Pembatasan Akses Menggunakan MAC Address dengan Metode Access Control List

Authors

  • Muhammad Aditya Rabbani Adit STMIK IKMI Cirebon
  • Martanto Martanto STMIK IKMI Cirebon
  • Yudhistira Arie Wijaya STMIK IKMI Cirebon

DOI:

https://doi.org/10.14421/jiska.2022.7.3.143-162

Keywords:

Computer, Intranet Network, MAC Address, Access Control List, Security, Questionnaire

Abstract

The Cangehgar Cyber Command Center of the 14th Arhanud/ PWY Battalion from Cirebon City is one of the offices with IT equipment to assist the job. The servers, like the office PCs, are connected via the local network. Due to the risk of leaking secret data from within, network security concerns must be handled so that unauthorized users cannot mistakenly access the server. It seeks to limit access when there are administrative customers and employees in each room by utilizing the access control list approach using a MAC address. Access to the server is restricted to the administrator's computer, while access to the employee's PC is disallowed. Then the questionnaire was distributed to find out the respondent's assessment of the access control list. According to the results of the study on security indicators, access control lists containing MAC addresses are useful in limiting access to server computers.

References

Ahmad, T., Imtihan, K., & Wire, B. (2020). Implementasi Jaringan Inter-VLAN Routing Berbasis Mikrotik Rb260Gs Dan Mikrotik Rb1100Ahx4. JIRE (Jurnal Informatika & Rekayasa Elektronika), 3(1), 77–84. https://doi.org/10.36595/jire.v3i1.221

Ardiansyah, A. H., & Yudiastuti, H. (2021). Perancangan Jaringan Intervlan Routing Dan Penerapan Acls Pada Pt. Sinar Alam Permai Dengan Simulasi Menggunakan Packet Tracer. Prosiding Semhavok, 3(1), 210–218.

Bustami, A., & Bahri, S. (2020). Ancaman, Serangan dan Tindakan Perlindungan pada Keamanan Jaringan atau Sistem Informasi : Systematic Review. UNISTEK, 7(2), 59–70. https://doi.org/10.33592/unistek.v7i2.645

Dianta, I. A., & Zusrony, E. (2019). Analisis Pengaruh Sistem Keamanan Informasi Perbankan Pada Nasabah Pengguna Internet Banking. INTENSIF: Jurnal Ilmiah Penelitian Dan Penerapan Teknologi Sistem Informasi, 3(1), 1. https://doi.org/10.29407/intensif.v3i1.12125

Dohot, S., Khairina, N., & Robin. (2020). Pembuatan Media Pembelajaran Fisika Berbasis Hots Untuk Tingkat Smp. Pendidikan Fisika, 9(1), 63–67. https://doi.org/10.22611/jpf.v9i1.18173

Erliana, H., Akos, M., & Priono, S. (2019). Pengaruh Disiplin Kerja Terhadap Kinerja Dengan Kepuasan Kerja Sebagai Variabel Intervening. Administraus, 3(2), 31–58. https://doi.org/10.56662/administraus.v3i2.75

Gunawan, J., & Agung, H. (2019). Implementation of PPTP and BCP with Inter-VLAN on the Topology that Uses 2 ISP as Inter-Division Connectors (Case Study: PT Kenari Djaja Prima). Jurnal Algoritma, Logika Dan Komputasi, 2(1), 138–150. https://doi.org/10.30813/j-alu.v2i1.1574

Hafizhan, M., Wahyuddin, M. I., & Komalasari, R. T. (2020). Implementasi Packet Filtering Menggunakan Metode Extended Access Control List (ACL) Pada Protokol EIGRP. JURNAL MEDIA INFORMATIKA BUDIDARMA, 4(1), 185. https://doi.org/10.30865/mib.v4i1.1926

Hasan, U., & Dewi, S. (2022). Penerapan Metode Access Control List Pada Jaringan VLAN Menggunakan Router Cisco. IMTechno: Journal of Industrial Management and Technology, 3(1), 37–41. https://doi.org/10.31294/imtechno.v3i1.927

Herawati, L., & Irwandi. (2019). Pengaruh Model Pembelajaran Kooperatif Tipe Jigsaw Terhadap Hasil Belajar dan Berpikir Kritis Siswa Pada Mata Pelajaran IPA di SMP Negeri 09 Lebong. Prosiding Seminar Nasional Sains Dan Entrepreneunship Vi, 1–9.

