Evaluasi Keamanan Autentikasi Pengguna pada Sistem Operasi Windows dan Linux

Authors

  • Galva Al Godzali Universitas Pelita Bangsa
  • Rafif Isdarufa Athallah Universitas Pelita Bangsa
  • Elkin Rivalni Universitas Pelita Bangsa

DOI:

https://doi.org/10.61132/neptunus.v3i1.590

Keywords:

Authentication, Linux, Windows, Security, Operating Systems

Abstract

Authentication security is an important aspect of the operating system. This research evaluates the security of user authentication on Windows and Linux operating systems by analyzing various methods such as the use of passwords and two-factor authentication. This study compares effectiveness, flexibility, and stability to provide insight into their advantages and vulnerabilities. The literature review method is used by utilizing secondary data from relevant sources. The research results show that Linux offers superior security due to its open-source nature and strong permission-based model, while Windows excels in ease of use and integrated features such as Active Directory. These results aim to provide information to users and organizations in choosing an operating system that suits their needs.

References

Armin, A., Abrar, A., & Sorongan, E. (2017). Sentralisasi otentikasi pengguna dan pengelolaan sumber daya jaringan komputer Politeknik Negeri Balikpapan dengan menggunakan Active Directory Domain Services Windows Server 2012 R2. Prosiding SNITT Poltekba, 2(1), 326–332.

Asti, R. M., Laila, E., & Firdaus, A. (2021). Manajemen dan autentikasi hotspot menggunakan Remote Access Dial-In User Service (RADIUS) Server pada Jurusan Teknik Komputer. Jurnal Laporan Akhir Teknik Komputer, 1(2), 52–59.

Awan, M. T., & Khan, K. (2022). Linux vs. Windows: A comparison of two widely used platforms. Journal of Computer Science and Technology Studies, 4(1), 41–53.

Bassil, Y. (2012). Windows and Linux operating systems from a security perspective. arXiv preprint arXiv:1204.0197.

Bator, R. J., Bryan, A. D., & Schultz, P. W. (2011). Who gives a hoot?: Intercept surveys of litterers and disposers. Environment and Behavior, 43(3), 295–315. https://doi.org/10.1177/0013916509356884

Darmadi, E. A. (2018). Perancangan sistem otentikasi radius pada pengguna jaringan wireless untuk meningkatkan keamanan jaringan komputer. IKRA-ITH Informatika: Jurnal Komputer dan Informatika, 2(3), 9–16.

Duncan, R., & Schreuders, Z. C. (2019). Security implications of running Windows software on a Linux system using Wine: A malware analysis study. Journal of Computer Virology and Hacking Techniques, 15, 39–60.

Hidayati, S. N. (2016). Pengaruh pendekatan keras dan lunak pemimpin organisasi terhadap kepuasan kerja dan potensi mogok kerja karyawan. Jurnal Maksipreneur: Manajemen, Koperasi, dan Entrepreneurship, 5(2), 57–66. http://dx.doi.org/10.30588/SOSHUMDIK.v5i2.164

Josephine, T. S. S., & Siahaan, P. (2023). Analisis sistem keamanan dan proteksi pada sistem operasi Windows, Linux, dan MacOS. Sistem Dan Teknologi Informasi Indonesia (SINTESIA), 2(2), 64–70. Retrieved from https://journal.unj.ac.id/unj/index.php/SINTESIA/article/view/44081

Kemas, K. O. K. S., Supriyatna, A. R., & Putra, S. D. (2024). Autentikasi user dengan metode single sign-on berbasis Windows Active Directory pada PT. XYZ. ROUTERS: Jurnal Sistem dan Teknologi Informasi, 70–78.

Miclea, S. (2012). Windows and Linux security audit. Journal of Applied Business Information Systems, 3(4). Retrieved from http://www.jabis.ro/2012/4/0304012012.pdf

Motero, C. D., Higuera, J. R. B., Higuera, J. B., Montalvo, J. A. S., & Gómez, N. G. (2021). On attacking Kerberos authentication protocol in Windows Active Directory Services: A practical survey. IEEE Access, 9, 109289–109319.

Nelfira, N. (2017). Rancang bangun aplikasi pembelajaran sistem operasi Windows pada matakuliah sistem operasi di STMIK Indonesia Padang berbasis multimedia interaktif. Jurnal Edik Informatika Penelitian Bidang Komputer Sains dan Pendidikan Informatika, 2(2), 182–189.

Risdwiyanto, A., & Kurniyati, Y. (2015). Strategi pemasaran perguruan tinggi swasta di Kabupaten Sleman Yogyakarta berbasis rangsangan pemasaran. Jurnal Maksipreneur: Manajemen, Koperasi, dan Entrepreneurship, 5(1), 1–23. http://dx.doi.org/10.30588/SOSHUMDIK.v5i1.142

Smith, R. E. (2002). Authentication: From passwords to public keys. Addison-Wesley Professional.

Yudhana, A., & Riadi, I. (2022). Analisis kinerja perangkat lunak forensic imaging pada sistem operasi Linux menggunakan metode static forensic. Insect (Informatics and Security): Jurnal Teknik Informatika, 8(1), 38–47.

Yunianto, I., & Adhiyarta, K. (2020). Jurnal review: Perbandingan sistem operasi Linux dengan sistem operasi Windows. Jupiter: Journal of Computer & Information Technology, 1(1), 1–7.

Downloads

Published

2024-12-24

How to Cite

Galva Al Godzali, Rafif Isdarufa Athallah, & Elkin Rivalni. (2024). Evaluasi Keamanan Autentikasi Pengguna pada Sistem Operasi Windows dan Linux. Neptunus: Jurnal Ilmu Komputer Dan Teknologi Informasi, 3(1), 31–40. https://doi.org/10.61132/neptunus.v3i1.590

Similar Articles

1 2 3 > >> 

You may also start an advanced similarity search for this article.