Design network security infrastructure cabling using network development life cycle methodology and ISO/IEC 27000 series in Yayasan Kesehatan (Yakes) Telkom Bandung

Kartika Rianafirin, M. T. Kurniawan
{"title":"Design network security infrastructure cabling using network development life cycle methodology and ISO/IEC 27000 series in Yayasan Kesehatan (Yakes) Telkom Bandung","authors":"Kartika Rianafirin, M. T. Kurniawan","doi":"10.1109/CAIPT.2017.8320681","DOIUrl":null,"url":null,"abstract":"The development of Information Technology (IT) causing the increase of IT role in running the organization business activities. IT must provide optimal service for the organization business in terms of security when data transactions occur. Implementation of IT infrastructure security must be in accordance with the standards or best practices. In fact, the security management infrastructure of cable network existing at Yayasan Kesehatan (Yakes) Telkom Bandung is still not in accordance with the standards related to the implementation of wired infrastructure security as a network service. The design of security cable network infrastructure at Yakes Telkom in accordance to ISO / IEC 27000 series standard and using Network Development Life Cycle (NDLC) method. The NDLC method used is cyclical to support continuous development. The Security design of cable network infrastructure discussed is about the implementation of communication security technology, web protection optimization using proxy server, monitoring application optimization used by activating logging feature, and recommendation of port optimization on server. The results of test in this study produce the design of network security that is ideal for Yakes Telkom.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"305 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAIPT.2017.8320681","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

The development of Information Technology (IT) causing the increase of IT role in running the organization business activities. IT must provide optimal service for the organization business in terms of security when data transactions occur. Implementation of IT infrastructure security must be in accordance with the standards or best practices. In fact, the security management infrastructure of cable network existing at Yayasan Kesehatan (Yakes) Telkom Bandung is still not in accordance with the standards related to the implementation of wired infrastructure security as a network service. The design of security cable network infrastructure at Yakes Telkom in accordance to ISO / IEC 27000 series standard and using Network Development Life Cycle (NDLC) method. The NDLC method used is cyclical to support continuous development. The Security design of cable network infrastructure discussed is about the implementation of communication security technology, web protection optimization using proxy server, monitoring application optimization used by activating logging feature, and recommendation of port optimization on server. The results of test in this study produce the design of network security that is ideal for Yakes Telkom.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用Yayasan Kesehatan (Yakes) Telkom万隆的网络开发生命周期方法和ISO/IEC 27000系列设计网络安全基础设施布线
信息技术的发展使信息技术在组织业务活动中的作用日益增强。当数据事务发生时,IT必须在安全性方面为组织业务提供最佳服务。IT基础设施安全的实现必须符合标准或最佳实践。事实上,Yayasan Kesehatan (Yakes)电信万隆现有的有线网络安全管理基础设施仍不符合有线基础设施安全作为网络服务实施的相关标准。根据ISO / IEC 27000系列标准,采用网络开发生命周期(NDLC)方法,设计了Yakes电信的安全电缆网络基础设施。使用的NDLC方法是周期性的,以支持持续开发。讨论了有线网络基础设施的安全设计,包括通信安全技术的实现、使用代理服务器的web保护优化、激活日志功能的监控应用优化以及服务器端端口优化的推荐。本研究的测试结果为Yakes Telkom提供了理想的网络安全设计。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Implementation of real-time static hand gesture recognition using artificial neural network Application of baby's nutrition status using Macromedia Flash Analysis of radio based train control system using LTE-R and analysis of security requirements: The security of the radio based train control system A study on the effective interaction method to improve the presence in social virtual reality game Expert system to optimize the best goat selection using topsis: Decision support system
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1