Evaluasi Keamanan Autentikasi Pengguna pada Sistem Operasi Windows dan Linux
DOI:
https://doi.org/10.61132/neptunus.v3i1.590Keywords:
Authentication, Linux, Windows, Security, Operating SystemsAbstract
Authentication security is an important aspect of the operating system. This research evaluates the security of user authentication on Windows and Linux operating systems by analyzing various methods such as the use of passwords and two-factor authentication. This study compares effectiveness, flexibility, and stability to provide insight into their advantages and vulnerabilities. The literature review method is used by utilizing secondary data from relevant sources. The research results show that Linux offers superior security due to its open-source nature and strong permission-based model, while Windows excels in ease of use and integrated features such as Active Directory. These results aim to provide information to users and organizations in choosing an operating system that suits their needs.
References
Armin, A., Abrar, A., & Sorongan, E. (2017). Sentralisasi otentikasi pengguna dan pengelolaan sumber daya jaringan komputer Politeknik Negeri Balikpapan dengan menggunakan Active Directory Domain Services Windows Server 2012 R2. Prosiding SNITT Poltekba, 2(1), 326–332.
Asti, R. M., Laila, E., & Firdaus, A. (2021). Manajemen dan autentikasi hotspot menggunakan Remote Access Dial-In User Service (RADIUS) Server pada Jurusan Teknik Komputer. Jurnal Laporan Akhir Teknik Komputer, 1(2), 52–59.
Awan, M. T., & Khan, K. (2022). Linux vs. Windows: A comparison of two widely used platforms. Journal of Computer Science and Technology Studies, 4(1), 41–53.
Bassil, Y. (2012). Windows and Linux operating systems from a security perspective. arXiv preprint arXiv:1204.0197.
Bator, R. J., Bryan, A. D., & Schultz, P. W. (2011). Who gives a hoot?: Intercept surveys of litterers and disposers. Environment and Behavior, 43(3), 295–315. https://doi.org/10.1177/0013916509356884
Darmadi, E. A. (2018). Perancangan sistem otentikasi radius pada pengguna jaringan wireless untuk meningkatkan keamanan jaringan komputer. IKRA-ITH Informatika: Jurnal Komputer dan Informatika, 2(3), 9–16.
Duncan, R., & Schreuders, Z. C. (2019). Security implications of running Windows software on a Linux system using Wine: A malware analysis study. Journal of Computer Virology and Hacking Techniques, 15, 39–60.
Hidayati, S. N. (2016). Pengaruh pendekatan keras dan lunak pemimpin organisasi terhadap kepuasan kerja dan potensi mogok kerja karyawan. Jurnal Maksipreneur: Manajemen, Koperasi, dan Entrepreneurship, 5(2), 57–66. http://dx.doi.org/10.30588/SOSHUMDIK.v5i2.164
Josephine, T. S. S., & Siahaan, P. (2023). Analisis sistem keamanan dan proteksi pada sistem operasi Windows, Linux, dan MacOS. Sistem Dan Teknologi Informasi Indonesia (SINTESIA), 2(2), 64–70. Retrieved from https://journal.unj.ac.id/unj/index.php/SINTESIA/article/view/44081
Kemas, K. O. K. S., Supriyatna, A. R., & Putra, S. D. (2024). Autentikasi user dengan metode single sign-on berbasis Windows Active Directory pada PT. XYZ. ROUTERS: Jurnal Sistem dan Teknologi Informasi, 70–78.
Miclea, S. (2012). Windows and Linux security audit. Journal of Applied Business Information Systems, 3(4). Retrieved from http://www.jabis.ro/2012/4/0304012012.pdf
Motero, C. D., Higuera, J. R. B., Higuera, J. B., Montalvo, J. A. S., & Gómez, N. G. (2021). On attacking Kerberos authentication protocol in Windows Active Directory Services: A practical survey. IEEE Access, 9, 109289–109319.
Nelfira, N. (2017). Rancang bangun aplikasi pembelajaran sistem operasi Windows pada matakuliah sistem operasi di STMIK Indonesia Padang berbasis multimedia interaktif. Jurnal Edik Informatika Penelitian Bidang Komputer Sains dan Pendidikan Informatika, 2(2), 182–189.
Risdwiyanto, A., & Kurniyati, Y. (2015). Strategi pemasaran perguruan tinggi swasta di Kabupaten Sleman Yogyakarta berbasis rangsangan pemasaran. Jurnal Maksipreneur: Manajemen, Koperasi, dan Entrepreneurship, 5(1), 1–23. http://dx.doi.org/10.30588/SOSHUMDIK.v5i1.142
Smith, R. E. (2002). Authentication: From passwords to public keys. Addison-Wesley Professional.
Yudhana, A., & Riadi, I. (2022). Analisis kinerja perangkat lunak forensic imaging pada sistem operasi Linux menggunakan metode static forensic. Insect (Informatics and Security): Jurnal Teknik Informatika, 8(1), 38–47.
Yunianto, I., & Adhiyarta, K. (2020). Jurnal review: Perbandingan sistem operasi Linux dengan sistem operasi Windows. Jupiter: Journal of Computer & Information Technology, 1(1), 1–7.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Neptunus: Jurnal Ilmu Komputer Dan Teknologi Informasi
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.