Didit Hermawan
Universitas Islam Negeri Alauddin Makassar

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Implementasi Extract Transform Load Pada Data Akademik Perguruan Tinggi Nahrun Hartono; Didit Hermawan
Journal Software, Hardware and Information Technology Vol 1 No 2 (2021)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v1i2.16

Abstract

Each department at university needs to analyze student data and scores. By analyzing student grades, majors can improve lecturer performance in learning; one way to explore student grades is to collect student grade data and then process the data to produce information in the form of learning performance results that can be used to make decisions to improve lecturer performance. The author will analyze a structured programming course student score data; the following collected data are related to student attendance, assignment scores, mid-semester exam scores, and final semester exam scores. After all the data needed has been organized to build the data warehouse, the following process is the ETL process (Extract, Transform, and Load), as the tool used in the ETL process is Pentaho. This data extraction process using 1 data source, namely student value data with excel file type. After carrying out the extraction process, there is a data transformation process, namely making some changes to the extracted data to make it more consistent and uniform according to the needs of the data warehouse.
Internet of Things (IoT): Security, Threats and Countermeasures Zulkarnaim Masyhur; Firmansyah Ibrahim; Didit Hermawan
Journal Software, Hardware and Information Technology Vol 2 No 2 (2022)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v2i2.31

Abstract

Internet of Things (IoT) is a technology that is very popular lately and is starting to get busy in Indonesia, marked by various cellphone manufacturers building an IoT ecosystem. IoT can help connect objects such as sensors, vehicles, hospital instruments, household appliances and others. However, connecting these smart devices to the internet network causes various data security problems because internet technology and communication protocols have not been specifically designed to support IoT devices. The leakage of data security through the commercialization of IoT devices, causes privacy problems, threats of cyber-attacks, and organized crime. This paper aims to educate about how data security attacks in IoT and how to overcome them. To achieve this goal, we first discuss various well-known IoT reference models and define security in the context of IoT. Second, identify and classify various IoT attacks and threats. Third, described methods of countermeasures against IoT attacks. In the end, it provides some tips on securing IoT devices.