Optimasi Keamanan Pada Jaringan Multi-Endpoint Access Menggunakan Network Access Control Berbasis Cisco ISE
Abstract
Full Text:
PDFReferences
Arta, Y., Syukur, A., & Kharisma, R. (2018). Simulasi Implementasi Intrusion Prevention System (IPS) Pada Router Mikrotik. IT Journal Research and Development, 3(1), 104. https://doi.org/10.25299/itjrd.2018.vol3(1).1346
Dali, F. (2017). Sistem Keamanan Jaringan Menggunakan Cisco AnyConnect Dengan Metode Network Access Manager. Jurnal Ilmu Teknik Dan Komputer, Vol.X(No. X), 1–7.
Darmadi, E. A. (2018). Perancangan Sistem Otentikasi Radius Pada Pengguna Jaringan Wireless. Jurnal IKRA-ITH Informatika, 2(3), 9–16.
Fortinet. (2018). The Evolution of Network Access Control (NAC): How IoT and BYOD Devices Have Changed NAC Solutions (White Paper). www.fortinet.com
Janoff, C., & McGlothin, B. (2016). Cisco Compliance Solution for PCI DSS 2.0 Design Guide Summary (3rd Editio). Cisco.
Ma’sum, M. S., Irwansyah, M. A., & Priyanto, H. (2017). Analisis Perbandingan Sistem Keamanan Jaringan Menggunakan Snort dan Netfilter. Jurnal Sistem Dan Teknologi Informasi (JUSTIN), 5(1), 56–60.
Miller, L. C. (2014). Cybersecurity For Dummies, Palo Alto Networks Edition (R. Mengle (ed.); Palo Alto). John Wiley & Sons, Inc.
Nugroho, F. E., Daniarti, Y., & Rosidin. (2021). Rancang Bangun QOS (Quality of Service) Jaringan Wireless Local Network Menggunakan Metode NDLC (Network Development Life Cycle) di PT Trimitra Kolaborasi Mandiri (3KOM). Jurnal Informatika (JIKA), 5(1), 79–83.
Ouaddah, A., Mousannif, H., Elkalam, A. A., & Ouahman, A. A. (2017). Access control in the Internet of Things: Big challenges and New Opportunities. Computer Networks, 112(November 2016), 237–262. https://doi.org/10.1016/j.comnet.2016.11.007
Pawar, M. V., & Anuradha, J. (2015). Network Security and Types of Attacks in Network. International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015), 503–506.
Rasner, B. G. (2015). Cisco IT and the Identity Services Engine (White Paper) (Issue 02/15). https://www.cisco.com/c/dam/en/us/products/collateral/security/identity-services-engine/cisco-it-and-ise.pdf
Roldán-Molina, G., Almache-Cueva, M., Silva-Rabadão, C., Yevseyeva, I., & Basto-Fernandes, V. (2017). A Comparison of Cybersecurity Risk Analysis Tools. Procedia Computer Science, 121, 568–575. https://doi.org/10.1016/j.procs.2017.11.075
Roopesh, M., Reethika, G., Srinath, B. V, & Sarumathi, A. (2017). Network Access Control. International Journal on Computer Science and Engineering (IJCSE), 9(05), 1–3.
Taufik, A. M. (2014). Pembangunan Network Access Control Untuk Autentikasi dan Security dengan Menggunakan 802 .1X Authentication. Jurnal Ilmiah Komputer Dan Informatika (KOMPUTA), 1, 1–7.
Widyatmoko, D., & Salamah, U. (2016). Implementasi Freeradius Berbasis Lightweight Directory Access Protocol Pada Management Infrastruktur Jaringan Internet Service Provider. Jurnal Format, 6(2), 119–135.
Woland, A. T., & Redmon, K. (2015). CCNP Security SISAS 300-208 Official Cert Guide.
DOI: http://dx.doi.org/10.31000/jika.v5i3.4811
Article Metrics
Abstract - 652 PDF - 585Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
CURRENT INDEXING