PERANCANGAN VPN SEBAGAI PENDUKUNG SISTEM INFORMASI KEPEGAWAIAN PADA KANTOR KEMENTERIAN KESEHATAN RI
DOI:
https://doi.org/10.31000/jika.v6i2.6201Abstract
Perkembangan teknologi komputer berlangsung semakin cepat, canggih dan berkemampuan tinggi. Seiring dengan perkembangan teknologi di Kementerian Kesehatan membangun jaringan komputer untuk mempermudah melakukan kegiatan operasional antar kantor daerah, seperti melakukan transaksi data dan hal lainnya melalui jalur publik, yaitu salah satunya melalui email. Data informasi tidak aman berada di jaringan publik karena dapat disadap oleh pihak yang tidak berkepentingan. Oleh karena itu membangun jaringan VPN (Virtual Private Network), maka Kementerian Kesehatan dapat menjalankan kegiatan operasional secara private di dalam jaringan publik, dengan koneksi yang ekonomis dan keamanan data yang terjamin. Dengan Virtual Private Network (VPN), Jaringan yang Penulis usulkan hanya membahkan Virtual Private Network (VPN) dengan metode Point to Point Tunnel Protocol (PPTP) untuk dapat mengakses jaringan kantor pusat dan kantor daerah Kementerian Kesehatan dengan membuat jalur yang aman dan rahasia dari jaringan public. Kementerian Kesehatan dapat meningkatkan produktivitas dan kinerjanya, Selain itu memiliki kemampuan untuk dapat meningkatkan daya saingnya yang lebih baik untuk saat ini maupun yang akan datangReferences
Ardianto, F., & Akbar, T. (2017). PERANCANGAN SISTEM MONITORING KEAMANAN JARINGAN JARAK JAUH MENGGUNAKAN MIKROTIK OPERATIONAL SYSTEM MELALUI VIRTUAL PRIVATE NETWORK. Jurnal Surya Energy, 2(1), 135–139. Retrieved from https://jurnal.um-palembang.ac.id/senergi/article/view/777/811
Basri, H., Mulyani, A., & Budihartanti, C. (2017). PERANCANGAN JARINGAN WIDE AREA NETWORK PADA PT . VIZTA PRATAMA CABANG JAKARTA. Jurnal PROSISKO, 4(2), 38–43. Retrieved from https://e-jurnal.lppmunsera.org/index.php/PROSISKO/article/view/390/421
Burhanuddin, & Badrul, M. (2014). PENERAPAN METODE OPEN VPN-ACCESS SERVER SEBAGAI RANCANGAN JARINGAN WIDE AREA NETWORK PADA PT . VALDO INTERNATIONAL Kata Kunci : Jaringan , Virtual Private network , PPTP. Jurnal Techno Nusa Mandiri, XI(2), 96–104. Retrieved from https://ejournal.nusamandiri.ac.id/index.php/techno/article/view/502/442
Dewi, S., & Sulistiyah. (2022). ANALISA VIRTUAL PRIVATE NETWORK ( VPN ) IP MULTI PROTOCOL LABEL SWITCHING ( MPLS ) UNTUK JARINGAN WIDE AREA NETWORK ( WAN ). JISAMAR (Journal of Information System, Applied, Management, Accounting and Research), 6(1), 16–25. https://doi.org/10.52362/jisamar.v6i1.662
Febrianti, R., Sidik, Susafa’ati, Nainggolan, E. R., & Radiyah, U. (2021). Implementasi VPN Berbasis Point To Point Tunneling Protocol ( PPTP ) Menggunakan Mikrotik Router Board. Jurnal Infortech, 3(1), 46–51. Retrieved from https://ejournal.bsi.ac.id/ejurnal/index.php/infortech/article/view/10400/4889
Khasanah, S. N., & Utami, L. A. (2018). Implementasi Failover Pada Jaringan WAN Berbasis VPN. Jurnal Teknik Informatika STMIK Antar Bangsa, IV(1), 62–66. Retrieved from https://ejournal.antarbangsa.ac.id/jti/article/view/190/pdf
Majid, A. (2021). Manajemen Jaringan menggunakan Remote Authentication Dial-In User Service ( RADIUS ). Journal of System and Computer Engineering, 1(2), 20–32. Retrieved from http://journal.unpacti.ac.id/index.php/JSCE/article/view/140
Mufida, E., Irawan, D., & Chrisnawati, G. (2017). REMOTE SITE MIKROTIK VPN DENGAN POINT TO POINT TUNNELING PROTOCOL ( PPTP ) STUDI KASUS PADA YAYASAN TERATAI GLOBAL JAKARTA. Jurnal Matrik, 16(2), 9–19. Retrieved from https://journal.universitasbumigora.ac.id/index.php/matrik/article/view/7/7
Munandar, A., & Badrul, M. (2015). PENERAPAN OPEN VPN IPCOP SEBAGAI SOLUSI PERMASALAHAN JARINGAN PADA PT . KIMIA. Jurnal Teknik Komputer AMIK BSI, 1(1), 30–41. Retrieved from https://ejournal.bsi.ac.id/ejurnal/index.php/jtk/article/viewFile/233/199
