Studi pengaman jaringan menggunakan secure socket layer, transport layer security, virtual private network point to point tunneling protocol, dan virt = Security investigation of networks using secure socket layer, transport layer security, virtual private network point to point protocol, and virtual private network layer two tunneling protocol

Sidharta, David Oktario (2010) Studi pengaman jaringan menggunakan secure socket layer, transport layer security, virtual private network point to point tunneling protocol, dan virt = Security investigation of networks using secure socket layer, transport layer security, virtual private network point to point protocol, and virtual private network layer two tunneling protocol. Bachelor thesis, Universitas Pelita Harapan.

[thumbnail of Title]
Preview
Text (Title)
Cover.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (68kB) | Preview
[thumbnail of Abstract]
Preview
Text (Abstract)
Abstract.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (43kB) | Preview
[thumbnail of TOC]
Preview
Text (TOC)
TOC.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (235kB) | Preview
[thumbnail of Chapter 1] Text (Chapter 1)
Chapter 1.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (55kB)
[thumbnail of Chapter 2] Text (Chapter 2)
Chapter 2.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (293kB)
[thumbnail of Chapter 3] Text (Chapter 3)
Chapter 3.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (2MB)
[thumbnail of Chapter 4] Text (Chapter 4)
Chapter 4.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (1MB)
[thumbnail of Chapter 5] Text (Chapter 5)
Chapter 5.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (41kB)
[thumbnail of Bibliography]
Preview
Text (Bibliography)
Bibliography.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (35kB) | Preview
[thumbnail of Appendices] Text (Appendices)
Appendices.pdf
Restricted to Repository staff only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (1MB)

Abstract

The use of TCP/IP as the main protocol in computer networking has not considered about data security aspect from sender to receiver. The use of firewall and encrypt technology still can not give good security aspect to computer networking communication. This research is investigates various security methods to a communication of web server and web client simulator. The security methods that had already been implemented are Secure Socket Layer, Transport Layer Security, Virtual Private Network Point to Point Protocol, and Virtual Private Network Layer Two Tunneling Protocol. Testing had been done using one main attacking process which is Man-In-TheMiddle attack using ARP Poisoning in different types of networking to see whether the web server can be hacked by the hacker and to see the responds of the communication of the server and the client. These tests resulted that Secure Socket Layer and Transport Layer Security can be hacked and Virtual Private Network Point to Point Protocol, and Virtual Private Network Layer Two Tunneling Protocol can not be hacked both in LAN and WAN types of networking. The best security method among the others is Virtual Private Network Layer Two Tunneling Protocol.
Item Type: Thesis (Bachelor)
Creators:
Creators
NIM
Email
ORCID
Sidharta, David Oktario
NIM08320060011
UNSPECIFIED
UNSPECIFIED
Contributors:
Contribution
Contributors
NIDN/NIDK
Email
Thesis advisor
Yugopuspito, Pujianto
NIDN0324086701
yugopuspito@uph.edu
Thesis advisor
Halim, Fransiscus Ati
UNSPECIFIED
UNSPECIFIED
Additional Information: SK 83-06 SID s ; T 76879
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7885-7895 Computer engineering. Computer hardware
Divisions: University Subject > Historic > Faculty/School > Computer System Engineering
Historic > Faculty/School > Computer System Engineering
Depositing User: Christine Natalia Nababan
Date Deposited: 27 Apr 2021 08:38
Last Modified: 05 Nov 2024 07:09
URI: http://repository.uph.edu/id/eprint/29690

Actions (login required)

View Item
View Item