Analisis Efektivitas Kebijakan Manajemen User dan Firewall pada Sistem Operasi dalam Mencegah Akses Ilegal
DOI:
https://doi.org/10.62671/jikum.v2i1.146Keywords:
Operating System Security, Firewall, User Management, Illegal Access.Abstract
Information system security is a crucial aspect in managing modern operating systems as the threat of unauthorized access to information systems increases. Therefore, effective protection strategies such as user access management policies and firewall implementation are needed in operating systems. This study aims to analyze the effectiveness of user management and firewall policies in preventing unauthorized access to operating systems by comparing their implementations in Windows and Linux. The method used in this study is a qualitative approach through literature studies of various relevant research and case studies. The findings show that user management plays a role in controlling internal access rights by implementing the principle of least privilege, while firewalls function as an effective external defense layer in controlling network traffic. Both complement each other in maintaining system security. However, their success is highly dependent on the implementation of stable rules, accurate settings, and the competence of system administrators. By combining good policies and proper firewall configuration, operating systems can be more robust against various unauthorized access risks, thus maintaining data and infrastructure security.
References
NIST SP800-53, “Security and Privacy Controls for Information Systems and Organizations,” NIST Spec. Publ., p. 465, 2020, [Online]. Available: https://doi.org/10.6028/NIST.SP.800-53r5
S. Rose, O. Borchert, S. Mitchell, and S. Connelly, “NIST Special Publication 800-207,” 2022.
M. Lutfi Yusuf, K. Karsono, N. Budhisantosa, J. Arjuna No, and K. Jeruk Jakarta Barat DKI Jakarta, “Analisis Performance Next Generation Firewall Dan Mikrotik Rb1100 Sebagai Firewall Untuk Keamanan Jaringan JIK,” J. Ilmu Komput., vol. 5, no. 1, pp. 15–30, 2020.
A. R. Kannajmi et al., “Evaluasi Efektivitas Hardening dalam Meningkatkan Keamanan Sistem Operasi Windows dan Linux,” IJINF (Internal J. Informatics) Eval., pp. 1–17, 2025.
A. Ramadhani, N. Palasara, and A. Gani, “Filtering Firewall dan Manajemen Bandwidth untuk Keamanan Jaringan pada Kelurahan Buaran Indah,” Remik, vol. 9, no. 1, pp. 346–355, 2025, doi: 10.33395/remik.v9i1.14482.
A. N. Reyfaldi and A. Rahmatulloh, “Optimalisasi Konfigurasi Firewall MikroTik Menggunakan Metode Filter Rules Untuk Keamanan Jaringan,” J. Inform. dan Ris., vol. 2, no. 2, pp. 5–12, 2024, [Online]. Available: https://ejournal.bhamada.ac.id/index.php/IRIS/article/view/744%0Ahttps://ejournal.bhamada.ac.id/index.php/IRIS
M. B. Yel, D. I. Mulyana, J. R. F, M. D. Nurfaishal, and M. H. T. B, “Optimalisasi Keamanan Firewall Pada Infrastruktur Jaringan Smk Idn Bogor,” J. Cahaya Mandalika, vol. 4, no. 1, pp. 594–610, 2023, [Online]. Available: https://www.ojs.cahayamandalika.com/index.php/JCM/article/view/1393
R. Al Fajar, A. Lestari, and J. Teknologi Informasi, “Analisis Perbandingan Sistem Operasi Windows 11 dan Linux Ubuntu Menggunakan Metode Studi Literatur (Studi Kasus: Kinerja Sistem, Keamanan dan Biaya),” J. Bitwise ISSN xxxx-xxxx, vol. 1, no. 2, pp. 74–82, 2025, [Online]. Available: https://jurnal-bitwise.org/
H. P. Fitrian, B. F. Noorjamil, F. Rahmawati, and S. A. Rachman, “Analisis Efektivitas Firewall dalam Memfilter dan Melindungi Lalu Lintas Jaringan,” J. Nas. Komputasi dan Teknol. Inf., vol. 8, no. 1, pp. 95–102, 2025, doi: 10.32672/jnkti.v8i1.8554.
C. A. Gemawaty and Y. Yuliani, “Manajemen Identitas Dan Akses Dalam Keamanan Sistem Informasi (Pendekatan Literature Review),” J. Manaj. Inform. Jayakarta, vol. 4, no. 4, pp. 396–403, 2024, [Online]. Available: http://journal.stmikjayakarta.ac.id/index.php/JMIJayakarta
B. R. Lesmana, A. Junaidi, and A. N. Sihananto, “Analisis Pengujian Keamanan Firewall Pada Sistem X Di Universitas Z,” J. Inf. Syst. Applied, Manag. Account. Res., vol. 8, no. 3, p. 557, 2024, doi: 10.52362/jisamar.v8i3.1563.
Y. Yuricha and I. K. Phan, “Penerapan Role Based Access Control dalam Sistem Supply Chain Management Berbasis Cloud,” MALCOM Indones. J. Mach. Learn. Comput. Sci., vol. 3, no. 2, pp. 339–348, 2023, doi: 10.57152/malcom.v3i2.1259.
G. Al Godzali, R. I. Athallah, and E. Rivalni, “Evaluasi Keamanan Autentikasi Pengguna pada Sistem Operasi Windows dan Linux,” Neptunus J. Ilmu Komput. dan Tekknologi Inf., vol. 3, no. 1, pp. 31–40, 2025.



