Implementasi IP-Tables Firewall pada Linux sebagai Sistem Keamanan Jaringan yang Handal

Qurrotul Aini, Victor Amrizal

Abstract


Effloresce computer network technology considerably quick, even with its attending internet which technically doesn't be stymied by distance and time, so communication process and data interchange
can be done squashy. It cans be big problem if not handled aright, since with being exploited its security hole, therefore user that don't deserve to get squashy do crimes in world cyber that recognized with the title Cyber Crime, as sniffing, spoofing, Attack's pack and another one gets Category as criminological as deep world virtual, about the
problem on firewall's implemented analysis as one computer network security system. Analysis process is done through steps which systematic and there is three parameter that become base in gleans from which is port in a state stealth, close and open. From analysis result that gets to be pulled a conclusion by applying IP-Tables as firewall can secure computer network system.


Keywords: Cyber crime, sniffing, spoofing, Dos Attack, Stealth, PORT, IP-tables and Firewall.


Full Text:

PDF


DOI: https://doi.org/10.15408/sijsi.v3i1.3009 Abstract - 0 PDF - 0

Refbacks

  • There are currently no refbacks.