Kerentanan yang Dapat Terjadi di Jaringan Komputer pada Umumnya
DOI:
https://doi.org/10.21512/comtech.v3i1.2446Keywords:
computer network, vurnerability, physical security, non physical securityAbstract
The rapid development of computer technology allows ease of access, yet lurking threats. Security in computer networks are categorized into two, namely the physical and non physical security. Physical security is a security that is more likely to focus to all things physical. This type of security can be avoided by more careful guarding of the thieves’ threats by putting in locked places and so on. As with the non-physical security, the more important issue involved is such as data security where its physical value may be less important. Therefore, this article discussed the safety factor especially on a computer network, vulnerable points on the computer network, techniques often used on attacks and some things you can do to ward off them.Plum Analytics
References
Kelompok 123P IKI-83408T MTI UI. 2005. Keamanan Jaringan Komputer.
Malekzadeh, M., Abdul Ghani, A. A., & Subramaniam, S. (2010). Design of cyberwar laboratory exercises to implement common security attacks against IEEE 802.11 Wireless Networks. Journal of Computer Systems, Networks, and Communications, 2010.
Supriyanto, Aji. (2006), Analisis kelemahan keamanan pada jaringan wireless. Jurnal Teknologi Informasi DINAMIK 9 (1), 38-46.
Van Basten, Marco. (2009). Optimalisasi Firewall pada jaringan skala luas. Jurnal Jaringan Komputer. Fakultas Ilmu Komputer, Universitas Sriwijaya, Palembang.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License - Share Alike that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
USER RIGHTS
All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows: