ABSTRAK :
Along with the development of current technology, making technology is very important in today s life. SECURITY LEVEL digital DATA has become MORE vulnerable TO exploitation,
the problem arises
WHEN an information technology device was attacked BY people who DO
NOT want TO take A responsible
AND important DATA illegally,
so the administrator must act quickly TO secure important DATA .Making A DATA SECURITY technology ON the internet IS very important information.Limitations administrator underlying the creation OF A SYSTEM that IS able TO detect
AND defense systems against such attacks IS automation,
so that it can be applied TO DATA SECURITY .The SYSTEM IS built TO prevent attacks ON computer networks WITH MORE SPECIFIC ON THC - Hydra.This SYSTEM will ANALYZE the NUMBER OF errors IN the log INTO the DATABASE,
AND
IF the error exceeds the tolerance rules ARE made BY the administrator.
IF the error IS MORE THAN 3 times IN one MINUTE,
THEN
WITH automation,
the SYSTEM will CREATE A RULE that can imprison users who DO
NOT have such ACCESS,
AND ACCESS TO the prison IN the illegal USER can NOT perform such activities ON legal ACCESS
AND ACCESS TO activities conducted illegal USER can be recorded ON A file
AND jail.txt.So UNDER ANY circumstances
AND NOT IN supervising administrator,
the SECURITY OF other USER DATA will be safe
AND can NOT be retrieved
OR viewed BY A USER OF illegal ACCESS .Keywords : Automation,
THC - Hydra,
the illegal USER ACCESS,
legal USER ACCESS .
|