Implementing DMZ in Improving Network Security of Web Testing in STMIK AKBA

The aims of this research are to design and to implement network security system in internal web testing using DeMilitarized Zone Method and Microtic Router on Siakad server of STMIK AKBA. Data analysis techniques that possible to use is descriptive method. The significances of the study are 1) to avoid the attack of cracker who intend to access the system without permissions and 2) to improve network securityon web testing services on Siakad server of STMIK AKBA. The data are obtained by having literature review and observation. Literature review assists the researchers to collect the theory on DeMilitarised Zone Method and the previous studies which were used as comparison to the recent study. Obervation was carried out directly to the field to observe the running system. Based on the results and discussion, it is shown that the aplication of DeMilitarized Zone Method on microtic can secure the web testing on Siakad server of STMIK AKBA and can maintain the whole series of online services that are available in the server.

[1]  Hamed Vahdat-Nejad,et al.  A New Approach to Quantify Network Security by Ranking of Security Metrics and Considering Their Relationships , 2018, Int. J. Netw. Secur..

[2]  Lokman Akbay TRANSITION TO MULTIDIMENSIONAL AND COGNITIVE DIAGNOSIS ADAPTIVE TESTING : AN OVERVIEW OF CAT , 2017 .

[3]  Boukari Souley,et al.  A Captcha - Based Intrusion Detection Model , 2018 .

[4]  Rozilawati Razali,et al.  An Empirical Study of Information Security Management Success Factors , 2016 .

[5]  Tianli Li Design and Implementation of Computer Network Vulnerability Assessment System , 2017, 2017 International Conference on Computer Systems, Electronics and Control (ICCSEC).

[6]  Mudassir Khan,et al.  COMPUTER SECURITY IN THE HUMAN LIFE , 2017 .

[7]  Al-Furat Al-Awsat Performance Analysis of Big Data Intrusion Detection System over Random Forest Algorithm , 2018 .

[8]  Punam Shriram Wankhede Security Attacks and Challenges of Wireless Sensor Network , 2019 .

[9]  Shikun Zhou,et al.  Evaluation the Performance of DMZ , 2018 .

[10]  Dahlan Abdullah,et al.  Lecturers’ Understanding on Indexing Databases of SINTA, DOAJ, Google Scholar, SCOPUS, and Web of Science: A Study of Indonesians , 2018 .

[11]  R. Umarani,et al.  The Design and Implementation of On-Line Examination Using Firewall security , 2014 .

[12]  Jingsha He,et al.  Multi-objective Optimization for Computer Security and Privacy , 2017, Int. J. Netw. Secur..

[13]  Mansyur,et al.  Detecting Differential Item Functioning and Differential Test Functioning on Math School Final-exam , 2016 .

[14]  Sourabh Shrimali DeMilitarized Zone: Network Architecture for Information Security , 2017 .

[15]  nbspAastha Puri,et al.  A NOVEL TECHNIQUE FOR INTRUSION DETECTION SYSTEM FOR NETWORK SECURITY USING HYBRID SVM-CART , 2017 .

[16]  Akbar Iskandar The Effect of Open Book Test Model in Improving Students' Learning Motivation , 2017 .