Irwansyah, I., & Novariansyah, D. (2019). Pengembangan Keamanan Jaringan Vlan Dan Acls Pt. Taspen (Persero) Palembang Menggunakan Simulasi Packet Tracer. Prosiding Semhavok, 1(1), 95–102.

Kartini, D., & Eko, A. (2019). Upgrade Skill Komputer Perangkat Desa Pemakuan. Jurnal Pengabdian Kepada Masyarakat MEDITEG, 4(2), 7–11. https://doi.org/10.34128/mediteg.v4i2.48

Kelrey, A. R., & Muzaki, A. (2019). Pengaruh Ethical Hacking Bagi Keamanan Data Perusahaan. Cyber Security Dan Forensik Digital, 2(2), 77–81. https://doi.org/10.14421/csecurity.2019.2.2.1625

Kurniati, K., & Dasmen, R. N. (2019). The Simulation of Access Control List (ACLs) Network Security for Frame Relay Network at PT. KAI Palembang. Lontar Komputer : Jurnal Ilmiah Teknologi Informasi, 10(1), 49. https://doi.org/10.24843/LKJITI.2019.v10.i01.p06

Munawar, Z., & Putri, N. I. (2020). Keamanan Jaringan Komputer pada Era Big Data. J-SIKA|Jurnal Sistem Informasi Karya Anak Bangsa, 2(01), 14–20.

Nugroho, F. E., & Daniarti, Y. (2021). Rancang Bangun QoS (Quality of Service) Jaringan Wireless Local Area Network Menggunakan Metode NDLC (Network Development Life Cycle) di PT Trimitra Kolaborasi Mandiri (3KOM). JIKA (Jurnal Informatika), 5(1), 79. https://doi.org/10.31000/jika.v5i1.3970

Pairingan, A., Allo Layuk, P. K., & Pangayow, B. J. . (2018). Pengaruh Kompetensi, dan Independensi Terhadap Kualitas Audit dengan Motivasi Sebagai Variabel Pemoderasi. Jurnal Akuntansi, Audit, Dan Aset, 1(1), 1–13. https://doi.org/10.52062/jurnal_aaa.v1i1.2

Prasetya, T. A., & Harjanto, C. T. (2020). Pengaruh Mutu Pembelajaran Online Dan Tingkat Kepuasan Mahasiswa Terhadap Hasil Belajar Saat Pandemi. Jurnal Pendidikan Teknologi Dan Kejuruan, 17(2), 188–197. https://doi.org/10.23887/jptk-undiksha.v17i2.25286

Purba, G. C. (2021). Implementation Of Network Packet Filtering With Extended Acl Methods On Microtik In Securing Internet Connection Office AFD IV Butong Sulfur Unit. Infokum, 9(2), 287–293.

Riskiyadi, M., Anggono, A., & Tarjo. (2021). Cybercrime dan Cybersecurity pada Fintech: Sebuah Tinjauan Pustaka Sistematis. Jurnal Manajemen Dan Organisasi, 12(3), 239–251. https://doi.org/10.29244/jmo.v12i3.33528

Sihotang, B. K., Sumarno, S., & Damanik, B. E. (2020). Implementasi Access Control List Pada Mikrotik dalam Mengamankan Koneksi Internet Koperasi Sumber Dana Mutiara. JURIKOM (Jurnal Riset Komputer), 7(2), 229. https://doi.org/10.30865/jurikom.v7i2.2010

Sugawara, E., & Nikaido, H. (2014). Properties of AdeABC and AdeIJK Efflux Systems of Acinetobacter baumannii Compared with Those of the AcrAB-TolC System of Escherichia coli. Antimicrobial Agents and Chemotherapy, 58(12), 7250–7257. https://doi.org/10.1128/AAC.03728-14

Sulaiman, O. K., & Saripurna, D. (2021). Network Security System Analysis Using Access Control List (ACL). International Journal of Information System & Technology Akreditasi, 5(2), 192–197. https://doi.org/10.30645/ijistech.v5i2.131

Downloads

Published

2022-09-25

How to Cite

Adit, M. A. R., Martanto, M., & Wijaya, Y. A. (2022). Pembatasan Akses Menggunakan MAC Address dengan Metode Access Control List. JISKA (Jurnal Informatika Sunan Kalijaga), 7(3), 143–162. https://doi.org/10.14421/jiska.2022.7.3.143-162