Claim Missing Document
Check
Articles

Found 9 Documents
Search

Cybersecurity Vulnerability Behavior Scale in College During the Covid-19 Pandemic Hendro Wijayanto; Iwan Ady Prabowo
Jurnal Sisfokom (Sistem Informasi dan Komputer) Vol 9, No 3 (2020): NOVEMBER
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/sisfokom.v9i3.1021

Abstract

The penetration of Indonesian internet users in first quarter of 2020 has increased by 17 percent compared to 2019. Based on Google Consumer Barometer in 2018, many 79% of Internet users in Indonesia use the internet on a daily basis. During the Covid-19 Pandemic, universities had to do Study From Home and Work From Home. This resulted, use of information technology and computers also increasing. This increase will have an impact on the level of cybercrime vulnerability. The scale of cyber vulnerability is needed to measure level of cybersecurity in universities, especially in data managers. There are five scales, Very Safe, Safe, Vulnerable, Very Vulnerable, and Dangerous. Where the scale is used in negative and positive statements. The measurement results show an average value of 3.3 or a vulnerable scale. Total average value of negative statements is 2.53 or scale close to vulnerability. So it is necessary to socialize the importance of cybersecurity to minimize occurrence of cybercrime.
OPTIMALISASI PENYUSUTAN EXIF METADATA DENGAN TEKNIK SUBSTITUSI NULL VALUE PADA KASUS KEAMANAN CITRA DIGITAL Hendro Wijayanto; Iwan Ady Prabowo; Paulus Harsadi
Jurnal Ilmiah SINUS Vol 16, No 1 (2018): Januari 2018
Publisher : STMIK Sinar Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (758.431 KB) | DOI: 10.30646/sinus.v16i1.327

Abstract

Data and information security technique is a way to keep an object confidential. eXchangable Image File Format (EXIF) Metadata is data information about digital image. In the digital forensic investigation, this is very useful for copyright security or safeguarding digital evidence. Steganography and cryptography techniques have been widely used to overcome these problem. However, from the research that has been done in terms of security EXIF of metadata digital image photography, there are still some weaknesses. Among them is the depreciation of the digital image size after decryption. Since the standard EXIF metadata treatmens released by JEIDA and CIPA have different characteristic with JFIF metadata. A null value will be deemed to be the content with a value of 1 in EXIF standard. While in JFIF metadata model, the value of null is considered to be worth 0 (zero). This is make the EXIF metadata security process is shrinking of -25,15% from the original size. With the optimizing null value before encryption, the same metadata will be obtained between original image and after decryption. The null value will be replaced with an empty string (it’s worth 1) before encryption. Results from the model obtained an average of -1,51% depreciation of the original digital image size.Therefore, this technique can optimize the digital image copyright protection.
Peningkatan Eksistensi Badan Usaha Milik Desa Bina Karya Mandiri dengan Sistem Informasi Berbasis Web Hendro Wijayanto; Ananda Dimas Pratomo
Jurnal Abdimas PHB : Jurnal Pengabdian Masyarakat Progresif Humanis Brainstorming Vol 5, No 2 (2022): Jurnal Abdimas PHB : Jurnal Pengabdian Masyarakat Progresif Humanis Brainstormin
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/japhb.v5i2.3032

Abstract

Badan Usama Milik Desa Bina Karya Mandiri merupakan BUMDesa milik Desa Kunden, Kecamatan Bulu, Kabupaten Sukoharjo yang bergerak dibidang penjualan dan jasa baik kebutuhan keseharian maupun pertanian dan wisata. Untuk meningkatkan eksistensi badan usaha dan pelayanan yang ada didalamnya, maka perlu adanya sosialisasi pada masyarakat umum. Di era transformasi digital saat ini menuntut informasi tersampaikan lewat dunia maya atau internet. Sehingga penyampaian informasi perlu didukung dengan adanya sistem informasi berbasis website. Untuk pembuatan sistem informasi berbasis website ini menggunakan tahapan pengumpulan data, perancangan, sosialisasi dan evaluasi. Hasil akhir dari pengabdian masyarakat berupa website sistem informasi BUMDesa Bina Karya Mandiri yang berisi seluruh aktifitas dan kegiatan yang tertuang dalam bentuk artikel, gambar dan video. Penilaian yang diberikan oleh pengelola BUMDesa dan masyarakat menunjukkan nilai Baik pada tampilan, konten dan kemudahan aksesibilitas.
PAZIIM DIGITAL EVIDENCE ANALYSIS APPLICATION ON ANDROID SMARTPHONES WITH A LOGICAL ACQUISITION APPROACH Dedy Hariyadi; Hendro Wijayanto; Indah Daila Sari
Cyber Security dan Forensik Digital Vol. 2 No. 2 (2019): Edisi November 2019
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (986.834 KB) | DOI: 10.14421/csecurity.2019.2.2.1603

