PENGAMANAN SERVER DENGAN METODE PORT KNOCKING DAN KEY AUTHENTICATION PADA LAYANAN SECURE SHELL (SSH)
Implementation of more security on the server to secure data from irresponsible people by using port knocking and key authentication methods in the secure shell (ssh) service. The port knocking method is an authentication method by entering a predetermined pattern. Key authentication method is an au...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
2021-07-07.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | repoupnvj_11182 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Tubagus Muhammad Fawwaz Rasyid, . |e author |
245 | 0 | 0 | |a PENGAMANAN SERVER DENGAN METODE PORT KNOCKING DAN KEY AUTHENTICATION PADA LAYANAN SECURE SHELL (SSH) |
260 | |c 2021-07-07. | ||
500 | |a http://repository.upnvj.ac.id/11182/1/ABSTRAK.pdf | ||
500 | |a http://repository.upnvj.ac.id/11182/2/AWAL.pdf | ||
500 | |a http://repository.upnvj.ac.id/11182/3/BAB%20I.pdf | ||
500 | |a http://repository.upnvj.ac.id/11182/4/BAB%20II.pdf | ||
500 | |a http://repository.upnvj.ac.id/11182/5/BAB%20III.pdf | ||
500 | |a http://repository.upnvj.ac.id/11182/6/BAB%20IV.pdf | ||
500 | |a http://repository.upnvj.ac.id/11182/7/BAB%20V.pdf | ||
500 | |a http://repository.upnvj.ac.id/11182/8/DAFTAR%20PUSTAKA.pdf | ||
500 | |a http://repository.upnvj.ac.id/11182/9/RIWAYAT%20HIDUP.pdf | ||
500 | |a http://repository.upnvj.ac.id/11182/12/LAMPIRAN.pdf | ||
500 | |a http://repository.upnvj.ac.id/11182/10/ARTIKEL%20KI.pdf | ||
520 | |a Implementation of more security on the server to secure data from irresponsible people by using port knocking and key authentication methods in the secure shell (ssh) service. The port knocking method is an authentication method by entering a predetermined pattern. Key authentication method is an authentication method using a public key and a private key. The results of testing server security without port knocking and key authentication methods with server security using port knocking and key authentication methods are different and server security using port knocking and key authentication methods cannot be hacked by sniffing and brute force methods. Server security is better using port knocking and key authentication methods than not using more security | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
690 | |a QA75 Electronic computers. Computer science | ||
690 | |a QA76 Computer software | ||
655 | 7 | |a Thesis |2 local | |
655 | 7 | |a NonPeerReviewed |2 local | |
787 | 0 | |n http://repository.upnvj.ac.id/11182/ | |
787 | 0 | |n https://repository.upnvj.ac.id | |
856 | 4 | 1 | |u http://repository.upnvj.ac.id/11182/ |z Link Metadata |