Analysis of the effectiveness of VPN and PPTP Protocol in E-Link Health Report Application Using NDLC Method
Abstract
The rapid development of computer networks and data communications has significantly impacted all government sectors in Indonesia. The Madiun Regency Health Service relies on a web-based health reporting application, E-link Health Report, to manage health information data from community health centers. However, this application is vulnerable to cyber-attacks, necessitating enhanced security measures. To address this issue, the health service implemented a Virtual Private Network (VPN) using the Point-to-Point Tunneling Protocol (PPTP) to bolster system security. The aim of this research is to analyze the effectiveness of the implemented VPN with PPTP protocol in enhancing network reliability and data transmission security. The Network Development Lifecycle (NDLC) method was employed to conduct this analysis, focusing on parameters such as network reliability and the ability to secure data transmission against cyber threats. The results demonstrate a significant improvement in both network reliability and data transmission security following the implementation of the VPN with PPTP protocol. This study provides a comprehensive comparison of network performance before and after the implementation, highlighting the effectiveness of VPNs in securing web-based health reporting applications.
Downloads
References
B. A. Gumelar, G. D. S. Putra, and D. N. Amadi, “Mikrotik VPN Shielding E-Link Health Reports: Strengthening Data Security at Madiun Health Office,” J. Inf. Syst. Informatics, vol. 5, no. 3, pp. 1194–1203, 2023, doi: 10.51519/journalisi.v5i3.524.
P. Arora, P. R. Vemuganti, and P. Allani, “Comparison of VPN Protocols – IPSec , PPTP , and L2TP,” vol. ECE 646, no. Fall (2021), pp. 1–45, 2021.
A. Amarudin and S. D. Riskiono, “Analisis Dan Desain Jalur Transmisi Jaringan Alternatif Menggunakan Virtual Private Network (Vpn),” J. Teknoinfo, vol. 13, no. 2, p. 100, 2019, doi: 10.33365/jti.v13i2.309.
A. Averian, A. Budiono, and U. Y. K. S. Hediyanto, “Analisis dan Pengoptimalisasi Jaringan Wireless Local Area Network (WLAN) Pada PT.XYZ Dengan Menggunakan Metode Network Development Life Cycle (NDLC),” eProceedings Eng., vol. 10, no. 2, pp. 1325–1330, 2023.
I. Ubaedila, O. Nurdiawan, Y. A. Wijaya, and J. Sidik, “Layanan Jaringan Menggunakan Metode Sniffing Berbasis Wireshark,” INFORMATICS Educ. Prof. J. Informatics, vol. 6, no. 1, p. 95, 2022, doi: 10.51211/itbi.v6i1.1697.
S. Ikhwan and A. Amalina, “Analisis Jaringan VPN Menggunakan PPTP dan L2TP,” J. Infotel, vol. 9, no. 3, 2017, doi: 10.20895/infotel.v9i3.274.
A. Kurniawan, “Analisis Performansi Remote Acces VPN Menggunakan PPTP dan L2TP Untuk Kebutuhan Work From Home (WFH) bagi Karyawan PT Dunia Makmur Jaya,” J. Pendidik. Tambusai, vol. 7, no. 2, pp. 7378–7389, 2023.
R. F. Syarif and I. A. Sobari, “Implementasi Virtual Private Network (VPN) menggunakan Metode PPTP pada PT. Sinar Quality Internusa,” J. Pendidik. Tambusai, vol. 6, no. 2, pp. 15165–15184, 2022.
Z. zul and J. Jackie, “Analisa dan Penerapan Pencadangan Pusat Data Antar Site dengan Teknologi VPN,” J. Inf. Syst. Technol., vol. 3, no. 2, pp. 257–269, 2022, doi: 10.37253/joint.v3i2.6764.
R. A. Putra, H. Supendar, and R. Fahlapi, “Perancangan Virtual Private Network Dengan Metode PPTP Menggunakan Mikrotik,” J. Komput. Antart., vol. 1, p. 2023, 2023.
D. Lusi, Y. Suban Belutowe, U. I. Kupang Jl Perintis Kemerdekaan, K. Putih, and K. Kupang, “Analisis Dan Implementasi Desain Jaringan Hotspot Berbasis Mikrotik Menggunakan Metode Ndlc (Network Development Life Cycle) Pada Kantor Balai Pelaksanaan Jalan Nasional Ntt,” J. Teknol. Inf., vol. 7, no. 1, 2023.
Y. Mulyanto and S. B. Prakoso, “Rancang Bangun Jaringan Komputer Menggunakan Sistem Manajemen Omada Controller Pada Inspektorat Kabupaten Sumbawadengan Metode Network Development Life Cycle (Ndlc),” J. Inform. Teknol. dan Sains, vol. 2, no. 4, pp. 223–233, 2020, doi: 10.51401/jinteks.v2i4.825.
T. Sanjaya and D. Setiyadi, “Network Development Life Cycle (NDLC) Dalam Perancangan Jaringan Komputer Pada Rumah Shalom Mahanaim,” Mhs. Bina Insa., vol. 4, no. 1, pp. 1–10, 2019.
Download PDF: 218 times
Copyright (c) 2024 Journal of Information Systems and Informatics
This work is licensed under a Creative Commons Attribution 4.0 International License.
- I certify that I have read, understand and agreed to the Journal of Information Systems and Informatics (Journal-ISI) submission guidelines, policies and submission declaration. Submission already using the provided template.
- I certify that all authors have approved the publication of this and there is no conflict of interest.
- I confirm that the manuscript is the authors' original work and the manuscript has not received prior publication and is not under consideration for publication elsewhere and has not been previously published.
- I confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- I confirm that the paper now submitted is not copied or plagiarized version of some other published work.
- I declare that I shall not submit the paper for publication in any other Journal or Magazine till the decision is made by journal editors.
- If the paper is finally accepted by the journal for publication, I confirm that I will either publish the paper immediately or withdraw it according to withdrawal policies
- I Agree that the paper published by this journal, I transfer copyright or assign exclusive rights to the publisher (including commercial rights)