OPTIMASI PERLINDUNGAN DATA DARI SERANGAN SIBER DENGAN SYNOLOGY UNTUK KELANGSUNGAN BISNIS PERUSAHAAN

Penulis

  • Slamet Raharjo UNIVERSITAS PAMULANG
  • Fordiana Ekawati UNIVERSITAS PAMULANG

Kata Kunci:

Synology, Cyber Security, Self-Protectec Healing, High-Availability

Abstrak

Kehandalan suatu sistem sangat diperlukan oleh suatu perusahaan untuk menunjang semua kegiatan bisnisnya, kehandalan tersebut sangat menentukan produktifitas perusahaan, saat ini sangat dibutuhkan suatu teknologi yang dapat diterapkan untuk menunjang kehandalan sistem tersebut yaitu synology dan cyber security, dengan teknologi tersebut memungkinkan sebuah sistem melakukan self-protected healing (perbaikan mandiri jika terjadi kerusakan), hal ini tentu saja sangat membantu lancarnya semua applikasi yang berada di sistem tersebut karena akan menunjang High-Availability (ketersediaan) data sehingga produktifitas perusahaan dapat tercapai.

Referensi

Docker, (2021). Docker Docs, Website: https://docs.docker.com/, diakses tanggal 1 April 2021.

Lxc, (2021). Linux Continer., Website: http://linuxcontainers.org, diakses tanggal 15 Mei 2021.

Pamidi, M. R., & Vasudeva, A., (2021). Impact of Containers on Data Center Virtualization, Website: http://www.itnewswire.us/Containers.pdf, diakses tanggal 23 Mei 2021.

Christner, B., (2021). WordPress Bare Metal vs WordPress Docker Performance Comparison. Website:https://k6.io/blog/wordpress-bare-metal-vs-wordpress-docker-performance-comparison, diakses tanggal 8 Juni 2021.

Boettiger, C., (2015). An introduction to Docker for reproducible research with examples from the R environment,

ACM SIGOPS Operating Systems Review, Special Issue on Repeatability and Sharing of Experimental Artifacts.

Zhang, Q., Cheng, L., dan Boutaba, R., (2010). Cloud computing: stateofthe-art and research challenges,Journal of Internet Services and Applications, 7(18).

Dua, R., Raja, A. R., & Kakadia, D., (2014). Virtualization vs Containerization to support PaaS,International Conference on Cloud Engineering (pp. 610–614). IEEE.

Miell, I., dan Sayers, A.H., (2015). Docker in Practice,MEAP Edition Version 3. Manning Publications.

Matthias, K., & Kane, S. P., (2015). Docker Up & Running, OReilly.

Scheepers, M. J., (2014). Virtualization and Containerization of Application Infrastructure: A Comparison,21st Twente Student Conference on IT (pp. 1–7). Enschede The Netherlands: University of Twente, Faculty of Electrical Engineer ing, Mathematics and Computer Science.

Seo, K., Hwang, H., Moon, I., Kwon, O., & Kim, B., (2014). Performance Comparison Analysis of Linux Container and Virtual Machine for Building Cloud Related Research, Advanced Science and Technology Letters, 66, 105–111.

Sudha, M., Harish, G. M., & Usha, J., (2014). Performance Analysis of Linux Containers - An Alternative Approach to Virtual Machines,

International Journal of Advanced Research in Computer Science and Jurnal Ilmiah SimanteC Vol. 4, No. 3 Juni 2015 Software Engineering, 4(1), 820– 824.

Felter, W., Ferreira, A., Rajamony, R., & Rubio, J., (2015). An Updated Performance Comparison of Virtual Machines and Linux Containers, (pp. 171–172). IEEE.

Adiputra, F., (2015). Container dan Docker: Teknik Virtualisasi Dalam pengelolaan banyak Aplikasi web. Universitas Trunojoyo Madura, 2015

Hilbert and Lopez, 2011, The World’s Technological Capacity to Store, Communicate, and Compute Information, Science.

Tim Penyusun Kominfo, 2015, Buku Saku Big Data, Kementerian Komunikasi dan Informatika.

Kalinowski, Marcos et al. 2015 Toward Building Knowledge on Causes of Critical Requirements Engineering Problems. 27th International Conference on Software Engineering and Knowledege Engineering (SEKE 2015) .

Wijaya, W. M. Teknologi Big Data : Sistem Canggih di Balik Google, Yahoo!, Facebook, IBM (Teori hingga Tutorial). Edisi 1. Cetakan 1. Deepublish. April 2015. Yogyakarta

Spits Warnars, Mining Patterns with Attribute Oriented Induction”, The International Conference on Database, Data Warehouse, Data Mining and Big Data (DDDMBD2015), Tangerang, Indonesia, pp. 11-21, 10- 12 September 2015.

Harco Leslie Hendric Spits Warnars, Muhamad Iskandar Wijaya, Hok Bun Tjung, Dendy Fransiskus Xaverius, Dedy Van Hauten, Sasmoko (2016), “Easy understanding of Attribute Oriented Induction (AOI) characteristic rule

algorithm”, International journal of Applied Engineering Research (IJAER), vol. 11, No. 8, pp. 5369-5375.

Riswan Efendi Tarigan, Kartika Sari Dewi (2015). Web-Based Implementation of E-Marketing to Support Product Marketing of Chemical Manufacturing Company. CommIT Journal, 9(2), pp. 73-82. Digital, Jasakom, Yogyakarta, 2014.

Diterbitkan

2022-08-30

Cara Mengutip

Raharjo, S. ., & Ekawati, F. (2022). OPTIMASI PERLINDUNGAN DATA DARI SERANGAN SIBER DENGAN SYNOLOGY UNTUK KELANGSUNGAN BISNIS PERUSAHAAN. Jurnal Ilmu Komputer, 5(2), 39. Diambil dari https://jurnal.pranataindonesia.ac.id/index.php/jik/article/view/134