Data Security Analysis with Advanced Firewall Filtering at PT PUSRI
Data and network security analysis are essential for ensuring the integrity, confidentiality, and availability of organizational data. Among the various threats, sniffing attacks—where malicious actors intercept and monitor data transmitted over a network—pose a significant risk to data security....
| Main Authors: | Misinem, ., Muhammad Ari, Januarta, Tamsir, Aryadi, Ahmad, Qudri, Nurul Adha Oktarini, Saputri |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
INTI International University
2024
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/2022/ http://eprints.intimal.edu.my/2022/1/jods2024_41.pdf |
Similar Items
Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI
by: Misinem, ., et al.
Published: (2024)
by: Misinem, ., et al.
Published: (2024)
Analysis of Sentiment Based on Opinions from the 2019 Presidential Election
by: Nurul Adha Oktarini, Saputri, et al.
Published: (2024)
by: Nurul Adha Oktarini, Saputri, et al.
Published: (2024)
Network security tools-firewall / Ding Khoon Chong
by: Ding, Khoon Chong
Published: (2005)
by: Ding, Khoon Chong
Published: (2005)
Firewall Redundancy Rules Filtering Using Integrity Rules Checking
by: Zarina, Dzolkhifli, et al.
Published: (2018)
by: Zarina, Dzolkhifli, et al.
Published: (2018)
Design and Implementation of an XML Firewall
by: Loh, Yin-soon, et al.
Published: (2006)
by: Loh, Yin-soon, et al.
Published: (2006)
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
Data-Driven Augmented Reality for Scout Password Recognition in
Interactive Learning Environment
by: M. Soekarno, Putra, et al.
Published: (2024)
by: M. Soekarno, Putra, et al.
Published: (2024)
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)
by: Shakirah, Saidin, et al.
Published: (2018)
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
by: A., Fairuzullah, et al.
by: A., Fairuzullah, et al.
Web application firewall / Mohd Ikram Rahimi
by: Rahimi, Mohd Ikram
Published: (2006)
by: Rahimi, Mohd Ikram
Published: (2006)
Analysis of WLAN Network Quality Improvement at Bank Mandiri Palembang Sudirman Area using Per Connection Queue Method
by: Misinem, ., et al.
Published: (2023)
by: Misinem, ., et al.
Published: (2023)
An advanced and secure framework for conducting online examination using blockchain method
by: Sattar, Md Rahat Ibne, et al.
Published: (2023)
by: Sattar, Md Rahat Ibne, et al.
Published: (2023)
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
Data-Driven Analysis of Computer-Based Testing to Advance Machinist Performance
by: Irwansyah, ., et al.
Published: (2024)
by: Irwansyah, ., et al.
Published: (2024)
Advanced online battery states coestimation using Kalman filter for electric vehicle Applications / Prashant Shrivastava
by: Prashant , Shrivastava
Published: (2021)
by: Prashant , Shrivastava
Published: (2021)
Firewalls offer stronger defences
Published: (2008)
Published: (2008)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
Image filtering
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Data filtering of 5-axis inertial measurement unit using kalman filter
by: Nur Syazwani, Samsudin
Published: (2013)
by: Nur Syazwani, Samsudin
Published: (2013)
Machinery fault diagnosis using advanced correlation filters
by: Loo, C. K., et al.
Published: (2007)
by: Loo, C. K., et al.
Published: (2007)
Machinery fault diagnosis using advanced correlation filters
by: Loo, C. K., et al.
Published: (2007)
by: Loo, C. K., et al.
Published: (2007)
Analysis of New Student Admission Application for Bina Warga High School in Palembang
by: Helda, Yudiastuti, et al.
Published: (2024)
by: Helda, Yudiastuti, et al.
Published: (2024)
Scalable Text Filtering System
by: Foong, Oi Mean, et al.
Published: (2006)
by: Foong, Oi Mean, et al.
Published: (2006)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Analysis of Wireless Network Quality Using Quality of Service Method (Case Study: BAPEDA of South of Sumatera Province)
by: Misinem, ., et al.
Published: (2023)
by: Misinem, ., et al.
Published: (2023)
Analyzing the Web-Based Library Information System at SMKN 1 Talang Ubi
by: Marlindawati, ., et al.
Published: (2024)
by: Marlindawati, ., et al.
Published: (2024)
Analyzing and Enhancing Data Management for the E-Library Transaction System
by: Marlindawati, ., et al.
Published: (2024)
by: Marlindawati, ., et al.
Published: (2024)
Parameter-Less Simulated Kalman Filter
by: Nor Hidayati, Abdul Aziz, et al.
Published: (2017)
by: Nor Hidayati, Abdul Aziz, et al.
Published: (2017)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Big data security
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Security of present s-box
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Network security setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Security of multimedia in the web
by: Zeki, Akram M.
Published: (2011)
by: Zeki, Akram M.
Published: (2011)
Harnessing ANN for a secure environment
by: Ling, Mee Hong *, et al.
Published: (2010)
by: Ling, Mee Hong *, et al.
Published: (2010)
Hybrid Filter for Attributes Reduction in Soft Set
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2015)
by: Mohammed, Mohammed Adam Taheir, et al.
Published: (2015)
Collaborative Filtering Recommender System: Overview and Challenges
by: Al-Bashiri, Hael, et al.
Published: (2017)
by: Al-Bashiri, Hael, et al.
Published: (2017)
On the security of golden cryptosystems
by: Tahghighi, Muhammad, et al.
Published: (2012)
by: Tahghighi, Muhammad, et al.
Published: (2012)
Similar Items
-
Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI
by: Misinem, ., et al.
Published: (2024) -
Analysis of Sentiment Based on Opinions from the 2019 Presidential Election
by: Nurul Adha Oktarini, Saputri, et al.
Published: (2024) -
Network security tools-firewall / Ding Khoon Chong
by: Ding, Khoon Chong
Published: (2005) -
Firewall Redundancy Rules Filtering Using Integrity Rules Checking
by: Zarina, Dzolkhifli, et al.
Published: (2018) -
Design and Implementation of an XML Firewall
by: Loh, Yin-soon, et al.
Published: (2006)