Design network security infrastructure cabling using network development life cycle methodology and ISO/IEC 27000 series in Yayasan Kesehatan (Yakes) Telkom Bandung

Kartika Rianafirin, M. T. Kurniawan
{"title":"Design network security infrastructure cabling using network development life cycle methodology and ISO/IEC 27000 series in Yayasan Kesehatan (Yakes) Telkom Bandung","authors":"Kartika Rianafirin, M. T. Kurniawan","doi":"10.1109/CAIPT.2017.8320681","DOIUrl":null,"url":null,"abstract":"The development of Information Technology (IT) causing the increase of IT role in running the organization business activities. IT must provide optimal service for the organization business in terms of security when data transactions occur. Implementation of IT infrastructure security must be in accordance with the standards or best practices. In fact, the security management infrastructure of cable network existing at Yayasan Kesehatan (Yakes) Telkom Bandung is still not in accordance with the standards related to the implementation of wired infrastructure security as a network service. The design of security cable network infrastructure at Yakes Telkom in accordance to ISO / IEC 27000 series standard and using Network Development Life Cycle (NDLC) method. The NDLC method used is cyclical to support continuous development. The Security design of cable network infrastructure discussed is about the implementation of communication security technology, web protection optimization using proxy server, monitoring application optimization used by activating logging feature, and recommendation of port optimization on server. The results of test in this study produce the design of network security that is ideal for Yakes Telkom.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"305 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAIPT.2017.8320681","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

Abstract

The development of Information Technology (IT) causing the increase of IT role in running the organization business activities. IT must provide optimal service for the organization business in terms of security when data transactions occur. Implementation of IT infrastructure security must be in accordance with the standards or best practices. In fact, the security management infrastructure of cable network existing at Yayasan Kesehatan (Yakes) Telkom Bandung is still not in accordance with the standards related to the implementation of wired infrastructure security as a network service. The design of security cable network infrastructure at Yakes Telkom in accordance to ISO / IEC 27000 series standard and using Network Development Life Cycle (NDLC) method. The NDLC method used is cyclical to support continuous development. The Security design of cable network infrastructure discussed is about the implementation of communication security technology, web protection optimization using proxy server, monitoring application optimization used by activating logging feature, and recommendation of port optimization on server. The results of test in this study produce the design of network security that is ideal for Yakes Telkom.
使用Yayasan Kesehatan (Yakes) Telkom万隆的网络开发生命周期方法和ISO/IEC 27000系列设计网络安全基础设施布线
信息技术的发展使信息技术在组织业务活动中的作用日益增强。当数据事务发生时,IT必须在安全性方面为组织业务提供最佳服务。IT基础设施安全的实现必须符合标准或最佳实践。事实上,Yayasan Kesehatan (Yakes)电信万隆现有的有线网络安全管理基础设施仍不符合有线基础设施安全作为网络服务实施的相关标准。根据ISO / IEC 27000系列标准,采用网络开发生命周期(NDLC)方法,设计了Yakes电信的安全电缆网络基础设施。使用的NDLC方法是周期性的,以支持持续开发。讨论了有线网络基础设施的安全设计,包括通信安全技术的实现、使用代理服务器的web保护优化、激活日志功能的监控应用优化以及服务器端端口优化的推荐。本研究的测试结果为Yakes Telkom提供了理想的网络安全设计。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信