Patih, D. F. J., Fitriawan, H., & Yuniati, Y. (2012). Analisa Perancangan Server Voip ( Voice Internet Protocol ) Dengan Opensource Asterisk Dan VPN ( Virtual Private Network ) Sebagai Pengaman Jaringan Antar Client. Jurnal Informatika Dan Teknik Elektro Terapan, 1(1), 42–48. Retrieved from http://journal.eng.unila.ac.id/index.php/jitet/article/view/23/7
Putra, J. L., Indriyani, L., & Anggraini, Y. (2018). Penerapan Sistem Keamanan Jaringan Menggunakan VPN Dengan Metode PPTP Pada PT. Asri Pancawarna. IJCIT (Indonesian Journal on Computer and Information Technology), 3(2), 260–267. Retrieved from https://ejournal.bsi.ac.id/ejurnal/index.php/ijcit/article/view/4677
Sari, A. P., Sulistiyono, & Kemala, N. (2020). PERANCANGAN JARINGAN VIRTUAL PRIVATE NETWORK BERBASIS IP SECURITY MENGGUNAKAN ROUTER MIKROTIK. Jurnal PROSISKO, 7(2), 150–164. Retrieved from https://e-jurnal.lppmunsera.org/index.php/PROSISKO/article/view/2523/1463
Sujadi, H., & Burhanuddin, A. (2017). RANCANG BANGUN KEAMANAN DATA JARINGAN KOMPUTER DENGAN MENGGUNAKAN METODE IPSEC VPN (STUDI KASUS: PT.AGRABUDI KOMUNIKA). Infotech Journal, 3(2), 10–15. Retrieved from http://library.palcomtech.com/pdf/6632.pdf
Supriyanto, B. (2019). Perancangan Jaringan VPN Menggunakan Metode Point To Point Tunneling Protocol. Jurnal Teknik Komputer AMIK BSI, 5(2). https://doi.org/10.31294/jtk.v4i2
Downloads
Published
Issue
Section
License
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- That it is not under consideration for publication elsewhere,
- That its publication has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with International Journal of Advances in Intelligent Informatics agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.Â
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Licensing for Data Publication
International Journal of Advances in Intelligent Informatics use a variety of waivers and licenses, that are specifically designed for and appropriate for the treatment of data:
Open Data Commons Attribution License, http://www.opendatacommons.org/licenses/by/1.0/ (default)
Creative Commons CC-Zero Waiver, http://creativecommons.org/publicdomain/zero/1.0/
Open Data Commons Public Domain Dedication and Licence, http://www.opendatacommons.org/licenses/pddl/1-0/
Other data publishing licenses may be allowed as exceptions (subject to approval by the editor on a case-by-case basis) and should be justified with a written statement from the author, which will be published with the article.
Open Data and Software Publishing and Sharing
The journal strives to maximize the replicability of the research published in it. Authors are thus required to share all data, code or protocols underlying the research reported in their articles. Exceptions are permitted but have to be justified in a written public statement accompanying the article.
Datasets and software should be deposited and permanently archived inappropriate, trusted, general, or domain-specific repositories (please consult http://service.re3data.org and/or software repositories such as GitHub, GitLab, Bioinformatics.org, or equivalent). The associated persistent identifiers (e.g. DOI, or others) of the dataset(s) must be included in the data or software resources section of the article. Reference(s) to datasets and software should also be included in the reference list of the article with DOIs (where available). Where no domain-specific data repository exists, authors should deposit their datasets in a general repository such as ZENODO, Dryad, Dataverse, or others.
Small data may also be published as data files or packages supplementary to a research article, however, the authors should prefer in all cases a deposition in data repositories.