Sistem Keamanan Work From Anywhere Menggunakan VPN Generasi Lanjut

Keywords: Jaringan, Keamanan, VPN, WFA, ZeroTie

Abstract

Working remotely or what we know as Work From Anywhere is still a trend after the COVID-19 pandemic. Working from anywhere and anytime can increase productivity and reduce transportation costs, and is accompanied by fast internet support, good communication and collaboration platforms so this is very popular and in demand. When implementing WFA, it has its own challenges, namely data security. Not all organizations are supported by a reliable IT infrastructure that can protect employee data during WFA. One of the security system technologies that can be used during WFA is VPN. Currently there are many VPN protocols that can be used for WFA. However, in implementing a VPN network, there are several things that must be considered to ensure that the VPN network is successful and functional, such as security, choosing the right architecture, selecting technology and protocols, scalability, quality of service, management and monitoring, as well as security and privacy policies. ZeroTier is a next-generation VPN that is easy to configure, can support multiple devices, and uses an end-to-end connection, eliminating the need for a centralized VPN server. In implementing VPN ZeroTier the method used is the Network Development Life Cycle (NDLC). This methodology is used to plan, implement, and manage a VPN network with ZeroTier to function according to WFA needs.

References

[1] N. Evika, K. Ni’mah, and W. E. Pujianto, “Efektifitas Work From Anywhere Pada Era Digital,” Jurnal Pendidikan Sosial Humaniora, vol. 2, no. 3, pp. 18–33, 2023, doi: 10.30640/dewantara.v2i3.1305.
[2] P. (Raj) Choudhury, C. Foroughi, and B. Larson, “Work-from-anywhere: The productivity effects of geographic flexibility,” Strategic Management Journal, vol. 42, no. 4, pp. 655–683, 2021, doi: https://doi.org/10.1002/smj.3251.
[3] I. Fronza, L. Corral, G. Iaccarino, L. Bartoli, and C. Pahl, “Work-From-Anywhere Skills: Aligning Supply and Demand Starting from High Schools,” in International Conference on Computer Supported Education, CSEDU - Proceedings, Science and Technology Publications, Lda, 2022, pp. 327–337. doi: 10.5220/0010984300003182.
[4] D. L. Kusworo and M. N. K. Fauzi, “Work From Anywhere (WFA): Formulation of Policy Design for the Work System of State Civil Apparatus as Government Bureaucratic Efficiency In The New Normal Era,” Pancasila and Law Review, vol. 3, no. 2, pp. 127–136, Dec. 2022, doi: 10.25041/plr.v3i2.2769.
[5] W. Matli and S. F. Wamba, “Work from anywhere: inequalities in technology infrastructure distribution for digit workers,” Digital Transformation and Society, vol. 2, no. 2, pp. 149–162, May 2023, doi: 10.1108/dts-08-2022-0042.
[6] G. N. Alotibi and A. Al Abdulwahid, “An Investigation of Cybersecurity Issues of Remote Work during the COVID-19 Pandemic in Saudi Arabia,” International Journal of Advanced Computer Science and Applications, vol. 14, no. 1, pp. 47–53, 2023, doi: 10.14569/IJACSA.2023.0140106.
[7] G. Sebastian, “A descriptive study on cybersecurity challenges of working from home during COVID-19 pandemic and a proposed 8 step WFH cyber-attack mitigation plan,” IBIMA Business Review, vol. 2021, 2021, doi: 10.5171/2021.589235.
[8] E. Kolomoets, “Ensuring information security in the field of remote work,” in Journal of Physics: Conference Series, IOP Publishing Ltd, Mar. 2022. doi: 10.1088/1742-6596/2210/1/012008.
[9] A. Rosyidah and J. Mabe Parenreng, “Network Security Analysis Based on Internet Protocol Security Using Virtual Private Network (VPN),” vol. 03, p. 3, 2023, doi: 10.31763/iota.v3i3.613.
[10] M. A. Gunawan and S. Wardhana, “Implementasi dan Perbandingan Keamanan PPTP dan L2TP/IPsec VPN (Virtual Private Network),” Elektronika Kendali Telekomunikasi Tenaga Listrik Komputer, vol. 6, no. 1, pp. 69–78, 2023.
[11] H. Haeruddin and K. Kelvin, “Analisa Penggunaan VPN L2TP dan SSTP di Masa Pandemi Covid-19,” Jurnal Ilmu Komputer dan Bisnis, vol. 13, no. 1, pp. 105–114, May 2022, doi: 10.47927/jikb.v13i1.279.
[12] H. Haeruddin and E. Efendi, “Analisa Jaringan VPN MPLS L3 dan L2 Dimasa Pandemi COVID-2019 untuk Mendukung Work From Home,” Jurnal Ilmu Komputer dan Bisnis, vol. XIII, no. 1, pp. 76–84, 2021.
[13] F. Hadinata, S. E. Prasetyo, and H. Haeruddin, “Analisa Penggunaan Jaringan ZeroTier di Masa Pandemi Covid-2019,” Jurnal Ilmu Komputer dan Bisnis, vol. 13, no. 1, pp. 85–93, May 2022, doi: 10.47927/jikb.v13i1.276.
[14] G. Barovih, S. Surahmat, and F. Febrianty, “Analysis of Network Attached Storage Performance with NFS Protocol in Integrated Business Start-Up,” Sinkron, vol. 8, no. 3, pp. 1299–1306, Jul. 2023, doi: 10.33395/sinkron.v8i3.12417.
[15] S. Budiyanto and D. Gunawan, “Comparative Analysis of VPN Protocols at Layer 2 Focusing on Voice over Internet Protocol,” IEEE Access, 2023, doi: 10.1109/ACCESS.2023.3286032.
Published
2023-11-30
How to Cite
Haeruddin, H., Wijaya, G., & Khatimah, H. (2023). Sistem Keamanan Work From Anywhere Menggunakan VPN Generasi Lanjut. JITU : Journal Informatic Technology And Communication, 7(2), 102-113. https://doi.org/10.36596/jitu.v7i2.1086
Section
Articles