Pengaturan hak akses melalui konfigurasi access control list dan secure shell pada jaringan komputer di PT. Broadband Multimedia, TBK = Managing access right with access control list and secure shell configuration on computer network at PT. Broadband Multimedia, TBK.

Prawira, Hendry (2006) Pengaturan hak akses melalui konfigurasi access control list dan secure shell pada jaringan komputer di PT. Broadband Multimedia, TBK = Managing access right with access control list and secure shell configuration on computer network at PT. Broadband Multimedia, TBK. Bachelor thesis, Universitas Pelita Harapan.

[thumbnail of Title]
Preview
Text (Title)
Cover.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (23kB) | Preview
[thumbnail of Abstract]
Preview
Text (Abstract)
Abstract.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (97kB) | Preview
[thumbnail of TOC]
Preview
Text (TOC)
TOC.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (722kB) | Preview
[thumbnail of Chapter 1]
Preview
Text (Chapter 1)
Chapter 1.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (74kB) | Preview
[thumbnail of Chapter 2] Text (Chapter 2)
Chapter 2.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (277kB)
[thumbnail of Chapter 3] Text (Chapter 3)
Chapter 3.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (274kB)
[thumbnail of Chapter 4] Text (Chapter 4)
Chapter 4.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (1MB)
[thumbnail of Chapter 5] Text (Chapter 5)
Chapter 5.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (51kB)
[thumbnail of Bibliography]
Preview
Text (Bibliography)
Bibliography.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (43kB) | Preview
[thumbnail of Appendices] Text (Appendices)
Appendices.pdf
Restricted to Repository staff only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (573kB)

Abstract

Most of companies have computer network that used to transfer data to fulfill the company need. To protect important information from unauthorized users, thus the network security system is required. In general, limiting the users’ access and protecting data communication in the computer network can be done by managing access right using Access Control List (ACL) and Secure Shell (SSH). There are two steps to manage access right and to protect data communication inside the network. Start with limiting the access from client to server and manageable switch as the communication gateway in the network. Finally, configure the SSH server and SSH client. As a result, only administrator and several users who have right to access the server and manageable switch and use the SSH connection to the server. So, server’s and other network devices’ configuration will safe. In addition, data communication between network devices also encrypted by SSH protocol to protect the important information.
Item Type: Thesis (Bachelor)
Creators:
Creators
NIM
Email
ORCID
Prawira, Hendry
NIM08320030004
UNSPECIFIED
UNSPECIFIED
Contributors:
Contribution
Contributors
NIDN/NIDK
Email
Thesis advisor
Halim, Fransiscus Ati
UNSPECIFIED
UNSPECIFIED
Additional Information: KP 83-03 PRA p ; T 44524
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7885-7895 Computer engineering. Computer hardware
Divisions: University Subject > Historic > Faculty/School > Computer System Engineering
Historic > Faculty/School > Computer System Engineering
Depositing User: Christine Natalia Nababan
Date Deposited: 27 Apr 2021 08:34
Last Modified: 03 Sep 2024 07:58
URI: http://repository.uph.edu/id/eprint/29237

Actions (login required)

View Item
View Item