Claim Missing Document
Check
Articles

Found 7 Documents
Search

KEBIJAKAN STANDARISASI DATA DAN PROBLEM INTEROPERABILITAS PADA APLIKASI E-GO VERNMENT Edhy Sutanta; Jazi Eko Istiyanto
CCIT Journal Vol 6 No 1 (2012): CCIT JOURNAL
Publisher : Universitas Raharja

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (6497.825 KB) | DOI: 10.33050/ccit.v6i1.372

Abstract

Interoperabilitybetween systemsine-Gov inlndonesiais animportantandurgentproblemtobe overcome. Data standardizationpolicyis an efforttowardsinteroperability, but itcanalsobe acause ofthe problemof interoperabilityine-Gov applications. Efforts tostandardizethe dataforthee-Gov systemhas beenperformedbyseverallocalandcentralgovernment agencies, butsince noclearframeworkof nationalguidelines, the majority ofdata standardizationis stillsectoral. This raises thenewproblemsrelated tointeroperabilitybefiveen systemsine-Gov. The neweffortis neededin the task ofdevelopa nationaldata standardsrequiredby allagencies sectors. Involvement ofallagenciesin the preparation ofnationaldata standardsnecessarytoanticipatethe variousneeds ofmulti-sectoraldata andinformation.Communication and InformationA/finistryof Indonesiais theappropriateagencytocarry outthe task,because it hassufficient authoritytothe horizontal(coordination function) and vertically(control function). This paperdiscusses thepolicy ofstandardization of dataandproblemsassociated with theinteroperabilityacross systemsine-Gov, and itsidea ofa solution to theproblem.
Towards Formal Specification of PaperLess Office Systems Bambang Nurcahyo Prastowo; Jazi Eko Istiyanto; Ahmad Ashari; Khabib Mustofa
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2015
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstract—The Center for Information and CommunicationTechnology Services of Gadjah Mada University runs a kind offormal office communication system called PLO (stands forPaperLess Office). Developed to serve ad hoc needs of the center,the system evolves for several years without properdocumentation. Several attempt store write the system failed dueto the lack of the documentations. Judging from the fact that it hasbeen serving the institution well for several years, the system canbe treated as a user requirement. A formal specification is writtenbased on it.Keywords—formal specification; paperless office; informationsystem
Implementasi Sistem Pelacakan Kendaraan Bermotor Menggunakan Gps Dan Gprs Dengan Integrasi Googlemap Yazid Dul Muchlisin; Jazi Eko Istiyanto
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 2 (2011): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2021

Abstract

Abstract— Vehicle tracking system using GPS and GPRS integration googlemap provide information that is maximized with the technology of GPS (Global Positioning System) receiver which can indicate the position of the vehicle with the map and the ability of the appointment of direction and position coordinates (x, y or latitude, longitude) textually and visual at any location. Vehicle tracking system is built using equipment GIS (Geographic Information System) and dedicated to smartphones which support Global Positioning System (GPS), as well as portable computers, using General Packet Radio Service (GPRS) as a connection to the internet. The hardware used is a smartphone that supports GPS with supporting tools used are GoogleMaps, Notepad + +, NetBeans IDE 6.5.1, Mysql, Java (J2ME), PHP, JavaScript. The results of this system in the form of tracking system capable of monitoring the movement of vehicles on an ongoing position by utilizing GPS and GPRS as the sender of the wireless data and Internet connections.  Keywords— GIS, GPS, GPRS, googlemaps, J2ME,
Analisis Forensik Jaringan Studi Kasus Serangan SQL Injection pada Server Universitas Gadjah Mada Resi Utami Putri; Jazi Eko Istiyanto
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 6, No 2 (2012): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2157

