Strategi Penanggulangan Kelemahan Terhadap Ancaman Keamanan Pada Jaringan Wireless

Penulis

  • Fachrid Wadly Universitas Pembangunan Panca Budi
  • Rio Septian UniversitasPembangunan Panca Budi
  • Zuhri Ramadhan Universitas Pembangunan Panca Budi

DOI:

https://doi.org/10.61306/jnastek.v3i2.89

Kata Kunci:

wireless, wep, encryption

Abstrak

The use of wireless-based technology devices at this time is so much, good used for voice and data communications. Because wireless technology utilizes frequency high to deliver a communication, then the vulnerability to security is also higher compared to other communication technologies. Various security measures can be taken through communication devices used by users and by operators who provide services communication. Weaknesses of wireless networks in general can be divided into 2 types, namely weaknesses on the configuration and weakness on the type of encryption used. Broadly speaking, the gap on wireless network spans over four layers where the four layers actually are is the process of occurrence of data communication on wireless media. The four layers are layers physical layer, network layer, user layer, and application layer. The security handling models that occur in each layer of wireless technology can be done, among others, by: hide SSID, make use of WEP keys, WPA-PSK or WPA2-PSK, facility implementation, MAC filtering, installation of captive portal infrastructure.

Unduhan

Data unduhan belum tersedia.

Referensi

http://id.wikipedia.net

http://www.drizzle.com/aboba/IEEE/rc4_ksaproc.pdf

http://www.wikipedia.org

Jusua M.S., 2007, http://www.te.ugm.ac.id/~josh/seminar/hack ing-wifi-josh.pdf.

Network and Security Services, Generate Revenue Growth in 2002, Market Trends, ©2003 Gartner, Inc. and/or its Affiliates. All Rights Reserved.

Philipus Bayu MP, 2004, “Sistem Keamanan Bluetooth” ITB Bandung.

William Stalings, 1999, “Cryptography and Network Security :Principles and Practice”, 2nd Eddition, Prentice Hall, Inc.

Unduhan

Diterbitkan

30-04-2023

Cara Mengutip

Wadly, F., Septian, R., & Ramadhan, Z. (2023). Strategi Penanggulangan Kelemahan Terhadap Ancaman Keamanan Pada Jaringan Wireless. Jurnal Nasional Teknologi Komputer, 3(2), 59–67. https://doi.org/10.61306/jnastek.v3i2.89