使用MAC地址和方法访问控制列表的访问限制

Muhammad Aditya Rabbani Adit, Martanto Martanto, Yudhistira Arie Wijaya
{"title":"使用MAC地址和方法访问控制列表的访问限制","authors":"Muhammad Aditya Rabbani Adit, Martanto Martanto, Yudhistira Arie Wijaya","doi":"10.14421/jiska.2022.7.3.143-162","DOIUrl":null,"url":null,"abstract":"The Cangehgar Cyber Command Center of the 14th Arhanud/ PWY Battalion from Cirebon City is one of the offices with IT equipment to assist the job. The servers, like the office PCs, are connected via the local network. Due to the risk of leaking secret data from within, network security concerns must be handled so that unauthorized users cannot mistakenly access the server. It seeks to limit access when there are administrative customers and employees in each room by utilizing the access control list approach using a MAC address. Access to the server is restricted to the administrator's computer, while access to the employee's PC is disallowed. Then the questionnaire was distributed to find out the respondent's assessment of the access control list. According to the results of the study on security indicators, access control lists containing MAC addresses are useful in limiting access to server computers.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Pembatasan Akses Menggunakan MAC Address dengan Metode Access Control List\",\"authors\":\"Muhammad Aditya Rabbani Adit, Martanto Martanto, Yudhistira Arie Wijaya\",\"doi\":\"10.14421/jiska.2022.7.3.143-162\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Cangehgar Cyber Command Center of the 14th Arhanud/ PWY Battalion from Cirebon City is one of the offices with IT equipment to assist the job. The servers, like the office PCs, are connected via the local network. Due to the risk of leaking secret data from within, network security concerns must be handled so that unauthorized users cannot mistakenly access the server. It seeks to limit access when there are administrative customers and employees in each room by utilizing the access control list approach using a MAC address. Access to the server is restricted to the administrator's computer, while access to the employee's PC is disallowed. Then the questionnaire was distributed to find out the respondent's assessment of the access control list. According to the results of the study on security indicators, access control lists containing MAC addresses are useful in limiting access to server computers.\",\"PeriodicalId\":34216,\"journal\":{\"name\":\"JISKA Jurnal Informatika Sunan Kalijaga\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"JISKA Jurnal Informatika Sunan Kalijaga\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14421/jiska.2022.7.3.143-162\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"JISKA Jurnal Informatika Sunan Kalijaga","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14421/jiska.2022.7.3.143-162","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

来自锡雷本市的第14 Arhanud/ PWY营的昌格加尔网络指挥中心是拥有IT设备协助这项工作的办公室之一。服务器与办公pc一样,通过本地网络连接。由于存在从内部泄漏机密数据的风险,因此必须处理网络安全问题,以便未经授权的用户不会错误地访问服务器。当每个房间都有管理客户和员工时,它试图通过使用MAC地址使用访问控制列表方法来限制访问。访问服务器仅限于管理员的计算机,而不允许访问员工的PC。然后发放问卷,了解被调查者对访问控制列表的评价。根据安全指标的研究结果,包含MAC地址的访问控制列表在限制访问服务器计算机方面很有用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Pembatasan Akses Menggunakan MAC Address dengan Metode Access Control List
The Cangehgar Cyber Command Center of the 14th Arhanud/ PWY Battalion from Cirebon City is one of the offices with IT equipment to assist the job. The servers, like the office PCs, are connected via the local network. Due to the risk of leaking secret data from within, network security concerns must be handled so that unauthorized users cannot mistakenly access the server. It seeks to limit access when there are administrative customers and employees in each room by utilizing the access control list approach using a MAC address. Access to the server is restricted to the administrator's computer, while access to the employee's PC is disallowed. Then the questionnaire was distributed to find out the respondent's assessment of the access control list. According to the results of the study on security indicators, access control lists containing MAC addresses are useful in limiting access to server computers.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
21
审稿时长
12 weeks
期刊最新文献
Pemodelan Proses Bisnis Kuliah Online MOOCs menggunakan BPMN (Studi Kasus alison.com) Analisis Bibliometrik Publikasi Isu Kebocoran Data Menggunakan VOSviewer Klasifikasi Sentimen Masyarakat Terhadap Proses Pemindahan Ibu Kota Negara (IKN) Indonesia pada Media Sosial Twitter Menggunakan Metode Naïve Bayes Klasifikasi Tingkat Kerusakan Sektor Pasca Bencana Alam Menggunakan Metode MULTIMOORA Berbasis Web Pembuatan Ergonomic Mechanical Keyboard untuk Mengurangi Cidera Tangan Menggunakan Teknologi Arduino
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1