TY - THES N1 - Pembimbing: Dr. Ir. Bambang Sugiantoro, S.Si., M.T. ID - digilib49444 UR - https://digilib.uin-suka.ac.id/id/eprint/49444/ A1 - Mukti Ardana Putra, NIM.: 17106050044 Y1 - 2022/01/24/ N2 - Mikrotik Router is an operating system in the form of software that is used by the JTCC Yogyakarta company, for the function of the Mikrotik router itself to turn the computer into a network router, and it should also be noted that this operating system is very suitable for computer network administration purposes, for example to build small-scale network systems large and both have differences, Mikrotik with its operating system has its advantages, it is light and simple, while the router is a hardware device that bridges between 2 networks with many people who use Mikrotik routers, including the JTCC Yogyakarta company. This study aims to observe how the network security system designed by the JTCC Yogyakarta company both in terms of wireless, hardware, and software developed by related parties, whether this network security meets company standards, therefore researchers will make observations in the form of Security attacks that occur in companies are related to using the nmap port scanning method, this method was chosen because it is more complex in finding network security holes or making it easier to find the attack process. The result of this research is an nmap port scanning method that is able to detect and view security holes that are prone to attacks on Mikrotik routers with other tools such as Winbox Mikrotikos, Hydra, Ubuntu and others, making this researcher more effective and efficient. PB - UIN SUNAN KALIJAGA YOGYAKARTA KW - Port Scanning Nmap KW - Mikrotik Router KW - Hydra KW - Proses Analisis Dan Pengujan M1 - skripsi TI - ANALYSIS DETEKSI SERANGAN KEAMANAN MIKROTIK ROUTER MENGGUNAKAN METODE PORT SCANNING NMAP STUDI KASUS: JTCC YOGYAKARTA AV - restricted EP - 107 ER -