使用MAC地址和方法访问控制列表的访问限制

Muhammad Aditya Rabbani Adit, Martanto Martanto, Yudhistira Arie Wijaya
{"title":"使用MAC地址和方法访问控制列表的访问限制","authors":"Muhammad Aditya Rabbani Adit, Martanto Martanto, Yudhistira Arie Wijaya","doi":"10.14421/jiska.2022.7.3.143-162","DOIUrl":null,"url":null,"abstract":"The Cangehgar Cyber Command Center of the 14th Arhanud/ PWY Battalion from Cirebon City is one of the offices with IT equipment to assist the job. The servers, like the office PCs, are connected via the local network. Due to the risk of leaking secret data from within, network security concerns must be handled so that unauthorized users cannot mistakenly access the server. It seeks to limit access when there are administrative customers and employees in each room by utilizing the access control list approach using a MAC address. Access to the server is restricted to the administrator's computer, while access to the employee's PC is disallowed. Then the questionnaire was distributed to find out the respondent's assessment of the access control list. According to the results of the study on security indicators, access control lists containing MAC addresses are useful in limiting access to server computers.","PeriodicalId":34216,"journal":{"name":"JISKA Jurnal Informatika Sunan Kalijaga","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Pembatasan Akses Menggunakan MAC Address dengan Metode Access Control List\",\"authors\":\"Muhammad Aditya Rabbani Adit, Martanto Martanto, Yudhistira Arie Wijaya\",\"doi\":\"10.14421/jiska.2022.7.3.143-162\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Cangehgar Cyber Command Center of the 14th Arhanud/ PWY Battalion from Cirebon City is one of the offices with IT equipment to assist the job. The servers, like the office PCs, are connected via the local network. Due to the risk of leaking secret data from within, network security concerns must be handled so that unauthorized users cannot mistakenly access the server. It seeks to limit access when there are administrative customers and employees in each room by utilizing the access control list approach using a MAC address. Access to the server is restricted to the administrator's computer, while access to the employee's PC is disallowed. Then the questionnaire was distributed to find out the respondent's assessment of the access control list. According to the results of the study on security indicators, access control lists containing MAC addresses are useful in limiting access to server computers.\",\"PeriodicalId\":34216,\"journal\":{\"name\":\"JISKA Jurnal Informatika Sunan Kalijaga\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"JISKA Jurnal Informatika Sunan Kalijaga\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14421/jiska.2022.7.3.143-162\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"JISKA Jurnal Informatika Sunan Kalijaga","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14421/jiska.2022.7.3.143-162","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

来自锡雷本市的第14 Arhanud/ PWY营的昌格加尔网络指挥中心是拥有IT设备协助这项工作的办公室之一。服务器与办公pc一样,通过本地网络连接。由于存在从内部泄漏机密数据的风险,因此必须处理网络安全问题,以便未经授权的用户不会错误地访问服务器。当每个房间都有管理客户和员工时,它试图通过使用MAC地址使用访问控制列表方法来限制访问。访问服务器仅限于管理员的计算机,而不允许访问员工的PC。然后发放问卷,了解被调查者对访问控制列表的评价。根据安全指标的研究结果,包含MAC地址的访问控制列表在限制访问服务器计算机方面很有用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Pembatasan Akses Menggunakan MAC Address dengan Metode Access Control List
The Cangehgar Cyber Command Center of the 14th Arhanud/ PWY Battalion from Cirebon City is one of the offices with IT equipment to assist the job. The servers, like the office PCs, are connected via the local network. Due to the risk of leaking secret data from within, network security concerns must be handled so that unauthorized users cannot mistakenly access the server. It seeks to limit access when there are administrative customers and employees in each room by utilizing the access control list approach using a MAC address. Access to the server is restricted to the administrator's computer, while access to the employee's PC is disallowed. Then the questionnaire was distributed to find out the respondent's assessment of the access control list. According to the results of the study on security indicators, access control lists containing MAC addresses are useful in limiting access to server computers.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
21
审稿时长
12 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信