Keamanan Informasi Research Papers - Academia.edu (original) (raw)

System security is an absolute requirement that must be considered by users, especially network administrators to protect data. Every time a system is maintained and monitored, an administrator requires remote access such as a secure... more

System security is an absolute requirement that must be considered by users, especially network administrators to protect data. Every time a system is maintained and monitored, an administrator requires remote access such as a secure shell (SSH) to enter the system with a secure channel. By default, SSH is not secure because there is a great chance that the account will be taken over by brute force techniques. The application of asymmetric cryptography on SSH accounts is considered safe than SSH remote login by default. However, this is still not enough because hackers could control the computer that is used by administrators to do remote servers. It also can be hacked with key scanning techniques. The combination of asymmetric cryptography and two-step authentication can be a solution so that the server will be very difficult to penetrate.

Keywords - Server Security, SSH, Asymmetric Cryptosystems, Two-Step Authentication.

Abstrak-Keamanan sistem menjadi syarat mutlak yang harus diperhatikan oleh pengguna, khususnya administrator jaringan guna melindungi data. Setiap melakukan pemeliharaan dan monitoring sistem, seorang administrator membutuhkan akses masuk dengan cara remote seperti secure shell (SSH) ke dalam sistem dengan saluran yang aman. Secara default, SSH tidak aman karena berpeluang besar akun diambil alih dengan teknik brute force. Penerapan kriptografi asimetris pada akun SSH dinilai aman daripada remote login SSH secara default. Akan tetapi hal tersebut masih belum cukup karena bisa saja peretas justru mengendalikan komputer yang digunakan oleh administrator dalam melakukan remote server. Selain itu juga dapat diretas dengan teknik key scanning. Kombinasi kriptografi asimetris dan autentikasi dua langkah dapat menjadi solusi sehingga server akan sangat susah ditembus. Kata Kunci-Keamanan Server, SSH, Kriptografi Asimetris, Autentikasi Dua Langkah.

Kata Kunci – Keamanan Server, SSH, Kriptografi Asimetris, Autentikasi Dua Langkah.

References
B. Sakti, A. Aziz dan A. Doewes, “Uji Kelayakan Implementasi SSH sebagai Pengaman FTP Server dengan Penetration Testing,” JURNAL ITSMART , vol. 2, no. 1, pp. 44-51, 2013.

D. J. Barrett, R. E. Silverman dan R. G. Byrnes, Ssh, The Secure Shell: The Definitive Guide Second Edition, O'Reilly, 2005.

M. Iqbal, “Keamanan Remote Server Melalui Ssh Dengan Kriptosistem Simetris,” TECHSI: Jurnal Penelitian Teknik Informatika , vol. 3, no. 2, pp. 54-66, 2013.

ssh.com, “Hackers are now scanning for SSH keys to exploit,” 20 June 2018. [Online]. Available: https://blog.ssh.com/ssh-key-scan-attack-honeypot. [Diakses 22 May 2020].

I. R. P. Jeinever, A. Rasyid dan N. Suharto, “Penerapan Sistem Keamanan Jaringan Menggunakan Random Port Knocking Berbasis Raspberry Pi Yang Dikirm Melewati Telegram,” Jurnal JARTEL, vol. 7, no. 2, pp. 99-105, 2018.

“OWASP Top Ten Web Application Security Risks,” OWASP Foundation, Inc., 2020. [Online]. Available: https://owasp.org/www-project-top-ten/. [Diakses 19 May 2020].

H. Jusuf, “Penggunaan Secure Shell (SSH) Sebagai Sistem Komunikasi Aman Pada Web Ujian Online,” BINA INSANI ICT JOURNAL, vol. 2, no. 2, pp. 75 - 84 , 2015.

M. Y. Simargolang, “Implementasi Kriptografi Rsa Dengan Php,” JURNAL TEKNOLOGI INFORMASI (JurTI), vol. 1, no. 1, pp. 1-10, 2017.

I. Wibowo , B. Susanto dan J. K. T, “Penerapan Algoritma Kriptografi Asimetris Rsa Untuk Keamanan Data Di Oracle,” JURNAL INFORMATIKA, vol. 5, no. 1, 2009.

D. Ariyus, Pengantar Ilmu Kriptografi, Yogyakarta: Andi, 2008.

D. M. Soete, Two-Factor Authentication, Springer US, 2011.

S. W. Raharjo, I. D. E.K.Ratri dan H. Susilo, “Implementasi Two Factor Authentication Dan Protokol Zero Knowledge Proof Pada Sistem Login,” Jurnal Teknik Informatika dan Sistem Informasi , vol. 3, no. 1, pp. 127-136, 2017.

Google, “Mengaktifkan Verifikasi 2 Langkah,” Google, 2020. [Online]. Available: https://support.google.com/accounts/answer/185839?co=GENIE.Platform%3DDesktop&hl=id. [Diakses 20 May 2020].

WhatsApp, “Menggunakan verifikasi dua langkah,” WhatsApp, 2020. [Online]. Available: https://faq.whatsapp.com/id/android/26000021/. [Diakses 20 May 2020].

Facebook, “Apa itu autentikasi dua faktor dan bagaimana cara kerjanya di Facebook?,” 2020. [Online]. Available: https://web.facebook.com/help/148233965247823?_rdc=1&_rdr. [Diakses 20 May 2020].

Twitter, “How to use two-factor authentication,” [Online]. Available: https://help.twitter.com/en/managing-your-account/two-factor-authentication. [Diakses 20 May 2020].

G. LLC, “Google Authenticator,” [Online]. Available: https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2&hl=en. [Diakses 20 May 2020].

Authy, “Authy | Two-Factor Authentication (2FA) App & Guides,” TWILIO, INC, [Online]. Available: https://authy.com/. [Diakses 20 May 2020].