Javascript must be enabled to continue!
Implementasi Sistem Keamanan WPA2-PSK pada Jaringan WiFi
View through CrossRef
Nowadays the use of WiFi network technology device has been widely developed around the world, both used for voice and data communications. WiFi networks utilize high frequencies to deliver and connect a communication, then the vulnerability to security is also higher than with other communication technologies. Various security measures can be done through communication devices used by users or by operators who provide communication services. However, with the user who utilizes WiFi network technology, it can provide little security hole that can be exploited by the attacker. Then the attacker can find out the WPA2-PSK security password when the user connects to the WiFi network. So the resulting password through several techniques and testing used. Among them by utilizing the user connected to the WiFi network, testing fake SSID and testing WPS PIN. However, in this study only conducted testing through a user connected to a WiFi network. This technique and testing is solely done to penetrate the security of WiFi network, which aims to know the password of WPA2-PSK on WiFi network and to add insight about WiFi network security
Title: Implementasi Sistem Keamanan WPA2-PSK pada Jaringan WiFi
Description:
Nowadays the use of WiFi network technology device has been widely developed around the world, both used for voice and data communications.
WiFi networks utilize high frequencies to deliver and connect a communication, then the vulnerability to security is also higher than with other communication technologies.
Various security measures can be done through communication devices used by users or by operators who provide communication services.
However, with the user who utilizes WiFi network technology, it can provide little security hole that can be exploited by the attacker.
Then the attacker can find out the WPA2-PSK security password when the user connects to the WiFi network.
So the resulting password through several techniques and testing used.
Among them by utilizing the user connected to the WiFi network, testing fake SSID and testing WPS PIN.
However, in this study only conducted testing through a user connected to a WiFi network.
This technique and testing is solely done to penetrate the security of WiFi network, which aims to know the password of WPA2-PSK on WiFi network and to add insight about WiFi network security.
Related Results
PSK DALAM FRAMING TIGA MONOLOG/PROSTITUTE ON THREE MONOLOGUES FRAMING
PSK DALAM FRAMING TIGA MONOLOG/PROSTITUTE ON THREE MONOLOGUES FRAMING
Abstrak Makalah berjudul “PSK dalam Framing Tiga Monolog” ditulis untuk membahas tokoh PSK dalam ketiga monolog yang bertemakan kehidupan PSK, yaitu Monolog Tanda Tanya (Anggi Eka ...
STUDI KASUS : INTERAKSI SOSIAL ANTAR PEKERJA SEKS KOMERSIAL (PSK)
STUDI KASUS : INTERAKSI SOSIAL ANTAR PEKERJA SEKS KOMERSIAL (PSK)
<p><em>Mereka cenderung beroperasi tengah malam dan memiliki kode-kode supaya tidak terjaring petugas keamanan dan PSK cenderung menyembunyikan identitas mereka sebagai...
Resource allocation and management techniques for network slicing in WiFi networks
Resource allocation and management techniques for network slicing in WiFi networks
Network slicing has recently been proposed as one of the main enablers for 5G networks; it is bound to cope with the increasing and heterogeneous performance requirements of these ...
Perancangan Sistem Keamanan Jaringan Nirkabel dengan WPA2 ENTERPRISE
Perancangan Sistem Keamanan Jaringan Nirkabel dengan WPA2 ENTERPRISE
Tingginya permintaan akan sistem keamanan jaringan nirkabel yang andal mendorong perlunya penerapan metode autentikasi yang lebih kuat dan adaptif. Penelitian ini bertujuan untuk m...
Penerapan Keamanan Berlapis pada Jaringan WLAN dengan WPA/WPA2-PSK dan Captive Portal menggunakan MikroTik
Penerapan Keamanan Berlapis pada Jaringan WLAN dengan WPA/WPA2-PSK dan Captive Portal menggunakan MikroTik
Pesatnya perkembangan teknologi informasi menuntut tersedianya jaringan WLAN yang andal dan aman, terutama di lingkungan pendidikan dan perkantoran. Penelitian ini bertujuan untuk ...
SISTEM AUTENTIFIKASI HOSTPOT MENGGUNAKAN LDAP SERVER
SISTEM AUTENTIFIKASI HOSTPOT MENGGUNAKAN LDAP SERVER
Jaman sekarang keamanan pada sistem jaringan komputer sudah sangat berkembang pesat, selain itu juga jaringan berbasis wireless sudah sering sekali kita temukan, jaringan tersebut ...
MINI TINJAUAN JARINGAN NIRKABEL
MINI TINJAUAN JARINGAN NIRKABEL
Saat ini perkembangan jaringan komputer sudah semakin pesat. Dilihat dari media penghubung diantara komputer satu dengan komputer yang lain sebelumnya masih menggunakan kabel, seka...
Open online course adaptif berbasis framework
Open online course adaptif berbasis framework
Keamanan jaringan komputer menjadi isu penting dalam beberapa dekade terakhir, pemerintah dan beberapa organisasi internasional telah menginvestasikan dalam bentuk pendidikan dan ...

