Main Article Content
Abstract
In this increasingly developing era, computer technology is increasing so fast. In today's increasing technology, computer networks are widely used in all fields. However, with the increasing internet network, it will be directly proportional to the security holes used. As experienced by the internet network in the Semidang Lagan Bengkulu Tengah Sub-district Office, which is vulnerable to infiltration and the large number of users outside of employees and staff. The research method that will be applied in this study is the Network Development Life Cycle (NDLC). Several stages in this research include:: Analysis, Design, Simulation Prototyping, Implementation, Monitoring and Management. The result of this research is the development of a hotspot-based network security system to enhance network security at the Semidang Lagan Bengkulu Tengah Sub-district office. Based on the results of several tests carried out, the authors conclude that after implementing hotspot-based security development and dividing bandwidth limitations for each user account, where one account can only be used by 2 users so as to make users more controlled and overload does not occur.
Keywords
Article Details
Copyright (c) 2023 Susi Aryanti, Khairil, Hari Aspriyono

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree with the following terms:
- Authors retain copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
References
- Ardianto, F., & Eliza, E. (2016). Penggunaan Mikrotik Router Sebagai Jaringan Server. Jurnal Surya Energy, 1(1), 24-29.
- Ardianto, F., & Rosyidah, M. (2017). Manajemen Bandwidth Jaringan Hotspot Berbasis Mikrotik Router. AVoER 9 (hal. 1-5). Palembang: Fakultas Teknik Universitas Sriwijaya.
- Musliyana, Z. (2014). Sistem Pendaftaran Hotspot Berbasis Web Pada Hotspot Mikrotik STMIK U'Budiyah Menggunakan Mikrotik Application Programming Interface(API), PHP, Dan MySQL. Prosiding SNIKOM (hal. 1-9). Banda Aceh: Intitut Teknologi Del.
- Syafrizal,M. (2020). Pengantar Jaringan Komputer. Penerbit Andi. Yogyakarta. Media Kita. 222 hal.
- Sugiono (2020). Industri Konten Digital Dalam Perspektif Society 5.0 (Digital Content Industry in Society 5.0 Perspective). JURNAL IPTEKKOM (Jurnal Ilmu Pengetahuan & Teknologi Informasi), 22(2), 175-191.
- Yuliandoko, H. (2018). Jaringan komputer Wire dan Wireless beserta penerapannya. Deepublish.
- Yulianto, R., & Aprilyani, F. (2020). Sistem Keamanan Jaringan Komputer Menggunakan Metode NDLC Dengan Linux Zentyal Pada Instansi Kemenko Maritim. Jurnal Teknik Informatika , 6 (2 ), 79-8 6.
References
Ardianto, F., & Eliza, E. (2016). Penggunaan Mikrotik Router Sebagai Jaringan Server. Jurnal Surya Energy, 1(1), 24-29.
Ardianto, F., & Rosyidah, M. (2017). Manajemen Bandwidth Jaringan Hotspot Berbasis Mikrotik Router. AVoER 9 (hal. 1-5). Palembang: Fakultas Teknik Universitas Sriwijaya.
Musliyana, Z. (2014). Sistem Pendaftaran Hotspot Berbasis Web Pada Hotspot Mikrotik STMIK U'Budiyah Menggunakan Mikrotik Application Programming Interface(API), PHP, Dan MySQL. Prosiding SNIKOM (hal. 1-9). Banda Aceh: Intitut Teknologi Del.
Syafrizal,M. (2020). Pengantar Jaringan Komputer. Penerbit Andi. Yogyakarta. Media Kita. 222 hal.
Sugiono (2020). Industri Konten Digital Dalam Perspektif Society 5.0 (Digital Content Industry in Society 5.0 Perspective). JURNAL IPTEKKOM (Jurnal Ilmu Pengetahuan & Teknologi Informasi), 22(2), 175-191.
Yuliandoko, H. (2018). Jaringan komputer Wire dan Wireless beserta penerapannya. Deepublish.
Yulianto, R., & Aprilyani, F. (2020). Sistem Keamanan Jaringan Komputer Menggunakan Metode NDLC Dengan Linux Zentyal Pada Instansi Kemenko Maritim. Jurnal Teknik Informatika , 6 (2 ), 79-8 6.