Design network security infrastructure cabling using network development life cycle methodology and ISO/IEC 27000 series in Yayasan Kesehatan (Yakes) Telkom Bandung
{"title":"Design network security infrastructure cabling using network development life cycle methodology and ISO/IEC 27000 series in Yayasan Kesehatan (Yakes) Telkom Bandung","authors":"Kartika Rianafirin, M. T. Kurniawan","doi":"10.1109/CAIPT.2017.8320681","DOIUrl":null,"url":null,"abstract":"The development of Information Technology (IT) causing the increase of IT role in running the organization business activities. IT must provide optimal service for the organization business in terms of security when data transactions occur. Implementation of IT infrastructure security must be in accordance with the standards or best practices. In fact, the security management infrastructure of cable network existing at Yayasan Kesehatan (Yakes) Telkom Bandung is still not in accordance with the standards related to the implementation of wired infrastructure security as a network service. The design of security cable network infrastructure at Yakes Telkom in accordance to ISO / IEC 27000 series standard and using Network Development Life Cycle (NDLC) method. The NDLC method used is cyclical to support continuous development. The Security design of cable network infrastructure discussed is about the implementation of communication security technology, web protection optimization using proxy server, monitoring application optimization used by activating logging feature, and recommendation of port optimization on server. The results of test in this study produce the design of network security that is ideal for Yakes Telkom.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"305 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAIPT.2017.8320681","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
The development of Information Technology (IT) causing the increase of IT role in running the organization business activities. IT must provide optimal service for the organization business in terms of security when data transactions occur. Implementation of IT infrastructure security must be in accordance with the standards or best practices. In fact, the security management infrastructure of cable network existing at Yayasan Kesehatan (Yakes) Telkom Bandung is still not in accordance with the standards related to the implementation of wired infrastructure security as a network service. The design of security cable network infrastructure at Yakes Telkom in accordance to ISO / IEC 27000 series standard and using Network Development Life Cycle (NDLC) method. The NDLC method used is cyclical to support continuous development. The Security design of cable network infrastructure discussed is about the implementation of communication security technology, web protection optimization using proxy server, monitoring application optimization used by activating logging feature, and recommendation of port optimization on server. The results of test in this study produce the design of network security that is ideal for Yakes Telkom.