Pengembangan Keamanan Dan Jaringan Pada System Windows Mengunakan Metode Hardening (Studi Kasus : PT. Shiva Shakti Steel)
Keywords:
Windows System, Network, Security, Hardening MethodAbstract
In the current digital era, security and network are very important in a system to support all activities in the world of work, especially for offices. In this case the windows system at PT. Shiva Shakti Steel is currently still slow, supporting application performance feels slow, and network security is still vulnerable. PT. Shiva Shakti Steel is a company that uses technology and information, using the internet network on a windows system, which is expected to help management to process and present data and information effectively, quickly, and accurately. The purpose of his research is expected to accelerate the performance of the windows system, supporting applications and network security. In this study, the data analysis technique that the researcher uses is the hardening system method. Hardening system refers to providing various means of protection in a computer system. Protection is provided in multiple layers, and is often referred to as deep defense. Protecting in layers means protecting at host level, application level, operating system level. According to John D. Howard
in his book "An Analysis of security incidents on the internet" states that: "Computer security is a preventive measure from attacks by computer users or irresponsible network accessors". Meanwhile, according to Gollmann in 1999 in his book "Computer Security" states that: "Computer security is related to selfprevention and detection of unrecognized intruders in computer systems". From the results of the analysis of vulnerability testing carried out, namely testing system and network security on windows systems using the hardening method at PT. Shiva Shakti Steel, it can be concluded that the hardening system method was chosen because this is the initial foundation for the system, so that it can solve some of the problems that exist in the system.
References
Aditya, Y. S., Yunan, U., Septo, K., & Fathinuddin, M. (2021). PENGAMANAN DATA CLOUDFRI MENGGUNAKAN METODE SECURITY HARDENING. 8(5), 9428–9438.
Ari Prayoga Hutabarat, & H. (2020). Analisa Dan Perancangan Keamanan Jaringan End User Dari Serangan Exploit Menggunakan Metode Penetration. Journal of Information System and Technology.
Ari Setiawan, C., & Tria Putra Abza, A. (2020). Keamanan Jaringan Menggunakan Teknik Network Intrusion Detection System (NIDS) Di Kantor Setwan Kepulauan Meranti. Jurnal Intra Tech, 4(2), 35–46. https://www.journal.amikmahaputra.ac.id/index.php/JIT/article/view/82
Bina, K., Jl, W., Soebrantas, H. R., & Baru, S. (2019). Pengaruh serangan keamanan pada vanet terhadap performansi jaringan. 6, 1–6.
Bustami, A., & Bahri, S. (2020). Ancaman, Serangan dan Tindakan Perlindungan pada Keamanan Jaringan atau Sistem Informasi: Systematic Review. Unistek, 7(2), 59–70. https://doi.org/10.33592/unistek.v7i2.645
Cosmas Eko Suharyanto. (2016). Analisis Komparatif Sistem Keamanan Windows 7 Dan Windows 8. JIF (Jurnal Ilmiah Informatika).
Dewi, S. (2020). Keamanan Jaringan Menggunakan VPN (Virtual Private Network) Dengan Metode PPTP (Point To Point Tunneling Protocol) Pada Kantor Desa Kertaraharja Ciamis. EVOLUSI: Jurnal Sains Dan Manajemen, 8(1), 128–139.
Fachri, B., & Harahap, F. H. (2020). Simulasi Penggunaan Intrusion Detection System (IDS) Sebagai Keamanan Jaringan dan Komputer. Jurnal Media Informatika Budidarma, 4(2), 413. https://doi.org/10.30865/mib.v4i2.2037