Sidharta, David Oktario (2010) Studi pengaman jaringan menggunakan secure socket layer, transport layer security, virtual private network point to point tunneling protocol, dan virt = Security investigation of networks using secure socket layer, transport layer security, virtual private network point to point protocol, and virtual private network layer two tunneling protocol. Bachelor thesis, Universitas Pelita Harapan.
Preview
Cover.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (68kB) | Preview
Preview
Abstract.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (43kB) | Preview
Preview
TOC.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (235kB) | Preview
![Chapter 1 [thumbnail of Chapter 1]](http://repository.uph.edu/style/images/fileicons/text.png)
Chapter 1.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (55kB)
![Chapter 2 [thumbnail of Chapter 2]](http://repository.uph.edu/style/images/fileicons/text.png)
Chapter 2.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (293kB)
![Chapter 3 [thumbnail of Chapter 3]](http://repository.uph.edu/style/images/fileicons/text.png)
Chapter 3.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (2MB)
![Chapter 4 [thumbnail of Chapter 4]](http://repository.uph.edu/style/images/fileicons/text.png)
Chapter 4.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (1MB)
![Chapter 5 [thumbnail of Chapter 5]](http://repository.uph.edu/style/images/fileicons/text.png)
Chapter 5.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (41kB)
Preview
Bibliography.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (35kB) | Preview
![Appendices [thumbnail of Appendices]](http://repository.uph.edu/style/images/fileicons/text.png)
Appendices.pdf
Restricted to Repository staff only
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (1MB)
Abstract
The use of TCP/IP as the main protocol in computer networking has not considered about data security aspect from sender to receiver. The use of firewall and encrypt technology still can not give good security aspect to computer networking communication. This research is investigates various security methods to a communication of web server and web client simulator. The security methods that had already been implemented are Secure Socket Layer, Transport Layer Security, Virtual Private Network Point to Point Protocol, and Virtual Private Network Layer Two Tunneling Protocol. Testing had been done using one main attacking process which is Man-In-TheMiddle attack using ARP Poisoning in different types of networking to see whether the web server can be hacked by the hacker and to see the responds of the communication of the server and the client. These tests resulted that Secure Socket Layer and Transport Layer Security can be hacked and Virtual Private Network Point to Point Protocol, and Virtual Private Network Layer Two Tunneling Protocol can not be hacked both in LAN and WAN types of networking. The best security method among the others is Virtual Private Network Layer Two Tunneling Protocol.
Item Type: | Thesis (Bachelor) |
---|---|
Creators: | Creators NIM Email ORCID Sidharta, David Oktario NIM08320060011 UNSPECIFIED UNSPECIFIED |
Contributors: | Contribution Contributors NIDN/NIDK Email Thesis advisor Yugopuspito, Pujianto NIDN0324086701 yugopuspito@uph.edu Thesis advisor Halim, Fransiscus Ati UNSPECIFIED UNSPECIFIED |
Additional Information: | SK 83-06 SID s ; T 76879 |
Subjects: | T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7885-7895 Computer engineering. Computer hardware |
Divisions: | University Subject > Historic > Faculty/School > Computer System Engineering Historic > Faculty/School > Computer System Engineering |
Depositing User: | Christine Natalia Nababan |
Date Deposited: | 27 Apr 2021 08:38 |
Last Modified: | 05 Nov 2024 07:09 |
URI: | http://repository.uph.edu/id/eprint/29690 |