Abstract

AbstrakForensik jaringan merupakan ilmu keamanan komputer berkaitan dengan investigasi untuk menemukan sumber serangan pada jaringan berdasarkan bukti log, mengidentifikasi, menganalisis serta merekonstruksi ulang kejadian tersebut. Penelitian forensik jaringan dilakukan di Pusat Pelayanan Teknologi Informasi dan Komunikasi (PPTIK) Universitas Gadjah Mada.Metode yang digunakan adalah model proses forensik (The Forensic Process Model) sebuah model proses investigasi forensik digital, yang terdiri dari tahap pengkoleksian, pemeriksaan, analisis dan pelaporan. Penelitian dilakukan selama lima bulan dengan mengambil data dari Intrusion Detection System (IDS) Snort. Beberapa file log digabungkan menjadi satu file log, lalu data dibersihkan agar sesuai untuk penelitian.Berdasarkan hasil penelitian yang telah dilakukan, terdapat 68 IP address  yang melakukan tindakan illegal SQL Injection pada server www.ugm.ac.id. Kebanyakan penyerang menggunakan tools SQL Injection yaitu Havij dan SQLMap sebagai tool otomatis untuk memanfaatkan celah keamanan pada suatu website. Selain itu, ada yang menggunakan skrip Python yaitu berasal dari benua Eropa yaitu di Romania. Kata kunci—forensik jaringan, model proses forensik, SQL injection AbstractNetwork forensic is a computer security investigation to find the sources of the attacks on the network by examining log evidences, identifying, analyzing and reconstructing the incidents. This research has been conducted at The Center of Information System and Communication Service, Gadjah Mada University.The method that used was The Forensic Process Model, a model of the digital investigation process, consisted of collection, examination, analysis, and reporting. This research has been conducted over five months by retrieving data that was collected from Snort Intrusion Detection System (IDS). Some log files were retrieved and merged into a single log file, and then the data cleaned to fit for research.Based on the research, there are 68 IP address was that did illegal action, SQL injection, on server www.ugm.ac.id. Most of attackers using Havij and SQLmap (automated tools to exploit vulnerabilities on a website). Beside that, there was also Python script that was derived from the continent of Europe in Romania. Keywords— Network Forensics, The Forensic Process Models, SQL Injection
APPLICATION FOR MOBILE AGENT TO ACCESS MYSQL Bambang Sugiantoro; Retantyo Wardoyo; Sri Hartati; Jazi Eko Istiyanto
IJID (International Journal on Informatics for Development) Vol. 1 No. 2 (2012): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (322.188 KB) | DOI: 10.14421/ijid.2012.01204

Abstract

Availability of information is increasing rapidly, the method for encoding and storage of information also increased. The number of sources of information brings several problems, among them about how to combine the distributed data storage and different. Information on an organization or company is usually stored in separate locations and different formats. When there is an increase in storage capacity and the amount of information search costs, the company faced with an abundance amount of data. System development methodology used is Rapid Application Development (RAD) with a development framework Guidlines for Rapid Application Engineering (GRAPPLE). The software used in building this application is Borland Jbuilder 9. Rational Rose 2000 is used for the analysis and design using Unified Modeling Language (UML). Mysql server is a type of database to be accessed on each operating system. Operating system used in this study is Windows XP and Linux Fedora Core. This application was developed with aglets, which is one of software for building mobile agent applications.
Distributed Database Using Mobile Agent Bambang Sugiantoro; Retantyo Wardoyo; Sri Hartati; Jazi Eko Istiyanto
IJID (International Journal on Informatics for Development) Vol. 1 No. 1 (2012): IJID May
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (202.233 KB) | DOI: 10.14421/ijid.2012.01102

Abstract

The number of sources of information brings several problems, among them about how to combine the distributed data storage and different. Information on an organization or company is usually stored in separate locations and different formats. When there is an increase in storage capacity and the amount of information search costs, the company faced with an abundance amount of data. System development methodology used is object oriented design with a development framework
Pengembangan Teknologi Informatika dengan Berbagai Aspeknya Jazi Eko Istiyanto
Unisia No. 27: Tahun XV Triwulan III 1995
Publisher : Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20885/unisia.v0i27.5521

Abstract

-