{"title":"云服务器中的安全管理实现","authors":"Awang Andhyka, Fawaidul Badri","doi":"10.25139/INFORM.V3I2.1050","DOIUrl":null,"url":null,"abstract":"The need of servers is currently growing rapidly. Every company or school needs a server to store electronic data properly. As for email and Information Systems with cloud servers, it is expected to be accessible to users from anywhere. But in building a server there are several security problems that often occured, such as the server being hacked, and causing the data to be lost. From these problems, a study was made to produce a discussion of security management in a cloud server with a minimum cost that can be applied to a company or campus or another. In scanning security on the cloud server, Android authentication can be used. Each root user will log in to the cloud server, then Android authentication will send a data. Apart from android authentication, security can use firewall ip tables in the cloud server and added with SSL (Secure Socket Layer), in every data from, and, to the encrypted server. ","PeriodicalId":52760,"journal":{"name":"Inform Jurnal Ilmiah Bidang Teknologi Informasi dan Komunikasi","volume":"164 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2018-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security Management Implementation in Cloud Server\",\"authors\":\"Awang Andhyka, Fawaidul Badri\",\"doi\":\"10.25139/INFORM.V3I2.1050\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The need of servers is currently growing rapidly. Every company or school needs a server to store electronic data properly. As for email and Information Systems with cloud servers, it is expected to be accessible to users from anywhere. But in building a server there are several security problems that often occured, such as the server being hacked, and causing the data to be lost. From these problems, a study was made to produce a discussion of security management in a cloud server with a minimum cost that can be applied to a company or campus or another. In scanning security on the cloud server, Android authentication can be used. Each root user will log in to the cloud server, then Android authentication will send a data. Apart from android authentication, security can use firewall ip tables in the cloud server and added with SSL (Secure Socket Layer), in every data from, and, to the encrypted server. \",\"PeriodicalId\":52760,\"journal\":{\"name\":\"Inform Jurnal Ilmiah Bidang Teknologi Informasi dan Komunikasi\",\"volume\":\"164 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Inform Jurnal Ilmiah Bidang Teknologi Informasi dan Komunikasi\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.25139/INFORM.V3I2.1050\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Inform Jurnal Ilmiah Bidang Teknologi Informasi dan Komunikasi","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.25139/INFORM.V3I2.1050","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Management Implementation in Cloud Server
The need of servers is currently growing rapidly. Every company or school needs a server to store electronic data properly. As for email and Information Systems with cloud servers, it is expected to be accessible to users from anywhere. But in building a server there are several security problems that often occured, such as the server being hacked, and causing the data to be lost. From these problems, a study was made to produce a discussion of security management in a cloud server with a minimum cost that can be applied to a company or campus or another. In scanning security on the cloud server, Android authentication can be used. Each root user will log in to the cloud server, then Android authentication will send a data. Apart from android authentication, security can use firewall ip tables in the cloud server and added with SSL (Secure Socket Layer), in every data from, and, to the encrypted server.