Strategi Penanggulangan Kelemahan Terhadap Ancaman Keamanan Pada Jaringan Wireless

  • Wadly F
  • Septian R
  • Ramadhan Z
N/ACitations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

The use of wireless-based technology devices at this time is so much, good used for voice and data communications. Because wireless technology utilizes frequency high to deliver a communication, then the vulnerability to security is also higher compared to other communication technologies. Various security measures can be taken through communication devices used by users and by operators who provide services communication. Weaknesses of wireless networks in general can be divided into 2 types, namely weaknesses on the configuration and weakness on the type of encryption used. Broadly speaking, the gap on wireless network spans over four layers where the four layers actually are is the process of occurrence of data communication on wireless media. The four layers are layers physical layer, network layer, user layer, and application layer. The security handling models that occur in each layer of wireless technology can be done, among others, by: hide SSID, make use of WEP keys, WPA-PSK or WPA2-PSK, facility implementation, MAC filtering, installation of captive portal infrastructure.

Cite

CITATION STYLE

APA

Wadly, F., Septian, R., & Ramadhan, Z. (2023). Strategi Penanggulangan Kelemahan Terhadap Ancaman Keamanan Pada Jaringan Wireless. Jurnal Nasional Teknologi Komputer, 3(2), 59–67. https://doi.org/10.61306/jnastek.v3i2.89

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free