Abstract

The use of social media in Indonesia has increased very rapidly in 2018 compared to the previous year. This makes a lot of social media made by the children of the nation appear, one of which is Paziim. Socializing on the internet is very easy to leak personal data. There are three aspects that can be utilized on online social networks (OSN) in the disclosure of private data to the public, namely the strength of the relationship (strong or weak), the type of relationship and the characteristics of one's habits. Mobile forensics is needed to analyze digital evidence on social media applications installed on Android smartphones. Indonesia through the National Standardization Agency (BSN) also issued standards related to digital forensics. Standards which are derived from ISO / IEC regulate Security Techniques - Guidelines for the Identification, Collection, Acquisition and Preservation of Digital Evidence. This standardization is known as SNI ISO / IEC 27037: 2014. From the results of cell phone forensic analysis on the Paziim application, the results found the username, coordinates, device models, and operators used by users in SQLite Web_Data and OneSignal.xml files
DEMILITARIZED ZONE AND PORT KNOCKING METHODS FOR COMPUTER NETWORK SECURITY Andik Saputro; Nanang Saputro; Hendro Wijayanto
Cyber Security dan Forensik Digital Vol. 3 No. 2 (2020): Edisi November 2020
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2020.3.2.2150

Abstract

Currently, the way of network communication has changed a lot. All aspects become very dependent on online services. Employees can work from home, and students of all ages take online classes. The more the public depends on staying connected to the network, the greater potential network attacks to occur. In a computer network, if it is not protected, it will data or file loss, damage to the server system, not being optimal in serving users or even losing valuable institutional assets. The attacks most often used in networks are Port Scanning and DDoS (Distributed Denial Of Service). In this study, the DeMilitarized Zone and Port Knocking methods are combined to secure computer networks. DeMilitarized Zone technique implementation is used to access local servers, so that they can be accessed from outside with Port Knocking technique. To open the access port that is filtered in the router configuration on the server network security system. DeMilitarized Zone and Port Knocking can be implemented on local and long distance networks where if an attacker wants to exploit or attack the main server, the first to be attacked is the firewall server (router). Port Knocking can also be implemented on local and long distance networks with a combined ping request time limit which makes it safer, so that if an attacker wants to access the router, and doesn't know the rules from the remote, what happens is a rejection of port access.
CYBER SECURITY BEHAVIOR MODEL ON HEALTH INFORMATION SYSTEM USERS DURING COVID-19 PANDEMIC Penggalih Mahardika Herlambang; Sylvia Anjani; Hendro Wijayanto; Murni Murni
Cyber Security dan Forensik Digital Vol. 3 No. 2 (2020): Edisi November 2020
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2020.3.2.2152

Abstract

The use of the Health Information System raises the risk of data leakage which is mostly caused by internal health facilities. For this reason, an instrument is needed that can measure the behavior of users who are at risk for the health information system used to minimize the potential for these leaks. Develop and test the validity and reliability of the questionnaire based Human Aspect of Information Security Questionaire (HAIS-Q), Risky Security Behavior Scale (RScB), and the tendency of Internet users in Indonesia. Based on the research 4 aspects that affect the security of Health Information System, namely the use of electronic devices, access to healthinformation systems, internet behavior, and unusual events in health facilities. The questionnaire developed consisted of 27 question items was valid (r count> r table) and reliable (Alfa Chronbach value of 0.777). The developed questionnaire design can be applied to assess the risk of cyber attacks on Health Information Systemsin health facilities. Further research is needed to implement the design of the questionnaire.
The Application of Non-linear Cubic Regression in Rice Yield Predictions Retno Tri Vulandari; Hendro Wijayanto; Afan Lathofy
Desimal: Jurnal Matematika Vol 3, No 3 (2020): Desimal: Jurnal Matematika
Publisher : Universitas Islam Negeri Raden Intan Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (381.404 KB) | DOI: 10.24042/djm.v3i3.6580

