Optimalisasi Keamanan Jaringan Di Era Digital menggunakan metode Zero Trust

Authors

  • Haeruddin Haeruddin Universitas Internasional Batam
  • Stefanus Eko Prasetyo Universitas Internasional Batam
  • Ari Wahyuni Kaharuddin

DOI:

https://doi.org/10.37253/joint.v5i3.9986

Keywords:

MFA, networking, security, VPN, zero trust, zerotier

Abstract

In the digital era, computer networks serve as a crucial foundation for various aspects of life, including business and education. Network security, encompassing data confidentiality, integrity, and availability, is a critical factor in protecting against cyber threats. Universitas Internasional Batam (UIB) faces challenges such as intrusion and hacking, necessitating additional security measures. To address these challenges, the implementation of Zero Trust Network Access (ZTNA) supported by Virtual Private Network (VPN) and Multi-Factor Authentication (MFA) has become a highly relevant strategy. ZTNA ensures that every request for network access is evaluated individually, without assuming trust in any entity, thereby enhancing the necessary security layers. This study employs the Network Development Life Cycle (NDLC) method to design and develop a ZTNA network at UIB using the ZeroTier platform. The process includes network and security requirements analysis, ZTNA architecture design, implementation across various devices, and MFA integration with Google Authenticator. Monitoring and Quality of Service (QoS) testing using iPerf were also conducted to ensure the system's effectiveness. The research findings demonstrate that ZeroTier effectively facilitates direct communication with high-quality service, while the enhanced security provided by MFA makes it a reliable and secure solution for the exchange of sensitive data in the dynamic and complex environment of the university.

Downloads

Download data is not yet available.

References

N. A. Santoso, K. B. Affandi, and R. D. Kurniawan, “Implementasi Keamanan Jaringan Menggunakan Port Knocking,” Jurnal Janitra Informatika dan Sistem Informasi, vol. 2, no. 2, pp. 90–95, Oct. 2022, doi: 10.25008/janitra.v2i2.156.

F. Novianto, “Evaluasi keamanan informasi E-Government menggunakan model defense in depth,” Cyber Security dan Forensik Digital, vol. 3, no. 1, pp. 14–19, 2020.

V. T. Aditya, “Manajemen Ancaman dan Keamanan Jaringan melalui Penggunaan Firewall dengan Mikrotik pada PT Dinamika Mediakom,” 2023. [Online]. Available: dspace.uii.ac.id/123456789/48937

S. Wani, M. Imthiyas, H. Almohamedh, K. M. Alhamed, S. Almotairi, and Y. Gulzar, “Distributed denial of service (Ddos) mitigation using blockchain—a comprehensive insight,” Feb. 01, 2021, MDPI AG. doi: 10.3390/sym13020227.

W. Qiang, L. Yang, and H. Jin, “Efficient and Robust Malware Detection Based on Control Flow Traces Using Deep Neural Networks,” Comput Secur, vol. 122, p. 102871, Nov. 2022, doi: 10.1016/j.cose.2022.102871.

K. S. Robbani and A. H. Reksoprodjo, “Perlindungan infrastruktur informasi kritikal nasional sektor ketenagalistrikan dari ancaman siber critical national information infrastructure protection on electricity sector from cyber threats,” 2020. doi: https://doi.org/10.33172/pa.v6i1.531.

Y. Mulyanto and A. Algi Fari, “Analisis keamanan login router mikrotik dari serangan bruteforce menggunakan metode penetration testing (Studi Kasus: SMK Negeri 2 Sumbawa),” Jurnal Informatika, Teknologi dan Sains, vol. 4, no. 3, pp. 145–155, Aug. 2022, doi: 10.51401/jinteks.v4i3.1897.

W. Yustika, N. Tusa, diah Siregar, V. Aprinilova Barus, M. Abiyyu Alwansyah Hasibuan, and J. Manajemen, “SURPLUS : JURNAL EKONOMI DAN BISNIS Peranan Sistem Database Di Dalam Sistem Informasi Manajemen Pada UINSU (Universitas Islam Negeri Sumatera Utara),” SURPLUS : JURNAL EKONOMIDANBISNIS, vol. 1, no. 2, pp. 188–196, 2023.

A. Wylde, “Zero trust: Never trust, always verify,” in 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), IEEE, Jun. 2021, pp. 1–4. doi: 10.1109/CyberSA52016.2021.9478244.

D. D’Silva and D. D. Ambawade, “Building A Zero Trust Architecture Using Kubernetes,” in 2021 6th International Conference for Convergence in Technology, I2CT 2021, Institute of Electrical and Electronics Engineers Inc., Apr. 2021. doi: 10.1109/I2CT51068.2021.9418203.

L. Miller and T. George, Zero Trust Privilege For Dummies, Special Edition. Hoboken: John Wiley & Sons, Inc, 2019.

T. Yacob, “Säkra känslig data i molnet: En ny era av säkerhet med Zero Trust principer Securing Sensitive Data in the Cloud: A New Era of Security Through Zero Trust Principles,” 2023.

F. Hadinata, S. E. Prasetyo, and H. Haeruddin, “Analisa Penggunaan Jaringan ZeroTier di Masa Pandemi Covid-2019,” Jurnal Ilmu Komputer dan Bisnis, vol. 13, no. 1, pp. 85–93, May 2022, doi: 10.47927/jikb.v13i1.276.

J. Piispanen, “Evaluation report on integration demonstration Document Identification Dissemination Level PU Lead Participant JAMK Lead Author Contributing Beneficiaries Related Deliverables,” 2019.

M. Taifur and I. Akhand, “Development of a Multilevel Authentication System for Data Center Administration,” 2019.

T. Paavo, “Zero Trust-arkkitehtuuri Opinnäytetyö Tieto-ja viestintätekniikka 2020,” 2020.

H. Haeruddin, G. Wijaya, and H. Khatimah, “Sistem keamanan work from anywhere menggunakan VPN generasi lanjut,” JITU : Journal Informatic Technology And Communication, vol. 7, no. 2, pp. 102–113, Nov. 2023, doi: 10.36596/jitu.v7i2.1086.

M. Sadar and W. Syafitri, “Guntoro, Evaluasi Performance Jaringan Internet Kampus Menggunakan Quality Of Service (QoS) EVALUASI PERFORMANCE JARINGAN INTERNET KAMPUS MENGGUNAKAN QUALITY OF SERVICE (QOS),” SEMASTER: Seminar Nasional Teknologi Informasi & Ilmu Komputer, vol. 1, no. 1, pp. 280–290, 2020, doi: https://doi.org/10.31849/semaster.v1i1.6139.

G. Barovih, S. Surahmat, and F. Febrianty, “Analysis of Network Attached Storage Performance with NFS Protocol in Integrated Business Start-Up,” Sinkron, vol. 8, no. 3, pp. 1299–1306, Jul. 2023, doi: 10.33395/sinkron.v8i3.12417.

Downloads

Published

2024-12-12