Articles
Training on how to use Social Media Wisely and Ethically
Herman Herman;
Imam Riadi;
Dikky Praseptian M;
Faiz Isnan Abdurrachman;
Syahrani Lonang
ABDIMAS: Jurnal Pengabdian Masyarakat Vol. 5 No. 2 (2022): ABDIMAS UMTAS: Jurnal Pengabdian Kepada Masyarakat
Publisher : LPPM Universitas Muhammadiyah Tasikmalaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (803.308 KB)
|
DOI: 10.35568/abdimas.v5i2.2686
Nowadays, the behavior of users in social media arguably represent human behavior in the real world. Training on how to use social media wisely and ethically to young ages is needed to grow the good behavior. Based on a preliminary study, the ages of students in SMK Kesehatan Binatama is considered a terget of such training. 15 years old dominates with 63.6% followed by 16 years old with 29.3% according to age which has the highest penetration rate of social media users reaching 99.16%, namely ages 13-18 years. The activeness of students in social media reaches 99%. The number of hours students use social media where 10.1 % stated between 0-2 hours, 40.4% stated 2-5 hours, 36.4% stated 5-10 hours and 11.1 % more than 10 hours. Knowledge training on social media has been carried out several times but must continue to be carried out along with the development of social media technology and the shift in the age of its users. Training activities with wise and ethical materials using social media have been successfully held with the expected results. Participants' knowledge and insight, namely students can increase with information regarding what can and should not be done when using social media, information about hoaxes and cyberbullying and the ITE Law can be understood properly. The survey results also show an increase in the knowledge provided from the criteria of understanding to criteria of very understanding with an increase from the average score on the pre-test 2.96 with a percentage of 59.2% to the average score on the post-test 3.64 with a percentage of 72.8%.
Analysis of Remote Access Trojan Attack using Android Debug Bridge
Deco Aprilliansyah;
Imam Riadi;
Sunardi
IJID (International Journal on Informatics for Development) Vol. 10 No. 2 (2021): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.14421/ijid.2021.2839
The security hole in the android operating system sometimes not realized by users such as malware and exploitation by third parties to remote access. This study conducted to identify the vulnerabilities of android operating system by using Ghost Framework. The vulnerability of the android smartphone are found by using the Android Debug Bridge (ADB) with the exploitation method as well as to analyze the test results and identify remote access Trojan attacks. The exploitation method with several steps from preparing the tools and connecting to the testing commands to the testing device have been conducted. The result shows that android version 9 can be remote access by entering the exploit via ADB. Some information has been obtained by third parties, enter and change the contents of the system directory can be remote access like an authorized to do any activities on the device such as opening lock screen, entering the directory system, changing the system, etc.
Analisis Penggunaan Metode ACPO (Association of Chief Police Officer) pada Forensik WhatsApp
Riski Yudhi Prasongko;
Anton Yudhana;
Imam Riadi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/j-sakti.v6i2.520
The development of smartphone technology is increasing, causing cyber crime to increase from year to year. One of the smartphone applications used by criminals is WhatsApp. The WhatsApp application is one of the most widely used insta messaging applications, especially in Indonesia. Violations such as hate speech, defamation, and fraud are common on the WhatsApp social network. This study was conducted with the aim of finding forensic evidence of cyberbullying behavior on the WhatsApp insta messaging application using the Association of Chiefs of Police (ACPO) method. This forensic phase involves planning, arresting, analyzing and presenting to search for digital evidence of cybercrimes using Belkasoft Evidence Center and HashMyFiles software. Digital evidence on smartphones can be found using case scenarios with 13 parameters that have been generated. The results of this study indicate that the Belkasoft Evidence Center digital forensic software is 81.92%, while HashMyfiles can detect the authenticity of digital evidence 79.96%.