Abstract

The rice yields have fluctuated in Wonogiri Regency. This occasion happened in 2016-2018. Therefore, a prediction is needed to know whether rice yields will increase or decrease in the following year. The purpose of this study was to apply the polynomial non-linear regression method of third-degree in predicting rice yields. This study utilized the Unified Modeling Language (UML) as the system design, black-box testing as the functional testing, and MSE testing as the validity testing. The computed data was data of 2016-2018. The results showed that the prediction of 2017-2019 using the harvested area model produced more accurate calculations. The harvested area model produced the same MSE value in manual and application calculations, which were 405433,1349 in 2017, 312677,7798 in 2018, and 171183.6347 in 2019. The polynomial non-linear cubic regression is a solution to predict rice yields. The output of the application is the prediction information for rice yields
Kombinasi Penjualan Kain Batik Menggunakan Metode Apriori Yustina Retno Wahyu Utami; Hendro Wijayanto; Richi Adi Prasetyo
Jurnal Teknologi Informasi dan Komunikasi (TIKomSiN) Vol 10, No 2 (2022): Jurnal TIKomSiN, Vol. 10, N0. 2, Oktober 2022
Publisher : STMIK Sinar Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30646/tikomsin.v10i2.649

Abstract

The existence of operational activities selling batik cloth every day will increase more and more, If left alone, the transaction data will only become meaningless garbage. is an individual company that manufactures and sells batik with various types of batik. The types of batik include Batik Insights, Color Insights, Cash Written Batik, Fine Written Batik, Fine Granite Written Batik, Night Print Batik, Stamped Batik, Combined Batik, Dagel Batik. In processing sales data, it is still done manually, which only uses records and receipts, so the data only functions as an archive. The data used in this study are sales transaction data for 2 years with a total of 215 transactions. The purpose of this study is to implement apriori algorithm system for the combination of batik fabric sales on Dewi Ratih batik so that it can help to find out the types of batik that are most often purchased. The results of this study are to determine which combination of batik fabric sales are most often bought simultaneously by determining a minimum support of 30% and a minimum confidence of 70% with a comparison of Weka and PHP MysQL applications with an accuracy rate of 100%
IMPLEMENTASI METODE DOUBLE EXPONENTIAL SMOOTHING PADA PREDIKSI JUMLAH PRODUK UMKM Nacita Agnes Dorestin; Retno Tri Vulandari; Wawan Laksito Yuly Saptomo; Bebas Widada; Hendro Wijayanto
Journal of Technology, Mathematics and Social Science Vol 3, No 2 (2023): JURNAL J'THOMS (Desember 2023)
Publisher : IKIP PGRI Bojonegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30734/j'thoms.v3i2.3711

Abstract

Y2K Batik is an SME (Small and Medium Enterprise) engaged in batik. Y2K Batik produces and sells beach wear with various motifs. One of the important things in business is inventory of merchandise, inventory of merchandise is a factor in determining the success of a trading company to achieve its goals, because the goods sold affect the level of income to increase company profits. With these considerations, it is necessary to analyze the production of beach wear for the availability of merchandise in fulfilling customer orders. Based on the above background, the scope of the problem in this study is master data collection obtained from records of selling beach batik cloth periodically from time to time. By utilizing the existing data and applying certain methods, a sales forecasting prediction can be made using the Double exponential Smoothing method. From the results of calculations and testing of forecasting data on the Mandala Motif Beach Fabric variable with the most optimal value using = 0.9 of 2127 with an error value of 19.46% and an accuracy rate of 80.54% (Good). The Canting Motif Beach Wear variable with the most optimal value using = 0.9 of 3174 with an error value of 3.61% and an accuracy rate of 96.39% (Very Good). Double Exponential Smoothing is the most widely used method to determine the trend equation of the second smoothing data through a smoothing process. The programming language uses Microsoft Visual Studio 2013 and the DBMS uses Microsoft SQL Server 2012. The purpose of this research is to create a system that can simplify the process of analyzing the production of beach wear in order to meet the availability of goods ordered by customers