. K., & Pangayow, B. J. . (2018). Pengaruh Kompetensi, dan Independensi Terhadap Kualitas Audit dengan Motivasi Sebagai Variabel Pemoderasi. Jurnal Akuntansi, Audit, Dan Aset, 1(1), 1–13. https://doi.org/10.52062/jurnal_aaa.v1i1.2
Prasetya, T. A., & Harjanto, C. T. (2020). Pengaruh Mutu Pembelajaran Online Dan Tingkat Kepuasan Mahasiswa Terhadap Hasil Belajar Saat Pandemi. Jurnal Pendidikan Teknologi Dan Kejuruan, 17(2), 188–197. https://doi.org/10.23887/jptk-undiksha.v17i2.25286
Purba, G. C. (2021). Implementation Of Network Packet Filtering With Extended Acl Methods On Microtik In Securing Internet Connection Office AFD IV Butong Sulfur Unit. Infokum, 9(2), 287–293.
Riskiyadi, M., Anggono, A., & Tarjo. (2021). Cybercrime dan Cybersecurity pada Fintech: Sebuah Tinjauan Pustaka Sistematis. Jurnal Manajemen Dan Organisasi, 12(3), 239–251. https://doi.org/10.29244/jmo.v12i3.33528
Sihotang, B. K., Sumarno, S., & Damanik, B. E. (2020). Implementasi Access Control List Pada Mikrotik dalam Mengamankan Koneksi Internet Koperasi Sumber Dana Mutiara. JURIKOM (Jurnal Riset Komputer), 7(2), 229. https://doi.org/10.30865/jurikom.v7i2.2010
Sugawara, E., & Nikaido, H. (2014). Properties of AdeABC and AdeIJK Efflux Systems of Acinetobacter baumannii Compared with Those of the AcrAB-TolC System of Escherichia coli. Antimicrobial Agents and Chemotherapy, 58(12), 7250–7257. https://doi.org/10.1128/AAC.03728-14
Sulaiman, O. K., & Saripurna, D. (2021). Network Security System Analysis Using Access Control List (ACL). International Journal of Information System & Technology Akreditasi, 5(2), 192–197. https://doi.org/10.30645/ijistech.v5i2.131
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Muhammad Aditya Rabbani Adit, Martanto Martanto, Yudhistira Arie Wijaya
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors who publish with this journal agree to the following terms as stated in http://creativecommons.org/licenses/by-nc/4.0
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.