Mikrotik VPN Shielding E-Link Health Reports: Strengthening Data Security at Madiun Health Office
DOI:
https://doi.org/10.51519/journalisi.v5i3.524Keywords:
VPN, Virtual Private Network, Network SecurityAbstract
Advances in Information and Communication Technology have led to revolutionary changes in computer networking, especially in Indonesia, which has witnessed significant technological growth over the last four years. Despite this progress, inter-agency data exchange, particularly in governmental organizations, remains vulnerable to security risks. This study focuses on enhancing the security measures for the Electronic Health Information Report (E-Link) system at Madiun District Health Office by implementing a Virtual Private Network (VPN) using MikroTik. A multi-method approach, comprising direct observation, interviews, and literature review, was adopted for this investigation. The findings confirm that the utilization of Point-to-Point Tunneling Protocol (PPTP) via MikroTik substantially elevates the security and governs controlled access to the E-Link application. Therefore, the implementation of a VPN not only fortifies the security but also improves the accessibility of health data systems.
Downloads
References
D. Ferdiansyah, A. R. Kamal, S. A. Majapahit, and F. Mulyanto, “Pengujian Multicore Pada Processor Terhadap Performansi Server Virtualisasi Menggunakan Metode Load Testing,” J. Inf. Syst. Informatics, vol. 3, no. 4, pp. 698–710, 2021, doi: 10.51519/journalisi.v3i4.193.
F. Yudha, A. Muhammad, and P. Muryadi, “CyberSecurity dan Forensik Digital Perancangan Aplikasi Pengujian Celah Keamanan Pada Aplikasi Berbasis Web,” vol. 1, no. 1, pp. 1–6, 2018.
S. Ikhwan and A. Amalina, “Analisis Jaringan VPN Menggunakan PPTP dan L2TP (Studi Kasus: Dinhubkominfo Kabupaten Banyumas),” J. Infotel, vol. 9, no. 3, pp. 265–270, 2017.
S. Hendra, “Implementasi Remote Site Pada Virtual Private Network Berbasis Mikrotik,” Bina Insa. ICT J., vol. 3, no. 1, pp. 85–98, 2016.
Lia Umaroh , Machsun Rifauddin, “Implementasi Virtual Private Network (VPN) Di Perpustakaan Univesitas Islam Malang, SK Dirjen Risbang -Kemristekdikti No 21/E/KPT/2018(Peringkat 2 SINTA).
Tanda Budimulya , Maryanah Safitri , Faridi, “Perancangan VPN Sebagai Pendukung Sistem Informasi Kepegawaian Pada Kantor Kementrian Kesehatan RI”, JIKA (Jurnal Informatika) Universitas Muhammadiyah Tangerang, Tangerang, Juni 2022.
B. Santoso, A. Sani, T. Husain, and N. Hendri, “Vpn Site To Site Implementation Using Protocol L2Tp and Ipsec,” Teknokom, vol. 4, no. 1, pp. 30–36, 2021, doi: 10.31943/teknokom.v4i1.59.
H. G. Ardiansyah Taufiq A.; Afdhal, Afdhal, “Pengaturan Pemakaian Bandwidth Menggunakan Mikrotik Bridge,” J. Rekayasa Elektr., vol. 9, no. Vol 9, No 2 (2010), pp. 69–76, 2010.
D. Putra and M. I. Fianty, “Capability Level Measurement of Information Systems Using COBIT 5 Framework in Garment Company,” J. Inf. Syst. Informatics, vol. 5, no. 1, pp. 333–346, 2023, doi: 10.51519/journalisi.v5i1.454.
Afit Muhammad Lukman, Yusuf Bachtiar, “Analisis Sistem Pengelolaan, Pemeliharaan Dan Keamanan Jaringan Internet Pada IT TELKOM Purwokerto”, Jurnal Evolusi, vol. 6, no 2, 2018.
R. Azhar, “Analisa Qos Pada Jaringan Site To Site Vpn,” Anal. Qos Pada Jar. Site To Site Vpn Menggunakan Protoc. Sstp, pp. 52–60, 2017.
N. K. Dewi and A. S. Putra, “Pengembangan Sistem Jaringan Menggunakan Local Area Network Untuk Meningkatkan Pelayanan (Studi Kasus di PT . ARS Solusi Utama ),” TEKINFO Vol. 22, No. 1, April 2021, vol. 22, no. 1, pp. 66–81, 2021.
E. Mufida, D. Irawan, and G. Chrisnawati, “Remote Site Mikrotik VPN Dengan Point To Point Tunneling Protocol (PPTP) Studi Kasus pada Yayasan Teratai Global Jakarta,” J. Matrik, vol. 16, no. 2, p. 9, 2017, doi: 10.30812/matrik.v16i2.7.
Downloads
Published
Issue
Section
License
Authors Declaration
- The Authors certify that they have read, understood, and agreed to the Journal of Information Systems and Informatics (JournalISI) submission guidelines, policies, and submission declaration. The submission has been prepared using the provided template.
- The Authors certify that all authors have approved the publication of this manuscript and that there is no conflict of interest.
- The Authors confirm that the manuscript is their original work, has not received prior publication, is not under consideration for publication elsewhere, and has not been previously published.
- The Authors confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- The Authors confirm that the manuscript is not copied from or plagiarized from any other published work.
- The Authors declare that the manuscript will not be submitted for publication in any other journal or magazine until a decision is made by the journal editors.
- If the manuscript is finally accepted for publication, the Authors confirm that they will either proceed with publication immediately or withdraw the manuscript in accordance with the journal’s withdrawal policies.
- The Authors agree that, upon publication of the manuscript in this journal, they transfer copyright or assign exclusive rights to the publisher, including commercial rights














