Analysis of the effectiveness of VPN and PPTP Protocol in E-Link Health Report Application Using NDLC Method
DOI:
https://doi.org/10.51519/journalisi.v6i2.746Keywords:
VPN, PPTP Protocol, Network Developmen lifecycleAbstract
The rapid development of computer networks and data communications has significantly impacted all government sectors in Indonesia. The Madiun Regency Health Service relies on a web-based health reporting application, E-link Health Report, to manage health information data from community health centers. However, this application is vulnerable to cyber-attacks, necessitating enhanced security measures. To address this issue, the health service implemented a Virtual Private Network (VPN) using the Point-to-Point Tunneling Protocol (PPTP) to bolster system security. The aim of this research is to analyze the effectiveness of the implemented VPN with PPTP protocol in enhancing network reliability and data transmission security. The Network Development Lifecycle (NDLC) method was employed to conduct this analysis, focusing on parameters such as network reliability and the ability to secure data transmission against cyber threats. The results demonstrate a significant improvement in both network reliability and data transmission security following the implementation of the VPN with PPTP protocol. This study provides a comprehensive comparison of network performance before and after the implementation, highlighting the effectiveness of VPNs in securing web-based health reporting applications.
Downloads
References
B. A. Gumelar, G. D. S. Putra, and D. N. Amadi, “Mikrotik VPN Shielding E-Link Health Reports: Strengthening Data Security at Madiun Health Office,” J. Inf. Syst. Informatics, vol. 5, no. 3, pp. 1194–1203, 2023, doi: 10.51519/journalisi.v5i3.524.
P. Arora, P. R. Vemuganti, and P. Allani, “Comparison of VPN Protocols – IPSec , PPTP , and L2TP,” vol. ECE 646, no. Fall (2021), pp. 1–45, 2021.
A. Amarudin and S. D. Riskiono, “Analisis Dan Desain Jalur Transmisi Jaringan Alternatif Menggunakan Virtual Private Network (Vpn),” J. Teknoinfo, vol. 13, no. 2, p. 100, 2019, doi: 10.33365/jti.v13i2.309.
A. Averian, A. Budiono, and U. Y. K. S. Hediyanto, “Analisis dan Pengoptimalisasi Jaringan Wireless Local Area Network (WLAN) Pada PT.XYZ Dengan Menggunakan Metode Network Development Life Cycle (NDLC),” eProceedings Eng., vol. 10, no. 2, pp. 1325–1330, 2023.
I. Ubaedila, O. Nurdiawan, Y. A. Wijaya, and J. Sidik, “Layanan Jaringan Menggunakan Metode Sniffing Berbasis Wireshark,” INFORMATICS Educ. Prof. J. Informatics, vol. 6, no. 1, p. 95, 2022, doi: 10.51211/itbi.v6i1.1697.
S. Ikhwan and A. Amalina, “Analisis Jaringan VPN Menggunakan PPTP dan L2TP,” J. Infotel, vol. 9, no. 3, 2017, doi: 10.20895/infotel.v9i3.274.
A. Kurniawan, “Analisis Performansi Remote Acces VPN Menggunakan PPTP dan L2TP Untuk Kebutuhan Work From Home (WFH) bagi Karyawan PT Dunia Makmur Jaya,” J. Pendidik. Tambusai, vol. 7, no. 2, pp. 7378–7389, 2023.
R. F. Syarif and I. A. Sobari, “Implementasi Virtual Private Network (VPN) menggunakan Metode PPTP pada PT. Sinar Quality Internusa,” J. Pendidik. Tambusai, vol. 6, no. 2, pp. 15165–15184, 2022.
Z. zul and J. Jackie, “Analisa dan Penerapan Pencadangan Pusat Data Antar Site dengan Teknologi VPN,” J. Inf. Syst. Technol., vol. 3, no. 2, pp. 257–269, 2022, doi: 10.37253/joint.v3i2.6764.
R. A. Putra, H. Supendar, and R. Fahlapi, “Perancangan Virtual Private Network Dengan Metode PPTP Menggunakan Mikrotik,” J. Komput. Antart., vol. 1, p. 2023, 2023.
D. Lusi, Y. Suban Belutowe, U. I. Kupang Jl Perintis Kemerdekaan, K. Putih, and K. Kupang, “Analisis Dan Implementasi Desain Jaringan Hotspot Berbasis Mikrotik Menggunakan Metode Ndlc (Network Development Life Cycle) Pada Kantor Balai Pelaksanaan Jalan Nasional Ntt,” J. Teknol. Inf., vol. 7, no. 1, 2023.
Y. Mulyanto and S. B. Prakoso, “Rancang Bangun Jaringan Komputer Menggunakan Sistem Manajemen Omada Controller Pada Inspektorat Kabupaten Sumbawadengan Metode Network Development Life Cycle (Ndlc),” J. Inform. Teknol. dan Sains, vol. 2, no. 4, pp. 223–233, 2020, doi: 10.51401/jinteks.v2i4.825.
T. Sanjaya and D. Setiyadi, “Network Development Life Cycle (NDLC) Dalam Perancangan Jaringan Komputer Pada Rumah Shalom Mahanaim,” Mhs. Bina Insa., vol. 4, no. 1, pp. 1–10, 2019.
Downloads
Published
Issue
Section
License
Authors Declaration
- The Authors certify that they have read, understood, and agreed to the Journal of Information Systems and Informatics (JournalISI) submission guidelines, policies, and submission declaration. The submission has been prepared using the provided template.
- The Authors certify that all authors have approved the publication of this manuscript and that there is no conflict of interest.
- The Authors confirm that the manuscript is their original work, has not received prior publication, is not under consideration for publication elsewhere, and has not been previously published.
- The Authors confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- The Authors confirm that the manuscript is not copied from or plagiarized from any other published work.
- The Authors declare that the manuscript will not be submitted for publication in any other journal or magazine until a decision is made by the journal editors.
- If the manuscript is finally accepted for publication, the Authors confirm that they will either proceed with publication immediately or withdraw the manuscript in accordance with the journal’s withdrawal policies.
- The Authors agree that, upon publication of the manuscript in this journal, they transfer copyright or assign exclusive rights to the publisher, including commercial rights














