Service Deployment and Device Configuration Network Access Control for Security Customer Network of PT Datacomm Diangraha

Penulis

  • Tareich Lazuardi Mufti Telkom University
  • Henry Rossi Andrian Telkom University
  • Lisda Meisaroh Telkom University

Abstrak

Network security has become a major concern
for organizations in this digital era, where
cyber threats are increasingly complex and diverse.
Network Access Control (NAC) implementation is a
strategic step to improve network security
network security in an organization. The main objective of
NAC implementation is to ensure that
only devices that meet the requirements and standards
security standards that can access the customer's internal network,
to prevent unauthorized access that could threaten the
integrity, confidentiality, and availability of data in the network.
network. In addition, the implementation of NAC also aims to
control and monitor the condition of users who access the company's internal network.
accessing the company's internal network. The results of
implementation and testing are expected to
make a significant contribution in improving
security and stability of the customer's internal network.

Keywords- Network Access Control (NAC), Policy,
Network Security

Referensi

Hafid Muhammad(1), Firjatullah Favian Zhuhri

(2), and Pamungkaz Billyco Windy (3),

Tantangan Menghadapi Kejahatan Cyber dalam

Kehidupan Bermasyarakat dan Bernegara,=

JurnalPendidikan Tambusai. Accessed: Feb. 18,

[Online]. Available:

https://www.jptam.org/index.php/jptam/article/vie

w/7858/6459

A. Lakbabi, G. Orhanou, and S. El Hajji,

Access Control Technology4Proposition to

Contain New Security Challenges,= International

Journal of Communications, Network and System

Sciences, vol. 05, no. 08, pp. 5053512, 2012, doi:

4236/ijcns.2012.58061.

Jul. 02, 2024. [Online]. Available:

https://www.cisco.com/c/en/us/products/security/

what-is-network-access-control-nac.html

Fortinet,

(NAC)? =.

Wahyu Pratama Rifky,

RMENGGUNAKANRADIUSSERVERDANAC

TIVEDIRECTORY,= ressearchgate, 2019.

##submission.downloads##

Diterbitkan

2024-10-21 — Diperbaharui pada 2024-11-15

Versi

Terbitan

Bagian

Program Studi D3 Teknik Komputer