PERAN STRATEGIS SCRUM MASTER PADA PENGEMBANGAN PERANGKAT LUNAK PERPUSTAKAAN SEKOLAH BERBASIS ANDROID
Agung Wahyudi;
Sunardi Sunardi;
Imam Riadi
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 7, No 3 (2022)
Publisher : STKIP PGRI Tulungagung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.29100/jipi.v7i3.2994
Kebutuhan akan fleksibilitas dan akses yang cepat menjadikan aplikasi berbasis mobile semakin banyak digunakan, termasuk dalam bidang pendidikan dan literasi. Penelitian ini bertujuan untuk mengkaji penerapan metode Scrum dalam pengembangan perangkat lunak mobile dengan mengkaji peran strategis Scrum Master. Scrum dikenal sebagai metode pengembangan aplikasi yang dinamis dan adaptif. Adapun tahapan dalam Scrum terdiri dari fase analisis kebutuhan sistem, design sistem, pengujian sistem, dan penerimaan produk. Metode penelitian yang digunakan adalah kualitatif dengan teknik wawancara sebagai cara pengumpulan data. Hasil wawancara kemudian direduksi, dianalisis dengan analisis dari literature, kemudian disajikan, dan disimpulkan. Penelitian ini dilakukan di SMA Negeri 88 Jakarta sebagai lokasi penerapan aplikasi perpustakaan online berbasis Android. Hasil dari penelitian ini menunjukkan bahwa peran strategis Scrum Master diantaranya adalah mengelola ekspektasi roles, perubahan resistensi, menepati jadwal, permintaan perubahan yang mendesak, dan pendistribusian tim. Peran strategis ini menjadi dasar untuk penunjukan atau pemilihan Scrum Master hendaknya mempertimbangkan dan dikualifikasi berdasarkan poin-poin tersebut
Steganografi Video Digital dengan Algoritma LSB (Least Significant Bit) dan Rijndael
Imam Riadi;
Sunardi;
Dwi Aryanto
Journal of Innovation Information Technology and Application (JINITA) Vol 2 No 2 (2020): JINITA, December 2020
Publisher : Politeknik Negeri Cilacap
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (767.109 KB)
|
DOI: 10.35970/jinita.v2i2.361
Steganography is the science and art of hiding information so that confidential information cannot be known by others, except the sender and receiver. This research is designed to create a steganography system on video with mp4 format. The message is inserted in one of the video frames, first encrypted with the Rijndael algorithm. The method of inserting messages in the video frame is the Least Significant Bit (LSB) method. Extraction of frames on video using ffmpeg software. Qualitative testing used to identify changes in video frames with human senses. Quantitative testing was carried out by testing six videos with different resolutions, while there were five inserted messages with varying Byte lengths. The frame that has been inserted with a message is measured for noise with the Peak Signal to Noise Ratio (PNSR). The test results show that the LSB method cannot be used for message insertion whose Byte size is greater than the capacity of the cover video. There is a change in image quality if the size of the inserted message bytes is getting bigger.
Analisis Penggunaan Metode ACPO (Association of Chief Police Officer) pada Forensik WhatsApp
Riski Yudhi Prasongko;
Anton Yudhana;
Imam Riadi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30645/j-sakti.v6i2.520
The development of smartphone technology is increasing, causing cyber crime to increase from year to year. One of the smartphone applications used by criminals is WhatsApp. The WhatsApp application is one of the most widely used insta messaging applications, especially in Indonesia. Violations such as hate speech, defamation, and fraud are common on the WhatsApp social network. This study was conducted with the aim of finding forensic evidence of cyberbullying behavior on the WhatsApp insta messaging application using the Association of Chiefs of Police (ACPO) method. This forensic phase involves planning, arresting, analyzing and presenting to search for digital evidence of cybercrimes using Belkasoft Evidence Center and HashMyFiles software. Digital evidence on smartphones can be found using case scenarios with 13 parameters that have been generated. The results of this study indicate that the Belkasoft Evidence Center digital forensic software is 81.92%, while HashMyfiles can detect the authenticity of digital evidence 79.96%.
Vigenère Cipher Algorithm Optimization for Digital Image Security using SHA512
Imam Riadi;
Abdul Fadlil;
Fahmi Auliya Tsani
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol 13 No 2 (2022): Vol. 13, No. 2 August 2022
Publisher : Institute for Research and Community Services, Udayana University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/LKJITI.2022.v13.i02.p02
One of the popular cryptographic algorithms is the Vigenère Cipher. This algorithm is included in classical cryptographic algorithms, so its capabilities are limited to text-type data. Through this research, this research try to modify the Vigenère Cipher so that it can be used on digital image media. The improvement is performed using ASCII code as a Vigenère table and the key generated by the SHA512 hash technique with salt. The encryption and decryption process was carried out on ten jpg and ten png files and showed a 100% success rate. Speed and memory consumption tests on the encryption process by comparing it with the AES algorithm show that AES excels in speed with 409,467 Mb/s while Vigenère wins in memory consumption by utilizing only 5,0007 Kb for every Kilobytes of the processed digital image file.
