Network Security to Protect Negative Web: A Case Study of the Government of Aceh
Main Article Content
Abstract
The specific objectives of the research include evaluating the extent to which information governance management has been carried out at the Aceh Communications, Information and Encryption Service, and negative web protection that is accessed through the aceh government network in all OPDs and districts/cities throughout Aceh. This research will use 4 (four) stages of information system security audit including; audit planning, preparation, implementation, and reporting. Information system security audit. There are several conclusions drawn based on the discussion on the results of the analysis. The conclusions drawn from this study are 1) Based on the results obtained from this practical work course project, almost all HTTP and HTTPS protocol websites can be blocked using the filtering techniques available on MikroTik, 2) Using a VPN is almost impossible to block using MikroTik because the settings proxy to block VPN is very complicated, and 3) Mikrotik device is able to block almost all websites using Layer7 and mangle and can't turn off VPN traffic.
Downloads
Article Details
[2] Ceragioli, L., Degano, P. and Galletta, L., 2019. Checking the Expressivity of Firewall Languages. In The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy (pp. 86-100). Springer, Cham.
[3] Dewi, S., 2016. Konsep Perlindungan Hukum Atas Privasi Dan Data Pribadi Dikaitkan Dengan Penggunaan Cloud Computing Di Indonesia. Yustisia Jurnal Hukum, 5(1), pp.35-53.
[4] Dwiyatno, S., 2020. Analisis Monitoring Sistem Jaringan Komputer Menggunakan Software Nmap. PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer, 7(2), pp.108-115.
[5] Fathurrahmad, F. and Yusuf, S., 2019. Implementasi Jaringan VPN dengan Routing Protocol terhadap Jaringan Multiprotocol Label Switching (MPLS). Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi), 3(1), pp.29-33.
[6] Fathurrahmad, S.Y., Iqbal, T. and Salam, A., 2019. Virtual Private Network (VPN) Network Design For Multiprotocol Label Switching (MPLS) Networks. International Journal of Scientific and Technology Research, 8(11), pp.2653-2656.
[7] Haniza, N., 2019. Pengaruh Media Sosial terhadap Perkembangan Pola Pikir, Kepribadian dan Kesehatan Mental Manusia. J. Komun.
[8] Holik, F., Dolezel, P., Merta, J. and Stursa, D., 2020, September. Development of Artificial Intelligence Based Module to Industrial Network Protection System. In Proceedings of SAI Intelligent Systems Conference (pp. 229-240). Springer, Cham.
[9] Husni, N.L., Handayani, A.S. and Damsi, F., 2017, November. Pelatihan Penggunaan Internet secara Tepat dan Sehat Bagi Guru dan Siswa Di MTS Ar-Rahman Palembang Guna Meningkatkan Kreativitas serta Kesadaran Guru dan Siswa Mengenai Sisi Negatif Internet. In Annual Research Seminar (ARS) (Vol. 3, No. 1, pp. 127-132).
[10] Hwian, C., 2017. Mekanisme Penegakan Hukum Perkara Pidana Pornografi Melalui Internet. Veritas et Justitia, 3(1), pp.117-137.
[11] MikroTik ID. 2020. Blokir Website & File Extention Dengan Web Proxy. URL: http://MikroTik.co.id/artikel_lihat.php?id=123. Diakses tangga 21 Oktober 2020 (11:23).
[12] MikroTik ID. 2020. Implementasi Firewall Filter. URL: http://MikroTik.co.id/artikel_lihat.php?id=57. Diakses tangga 21 Oktober 2020 (10:19).
[13] Muklas, M., Supendar, H. and Sulistianto, S.W., 2020. Optimalisasi Sistem Keamanan Jaringan Komputer Menggunakan Metode Filtering Dan Manajemen Bandwith Pada PT. Intav Prima Solusindo. Tekinfo, 21(1), pp.104-111.
[14] Musyafak, N. and Handayani, M.R., 2018. Implementasi Peraturan Menteri Komunikasi Dan Informatika Nomor 19 Tahun 2014 Dalam Penanganan Situs Internet Bermuatan Negatif (Studi Kasus Pemblokiran terhadap Situs Radikal oleh Kemenkominfo Tahun 2015). Islamic Communication Journal, 2(1), pp.80-99.
[15] Muzakir, A. and Ulfa, M., 2019. Analisis Kinerja Packet Filtering Berbasis Mikrotik Routerboard Pada Sistem Keamanan Jaringan. Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 10(1), pp.15-20.
[16] Noviansyah, M. and Saiyar, H., 2020. Pemanfaatan Web Proxy Sebagai Pengoptimal Keamanan Jaringan Wireless Lan. Jurnal Khatulistiwa Informatika, 8(1).
[17] Pinariya, J.M. and Lemona, M., 2019. Literasi Internet Ramah Anak. Jurnal Abdi MOESTOPO, 2(02), pp.50-56.
[18] Purwanto, D.D. and Santoso, J., 2015. Multinomial Naïve Bayes Classifier untuk Menentukan Review Positif atau Negatif pelanggan Website Penjualan. In Seminar Nasional “Inovasi dalam Desain dan Teknologi”-IDeaTech 2015
[19] Rahardjo, B., 2005. Keamanan sistem informasi berbasis internet. Jakarta: PT INDOCISC.
[20] Sulaiman, O.K., 2016. Analisis Sistem Keamanan Jaringan Dengan Menggunakan Switch Port Security. Computer Engineering, Science and System Journal, 1(1), pp.9-14.
[21] Suroso, J.T., 2019. Permasalahan Penegakan Hukum Terhadap Situs Internet dengan Konten Negatif Melalui Pemblokiran Situs. Wacana Paramarta: Jurnal Ilmu Hukum, 18(1), pp.39-50.
[22] Suyanto, M., 2005. Pengantar Teknologi Informasi Untuk Bisnis. Penerbit Andi.
[23] Ulinnuha, M., 2013. Melindungi Anak dari Konten Negatif Internet: Studi terhadap Peramban Web Khusus Anak. Sawwa: Jurnal Studi Gender, 8(2), pp.341-360.
[24] Sarno, R., 2009. Audit Sistem Informasi & Teknologi Informasi. Surabaya: ITS Press.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.