Protokol HTTPS, Apakah Benar-benar Aman?

  • Deddy Prayama Politeknik Negeri Padang
  • Yuhefizar Politeknik Negeri Padang
  • Amelia Yolanda Politeknik Negeri Padang
Keywords: protocol, http, https, website, security


In particular, the method used in this research is a case study where previously the website still uses the http protocol. However http protocol does not have a method of securing data in its communication. The final result of this research is the design and implementation of the https protocol for data communication security that occurs between visitors and the website. The https protocol that has been implemented is tested to ensure the data traffic on the website is guaranteed to be safe and protected from possible piracy and data theft.



Download data is not yet available.


Fielding, R., Reschke, J.,2014, RFC 7230 - Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing, IETF

Fielding, et al, RFC 2616 – Hypertext Transfer Protocol (HTTP/1.1) 15 Security Consideration

Willy Sudiarto Raharjo, Aloysius Airlangga Bajuadji, 2016, Analisa Implementasi Protokol HTTPS pada situs web perguruan tinggi di pulau Jawa, Ultimatics, Jurnal Ilmu Teknik Informatika, Universitas Multimedia Nusantara.

Evan Gilman, Doug Barth, 2017, Zero Trust Network, Building Secure Systems in Untrusted Networks (Kindle Edition),UK , O-Reilly

Forshaw, James, 2017, Attacking Network Protocol: A Hacker's Guide to Capture, Analysis, and Exploitation 1st Edition, San-Francisco, No Starch Press

Rahim, Robbi & Ratnadewi, Ratnadewi & Prayama, D & Asri, E & Satria, D., 2018. Base64, End of File and One Time Pad for Improvement Steganography Security. IOP Conference Series: Materials Science and Engineering. 407. 012161. 10.1088/1757-899X/407/1/012161.

Satria, Deni & Alanda, Alde & Erianda, Aldo & Prayama, Deddy. (2018). Network Security Assessment Using Internal Network Penetration Testing Methodology. JOIV : International Journal on Informatics Visualization. 2. 360. 10.30630/joiv.2.4-2.190.

Tanenbaum, Andrew, S; Weatherall, David, J , 2011, Computer Network , Fifth Edition, USA, Prentice Hall

Rice, Liz, 2020, Container Security: Fundamental Technology Concepts that Protect Containerized Applications, O'Reilly Media, Inc.

Justin Meza, Tianyin Xu, Kaushik Veeraraghavan, and Onur Mutlu, 2018, A Large Scale Study of Data Center Network Reliability, Proceedings of the Internet Measurement Conference 2018, Association for Computing Machinery, 2018.

K, Allen Scott, 2012, What Every Web Developer Should Know About HTTP, OdeToCode LLC; 3rd Edition, US, OdeToCode

Qualys. Inc, 2020, SSLLabs, [update 2020] tersedia di [Accessed 23 November 2020]

Xiong G., Tong J., Xu Y., Yu H., Zhao Y. (2014) A Survey of Network Attacks Based on Protocol Vulnerabilities. In: Han W., Huang Z., Hu C., Zhang H., Guo L. (eds) Web Technologies and Applications. APWeb 2014. Lecture Notes in Computer Science, vol 8710. Springer, Cham.

Mozilla Observatory, 2017, Web Security, [updated 2017] tersedia di [Accessed 25 November 2020]

How to Cite
D. Prayama, Yuhefizar, and Amelia Yolanda, “Protokol HTTPS, Apakah Benar-benar Aman?”, JACOST, vol. 2, no. 1, pp. 7 - 11, Jun. 2021.
Bookmark and Share