Analisis dan Perancangan Keamanan Akses Router Mikrotik dari Serangan Exploit

Khayudi, Muhammad Al (2019) Analisis dan Perancangan Keamanan Akses Router Mikrotik dari Serangan Exploit. Undergraduate thesis, Universitas Internasional Batam.

[img]
Preview
Text
s-1531104-abstract-en.pdf

Download (220kB) | Preview
[img]
Preview
Text
s-1531104-abstract-id.pdf

Download (220kB) | Preview
[img]
Preview
Text
s-1531104-bibliography.pdf

Download (451kB) | Preview
[img]
Preview
Text
s-1531104-chapter1.pdf

Download (749kB) | Preview
[img]
Preview
Text
s-1531104-chapter2.pdf

Download (2MB) | Preview
[img]
Preview
Text
s-1531104-chapter5.pdf

Download (293kB) | Preview
[img]
Preview
Text
s-1531104-cover-id.pdf

Download (91kB) | Preview

Abstract

Perkembangan zaman teknologi informasi semakin cepat dan canggih. Kebutuhan akan informasi membuat instansi atau perusahaan harus ikut menerapkan teknologi informasi. Seiring berjalannya waktu membuat keamanan informasi akan rentan terhadap serangan yang mengancam keamanan data dan informasi penting disisi lain terdapat kelemahan dari sistem itu sendiri. Penelitian ini bertujuan untuk menganalisis sistem keamanan akses router mikrotik serta melakukan cara mitigasi atau pencegahan dan solusi keamanan dari serangan exploit. Dalam melakukan ujicoba, penelitian ini menggunakan teknik penetration testing terhadap perangkat mikrotik yang diketahui masih memiliki celah keamanan dengan memanfaatkan aplikasi winbox dan aplikasi bawaan dari windows yaitu windows powershell. Hasil dari penelitian yang dilakukan yaitu menyimpulkan dan memberikan solusi bagaimana cara menanggulangi dan mencegah kembali serangan terhadap masalah keamanan akses router mikrotik dari serangan exploit dalam hal ini bisa menjadi bahan pertimbangan bagi IT Security di instansi atau perusahaan untuk mengamankan router mikrotik.dari serangan exploit. ********************************************************************** The development of the information technology era is getting faster and more sophisticated. The need for information makes agencies or companies must participate in implementing information technology. Over time, information security will be vulnerable to attacks that threaten the security of important data and information on the other hand, there are weaknesses of the system itself. The aims of this study is to analyze the microtic router access security system and conduct mitigation or prevention methods and security solutions from exploit attacks. In conducting trials, this study used the penetration testing technique toward microtic device that is known still has security holes by utilizing the Winbox application and the default application from Windows, powershell windows. The results of the research are concluding and providing solutions on how to overcome and prevent the problem of security access to the proxy router from exploit attacks in this case can be taken into consideration for IT Security in agencies or companies to secure the proxy router from exploit attacks.

Item Type: Thesis (Undergraduate)
Additional Information: Similarity: 11
Uncontrolled Keywords: Security of Mikrotik Access, Mikrotik Router, Winbox, Windows, Penetration Testing, Exploit Attack
Subjects: T Technology > Information technology
Divisions: School of Computer Science > Information System
SWORD Depositor: Admin Repository Universitas Internasional Batam
Depositing User: Admin Repository Universitas Internasional Batam
Date Deposited: 21 Oct 2019 09:15
Last Modified: 21 Oct 2019 09:15
URI: http://repository.uib.ac.id/id/eprint/1872

Actions (login required)

View Item View Item