In Company X, the use of the internet is a demand for workers. Therefore, an internet network is very much needed in a Company X. The absence of restrictions in the use of the internet network can interfere with the security and misuse of the internet network, for this reason the arrangements in the internet network are designed. One method used is the Virtual Local Area Network (VLAN) Access Control List (ACL) method that is applied to Company X. The Vlan Access Control List method is one of the techniques for requesting an internet network access or data communication and sending a number of data packets from one computer to another. The author resets the results proving that the Vlan Access Control List with the filtering and sharing method of internet connection users can filter and identify users who have restricted access to access other users or to servers in Company X to improve data security.
The internet and technologies are revolving around the world today. Most of the people around this world have access to the internet easily nowadays; it can lead to a most common and dangerous problem, which is cyber bullying. Cyber bullying is considered as a crime which usually occurs among the young people. Cases from cyberbullying have shown that there is a growing significantly which is becoming a worrying topic for the societies to be aware of. This study revealed cyberbullying teen actors involved within the area of Jakarta. The result is very interesting. Parents play a vital role to the teens as they will become a support for them (actor and victim) and also peer groups give the high impact of the actors to conduct cyberbullying to another group. Much cyberbullying happens for the same reasons as any other form of bullying. Generally, the cyber bullies act in such manner due to them being insecure, to gain popularity, social pressure, and jealousy as well as personal grudges.
The threat of personal data security is a very sensitive matter lately, Website Phishing is one of the activities that can trap and threaten someone by deceiving that person. From the results of the Phishing Website, the victim indirectly provides data or information about the victim to the trapper. In this case, Phishing Websites are one of the cyber crimes that are still very often used to retrieve victim data. "What is expected from this research is to obtain a percentage value related to the level of public awareness of the crime of phishing where many people are still unfamiliar with the crime that is increasingly happening through social media, one of which is WhatsApp". Phishing website attacks are carried out by creating a fake website address that is as similar as possible to the original website, then the trapper sends this Phishing website address to the target/victim via Whatsapp social media. In this study, the data collection method will use the quantitative method, which is how to make a questionnaire that will be filled out by 80 respondents who come from the general public who are still unfamiliar with technology. The results of this study will contain the presentation of respondents to the awareness of Phishing Websites, it is hoped that this research will make the general public who are still unfamiliar with Phishing Websites more careful about website threats that can attack at any time.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.