Network Security Analysis Using Virtual Private Network in Vocational School
DOI:
https://doi.org/10.33394/jp.v9i3.5346Keywords:
Network, VPN, Vocational School.Abstract
Every organization chooses a virtual private network (VPN) as their top option since it is a practical and secure solution. Through the use of a virtual private network, this study seeks to evaluate the network in SMK (VPN). The descriptive qualitative research used in this study was carried out at the lab of SMK Negeri 1 Ampek Angkek. Data were gathered through observation, interviews, and document analysis studies. The method of data analysis employed descriptive analysis. The results of this study indicate that the activity on the VPN network is better than the Non-VPN because the activities carried out in the VPN tunnel are not known by others. Users find it simpler to finish their daily agenda as a result.
References
Aripin, N., & Ramdhani, Y. (2021). Implementasi Jaringan Wireless Berbasis Router Mikrotik Dengan Menggunakan Vlan Di Smk Mvp Ars Internasional Bandung. Eprosiding Teknik Informatika (Protektif), 2(1), 97-102.
Ariyadi, T., & Maulana, A. T. (2021). Penerapan Web Proxy Dan Management Bandwidth Menggunakan Mikrotik Routerboard Pada Kantor Pos Palembang 30000. Jurnal Ilmiah Informatika, 9(02), 116-122.
Bahtiar, D. (2022). Pengenalan Dasar Instalasi Jaringan Komputer Menggunakan Mikrotik. Jatimika: Jurnal Kreativitas Mahasiswa Informatika, 2(3).
Dewi, S. (2020). Keamanan Jaringan Menggunakan VPN (Virtual Private Network) Dengan Metode PPTP (Point To Point Tunneling Protocol) Pada Kantor Desa Kertaraharja Ciamis. EVOLUSI: Jurnal Sains dan Manajemen, 8(1).
Dwiyatno, S., Sulistiyono, S., & Nugraheni, M. (2019). Layanan Komunikasi Voip Menggunakan Raspberry Pi Dan Raspbx Pada Smk Al-Insan Terpadu. Prosisko: Jurnal Pengembangan Riset Dan Observasi Sistem Komputer, 6(2).
Ekawati, I., & Irwan, D. (2021). Implementasi Virtual Private Network Menggunakan PPTP Berbasis Mikrotik. JREC (Journal of Electrical and Electronics), 9(1), 41-48.
Gunawan, H., Simorangkir, H., Ghiffari, M., Informatika, T., Komputer, F. I., & Unggul, U. E. (2018). Pengelolaan Jaringan Dengan Router Mikrotik Untuk Meningkatkan Efektifitas Penggunaan Bandwith Internet (Studi Kasus Smk Ki Hajar Dewantoro Kota Tangerang). Ilmu Komput, 3(1), 54-70.
Kumajas, S., Sasukul, J., Siwi, A., & Saruan, H. (2022). Wireless Local Area Network Security through Protocol Wireless Protected Access. International Journal of Information Technology and Education, 1(2), 60-71.
Mananggel, A. V., Mewengkang, A., & Djamen, A. C. (2021). Perancangan Jaringan Komputer Di Smk Menggunakan Cisco Packet Tracer. Edutik: Jurnal Pendidikan Teknologi Informasi Dan Komunikasi, 1(2), 119-131.
Masse, B. A., & Iyan, I. (2016). Membangun Jaringan Wireless Dengan Pengaturan Bandwidth Menggunakan Mikrotik RB951 Pada SMK Negeri 6 Palu. Jurnal Elektronik Sistem Informasi dan Komputer, 2(2), 19-28.
Miftah, Zaeni. (2018). Simulasi Keamanan Jaringan Dengan Metode Dhcp Snooping Dan Vlan. Faktor Exacta. 11. 167. 10.30998/Faktorexacta.V11i2.2456.
Moleong ,Lexy. J. ( 2011) . Metode Penelitian Kualitatif. Bandung: Remaja Rosdakarya
Mujiastuti, R., & Prasetyo, I. (2021). Membangun Sistem Keamanan Jaringan Berbasis Vpn Yang Terintegrasi Dengan Dns Filtering Pihole. Prosiding Semnastek.
Musdalifa, M., & Panu, S. A. (2019). Perancangan Jaringan Wifi Dengan Menggunakan Mikrotik Pada SMP Negeri 3 Mallusetasi Kabupaten Barru. Publikasi Pendidikan, 9(1), 28-41.
Noviansyah, M., & Saiyar, H. (2021). Pencegahan Packet Sniffing Menggunakan Metode Vpn Tunnel Untuk Keamanan Jaringan Komputer Berbasis Mikrotik. Jurnal Akrab Juara, 6(4), 36-46.
Oktivasari, P., & Utomo, A. B. (2016). Analysis Of Virtual Private Network Using Openvpn And Point To Point Tunneling Protocol-Analisa Virtual Private Network Menggunakan Openvpn Dan Point To Point Tunneling Protocol. Jurnal Penelitian Komunikasi Dan Opini Publik, 20(2).
Putra, J. L., Indriyani, L., & Angraini, Y. (2018). Penerapan sistem keamanan jaringan menggunakan VPN dengan metode PPTP pada pt. asri pancawarna. IJCIT (Indonesian Journal on Computer and Information Technology), 3(2).
Raharjo, S., & Iswahyudi, C. (2021). Analisis Keamanan Jaringan Mikrotik Isp Indonesia Menggunakan Search Engine Scada Shodan Dengan Metode Exploit Winbox Critical Vulnerability. Jurnal Jarkom, 9(1), 56-62.
Ratmoko, H., & Nurhadiyono, B. (2012). Analisis Implementasi Keamanan Jaringan Virtual Private Network (Vpn) Pada Pt. Layar Sentosa Shipping Corporation. Jurnal, 2(1).
Sulaiman, O. K. (2016). Analisis Sistem Keamanan Jaringan Dengan Menggunakan Switch Port Security. Cess (Journal Of Computer Engineering, System And Science) 1(1) 9-14
Downloads
Published
How to Cite
Issue
Section
Citation Check
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.Â
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).