Mobile Device Security Evaluation using Reverse TCP Method
Imam Riadi;
Sunardi;
Deco Aprilliansyah
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 7, No. 3, August 2022
Publisher : Universitas Muhammadiyah Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.22219/kinetik.v7i3.1433
Security evaluation on Android devices is critical so that users of the operating system are protected from malware attacks such as remote access trojans that can steal users' credential data. Remote access trojan (RAT) attacks can be anticipated by detecting vulnerabilities in applications and systems. This study simulates a remote access trojan attack by exploiting it until the Attacker gains full access to the victim's device. The episode is carried out with several steps: creating a payload, installing applications to the victim's device, connecting listeners, and performing exploits to retrieve important information on the victim's device. Test material using Android 12, problems occurred when trying to install the application because a harmful warning will appear from Play Protect due to not using the latest version of privacy protection which causes the application to be indicated as malware and the like. On Android 11, the application injected with the backdoor was successfully installed on the device and successfully accessed by the attacker. Attackers also get vital information, including system information, contacts, call logs, messages, and full access to the victim's device system directory. Based on this research, it is expected that Android device users constantly update the Android version on the device they are using.
Penerapan Algoritma K-Means pada Pengelompokan Data Pendaftar Bantuan Biaya Pendidikan
Abdul Fadlil;
Imam Riadi;
Yana Mulyana
Jurnal Teknologi Informatika dan Komputer Vol 8, No 2 (2022): Jurnal Teknologi Informatika dan Komputer
Publisher : Universitas Mohammad Husni Thamrin
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.37012/jtik.v8i2.1261
Universitas Muhammadiyah Tasikmalaya merupakan salah satu perguruan tinggi yang mendapatkan bantuan biaya pendidikan untuk mahasiswa penerima program Kartu Indonesia Pintar Kuliah (KIP-Kuliah) disetiap tahunnya. Program ini diperuntukan bagi lulusan SMA/SMK/sederajat dari keluarga miskin/rentan miskin/afirmasi yang memiliki keinginan untuk melanjutkan belajar ke jenjang yang lebih tinggi. Hasil dari evaluasi pelaksanaan dalam penetapan data penerimaannya terdapat masalah karena data pendaftar masih banyak yang berasal dari keluarga mampu, disamping itu jumlah kuota yang diberikan oleh pemerintah sebanyak 30 kuota, jauh lebih sedikit daripada jumlah pendaftar yang berjumlah 191, sehingga harus ada metode yang dapat mengoptimalkan pengelompokan data pendaftar terlebih dahulu agar penetapan penerima bantuan biaya pendidikan KIP-Kuliah tepat sasaran. dalam penelitian ini penulis menggunakan metode Kmeans untuk pengelompokan data pendaftar dengan jumlah klaster sebanyak 3 (K=3). Hasil dari penelitian ini yaitu klaster C0 sebanyak 109 data (57,1%), klaster C1 sebanyak 52 data (27,2%), dan klaster C2 sebanyak 30 data (15,7%). Hasil dari sebaran data pada masing-masing kelompok, penulis merekomendasikan klaster C0 sebagai data kelompok yang dipertimbangkan, klaster C1 sebagai kelompok yang tidak layak dan klaster C2 sebagai kelompok yang layak mendapatkan bantuan biaya pendidikan / KIP-Kuliah.
Security on Charity Crowdfunding Services using KAMI Index 4.1
Tawar;
Imam Riadi;
Ariqah Adliana Siregar;
Adiniah Gustika Pratiwi
Engineering Science Letter Vol. 1 No. 01 (2022): Engineering Science Letter
Publisher : The Indonesian Institute of Science and Technology Research
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (474.972 KB)
|
DOI: 10.56741/esl.v1i01.61
Technological developments are multiplying. The ABC charity currently has a crowdfunding service. This service helps simplify the user management process. Security is a crucial issue to support and guarantee funders. This research aims to evaluate and provide recommendations for crowdfunding services to run safely and smoothly using the KAMI Index 4.1. This research consists of several steps, starting with observations made at charitable institutions. The following process is through focus group discussion activities to assess the level of information security of crowdfunding services. The analysis of the calculation results is used as the basis for developing recommendations. Based on the assessment results, crowdfunding services at charities obtained scores of I to I+, this indicates that the charity is still in its initial condition and has not yet implemented information security standards in managing crowdfunding services. Recommendations proposed to increase the value are carried out by compiling and implementing information security at the charity.