Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Prosiding Snastikom

SMART LOGIN PADA WEBSITE DENGAN MENGGUNAKAN QR CODE DAN OTENTIKASI ONE TIME PASSWORD Lois Adelson; Dodi Siregar; Kalvin Chiuloto
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2020): PROSIDING SNASTIKOM 2020
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (274.973 KB)

Abstract

The use of passwords has been used in many ways such as logging into a website application. However, most of these passwords still use static passwords, making them vulnerable to tapping login passwords. There are many ways that hackers can do to hack into websites that use a login system, such as phishing techniques. Layered security is required to secure the login system, the use of the OTP code is one way of verification and can only be accessed by the user himself so that it can reduce the potential for wiretapping of access rights. The application of QR Code technology is quite practical and provides an easy solution to enter the system. Users don't need to log in by entering their username and password repeatedly, just pointing the QR Code at the webcam to be scanned. To increase login security to prevent intrusion into the system, authentication is made in the form of a unique, single-use code called One Time Password (OTP). The password that previously used one username and one password will be added to another random password which will be sent to the user's cellular phone via SMS message. This research is able to provide convenience when accessing a QR Code login and increasing security in the system because the OTP code that is sent is only valid for one login session and is valid for only 5 minutes, so the OTP code cannot be reused in the next login session.
Simulasi Jaringan MAN (Metropolitan Area Network) Menggunakan Metode Static Nat IPV4 Dan IPV6 Arif Novriadi; Dodi Siregar; Mufida Khairani
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2021): Prosiding Snastikom 2021
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (808.44 KB)

Abstract

Advances in information technology to support all needs and demand for information for companies through the creation of news presentation media on the development of personal computer network technology is getting higher, the need for using internet-based information makes data security vulnerable to become an important issue, to simulate computer networks requires a software called Cisco Packet Tracer. This application is used to simulate a MAN network. To connect the MAN network requires a routing. EIGRP routing is one of the most frequently used interior routing for wide coverage. MAN network works to connect different networks from a set of LAN networks. The simulation must have security to protect the server. Network address translation (NAT) is one of the methods used as IP translation to get into different networks. Based on the results of the Static NAT IPv4 IPv6 simulation trials that have been carried out, the results of traffic security on the network are obtained so that there is no IP buildup that will hinder the communication path on the server, with a Static time delay of 0.782 sec
Penerapan Teknik Data Mining Dengan Menggunakan Algoritma Eclat Untuk Mendukung Startegi Promosi Dhea Rulana Arfasyah P; Dodi Siregar; Yunita Sari Siregar
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2021): Prosiding Snastikom 2021
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (823.722 KB)

Abstract

Business competition, especially in supermarkets and retail stores, forces shoppers to decide and find the best policy they want, especially in terms of convenience in choosing products. The problem faced by companies, especially customers or buyers, is that they cannot take full advantage of obtaining business information in terms of getting product locations easily and can save time. so the company database can not be used to support business decisions. This research requires a simple model that allows to determine the model when placing a product to overcome the problems that arise at this time by using data mining techniques in determining the product to be placed in a strategic place. products and can form this transaction pattern to find out information from products that often appear and is the process needed to change unused data points to provide more useful and valuable information to support decision making. This research produces a web-based system to be used in determining the items that must always be available according to the results of the eclat algorithm. The purpose of this study is to obtain an accurate pattern of transaction tendencies by applying the ECLAT Algorithm calculations and developing a varied search for case studies in minimarkets to find out patterns of shopping behavior based on consumer history using the ECLAT algorithm.