431,922 research outputs found

    Implementasi Protokol Keamanan Dan Segmentasi Jaringan Dalam Project Pembangunan WLAN Untuk PT Pan Pacific Insurance

    Get PDF
    Security of data and network devices is essential in the development of a computer network, either in the creation of new computer networks or in the development of existing computer networks. PT. Pan Pacific Insurance as a company that holds large amounts of data along with its supporting computer network's infrastructure, focuses on security aspects in addition to performance aspects in its computer network. To get the flexibility of its computer network, the company developed a wireless local area network (WLAN) in line with the relocation of its head office. The Existing company's network needs to be improved with a WLAN network, so it does not only improve employee performance and provides the best security for company data. For those purposes, the authors applied the use of Cisco Wireless LAN Controller (WLC), Cisco Access Point and applied the WPA+WPA2 PSK security protocol for the SSID used by employees. Using this protocol when employees want to connect to the network wireless, they will be forced to type the password that has been set. In addition to implementing the security protocol, the author also applies the Web Policy Authentication security protocol for the SSID used by guests. So that guests who want to connect to a wireless network will be directed to a web browser to be asked to enter a username and password first. A series of security protocols, also added with network segmentation on each SSID to use a different network address. Thus, the essence of network security and performance is expected to increase. From the results of the tests carried out, obtained security guarantees on the PT. Pan Pacific Insurance successfully directs every user connected to the network as part of the security protocol implemented. Furthermore, with network segmentation, user traffic is more controlled because guests get their network segmentation, so they don't interfere with network traffic for users or company staff in company operations

    Software for Wearable Devices: Challenges and Opportunities

    Full text link
    Wearable devices are a new form of mobile computer system that provides exclusive and user-personalized services. Wearable devices bring new issues and challenges to computer science and technology. This paper summarizes the development process and the categories of wearable devices. In addition, we present new key issues arising in aspects of wearable devices, including operating systems, database management system, network communication protocol, application development platform, privacy and security, energy consumption, human-computer interaction, software engineering, and big data.Comment: 6 pages, 1 figure, for Compsac 201

    Wireless Lan Network Security Method Wep (Wired Equivalent Privacy)

    Full text link
    Scientific writing is about the WEP configuration on the WLAN network with RC4 encryption. The problem that arises is related aspects network security threats, strategic security and confidentiality of data in the network computer, the definition of encryption, definition kriptography algorithm, and algorithm functions

    Application of Artificial Intelligence in Computer Network Technology in the Context of Big Data

    Get PDF
    In the process of computer network technology development in the new era, in order to improve the security and reliability of computer network operation, it is necessary to conform to the development trend of big data technology, start flexibly from the following aspects, and give full play to the application value of artificial intelligence technology, such as intelligent cloud computing, intelligent routing algorithm, load balancing application, network topology optimization, network anomaly detection, intelligent data caching, intelligent network management, etc. This paper analyzes and discusses the application of artificial intelligence technology in computer network technology under the background of big data

    The Practice Research of Artificial Intelligence in Computer Network Technology in the New Era

    Get PDF
    This paper summarizes the practical application and development trend of artificial intelligence technology in the field of computer network. Artificial intelligence has been widely used in network communication, management and security, and other aspects, to achieve the network independent optimization, fault self-healing, threat identification and other intelligent capabilities. Artificial intelligence is a key technology to promote the evolution of the next generation network to the direction of adaptive, intelligence and security. The use of artificial intelligence also faces challenges such as algorithm deviations and regulatory constraints. Collaborative innovation algorithms and systems and the establishment of legal ethics systems are needed to promote the healthy development of AI and the progress of computer networks

    Safety System for Local Area Network System Using Network Operations Novell Netware V3.12 on Global Solusindo Computer

    Full text link
    With a network security system implemented at Global Solusindo Computer, the security of files and data stored on the server more secure from the ravages of use by the user, besides other positive impacts that supports teaching and learning activities so that the user poses a bias network using time available in an effective and efficient.Use a file or data contained on the server depending on the rights granted by the supervisor to the user. By granting rights to the directories related applications provided with teaching materials other than the security aspects of the user data and files in a server network

    Analysis of Computer Network Information Security and Protection Strategy

    Get PDF
    Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this

    Cyber attack simulation and information fusion process refinement optimization models for cyber security

    Get PDF
    Cyber crime is an increasingly prominent threat to all aspects of society including businesses, government, banks, transportation, and individuals. The security of computer networks is dependent on the ability to recognize and defend against malicious cyber attacks. The goal of this thesis is to utilize operation research techniques to create tools that will significantly contribute to cyber security. A simulation framework and template is developed to efficiently represent computer networks and cyber security intrusion detection systems. The simulation is capable of generating complex cyber attacks based on the computer network configuration and the capabilities of the attacker. The simulation results in alert messages corresponding to attack actions and ordinary network behavior which are typically used by situational awareness tools or systems administrators to identify and take action against the attack. Through verification, validation, and an experimental performance evaluation, the simulation model is shown to be an effective tool to enable testing of situational awareness tools and for determining network vulnerabilities. In addition, this thesis extends the highly effective information fusion methods of situational awareness and threat assessment by introducing a method of adaptive process refinement for cyber security. The adaptive process refinement model utilizes integer programming optimization to improve the success of cyber attack detection, tracking, and identification. The process refinement model is designed to dynamically provide recommendations for optimal allocation of network detection resources subject to processing capacity, current attack activity, and network vulnerabilities. The cyber attack simulation methodology is utilized to create a set of attack scenarios on computer networks that are used conduct an experimental performance evaluation of the adaptive process refinement model to determine its capabilities and limitations. The simulation and process refinement methods provide operations research tools that will help to advance the field of cyber security
    • …
    corecore