Claim Missing Document
Check
Articles

Found 6 Documents
Search

Optimization of System Authentication Services using Blockchain Technology Imam Riadi; Herman Herman; Aulyah Zakilah Ifani
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 6, No. 4, November 2021
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v6i4.1325

Abstract

With the development of the era, one thing that must be considered for security is the Login System. In most cases, user login information is stored on the server. This gives access to sensitive informatio, many hackers easily break into data from users. Based on these problems, this research focuses on data security authentication in the form of usernames and passwords in the login system. Authentication using blockchain is used to reduce malicious access and increase security for the authentication process. One of the innovative technologies that can solve these problems is Blockchain Technology. Using blockchain technology, hackers will find it difficult to change and modify the same data on all computers at the same time because it takes a very long time to crack the encryption code on each block of data in the entire computer network. Data storage or transactions in the blockchain are stored in the form of hashes. This makes it difficult for hackers to break into it. Tests in this study using Wireshark tools and network miner. Based on the research conducted, the test was conducted as many as 5 times with two scenarios, namely authentication of the login system before using the blockchain and after using the blockchain. The results obtained. The, system built using blockchain can secure data. The test results obtained that data in the form of usernames and passwords were converted into hashes and with the immutable nature of the blockchain, data from users could not be changed or replaced by anyone.
Penerapan Clustering K-Means untuk Pengelompokan Tingkat Kepuasan Pengguna Lulusan Perguruan Tinggi Dikky Praseptian M; Abdul Fadlil; Herman Herman
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 3 (2022): Juli 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i3.4191

Abstract

One way to evaluate the quality of graduates is to provide questionnaires to graduate users, namely agencies / companies in the world of work in order to assess the quality of graduates of each university. Questionnaires for graduates are generally carried out by filling out the questionnaire form physically and then returning to the college. The K-Means method is one of several non-hierarchical clustering methods. Data clustering techniques are easy, simple and fast. Many approaches to creating clusters or groups, such as creating rules that dictate membership in the same group/group based on the level of similarity between the members of the group. Other approaches such as creating a set of functions to measure multiple criteria from grouping as a function of some parameters of clustering/grouping. From the results and discussions, K-Means clustering succeeded in grouping graduate user satisfaction data into three clusters where the results shown by manual calculations and applications showed the same results where clusterS C1 as many as 48 alternatives, C2 as many as 1 alternative, and C3 as many as 2 alternatives. In the sense that the application that is built successfully implements K-Means clustering is evidenced by the comparison of applications with weka tools has similar percentage results. In terms of the percentage of graduate users or alumni from STMIK PPKIA Tarakanita Rahmawati 94.12% Very satisfied, 1.96% Satisfied and 3.92% Quite Satisfied.
Analisis Forensik Aplikasi TikTok Pada Smartphone Android Menggunakan Framework Association of Chief Police Officers Fitri Anggraini; Herman Herman; Anton Yudhana
JURIKOM (Jurnal Riset Komputer) Vol 9, No 4 (2022): Agustus 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v9i4.4738

Abstract

TikTok is the most popular social media app that ranks sixth in the world in January 2022 according to We Are Media & Hootsuite. Along with the increasing number of uses of this application, the negative impacts it causes are also increasing, ranging from fraud, cyberbullying, to the spread of fake news (hoax). This study focuses on the negative impact of defamation. The purpose of the research is to plan and implement a digital forensics process using the Association of Chief Police Officers (ACPO) framework to raise evidence of defamation cases on the TikTok application. The forensic process is carried out in the form of static forensics on cases that are intentionally made in the form of simulating TikTok postings using an android smartphone. This research combines the ACPO forensics framework with the Magnet Axiom forensics tools. The combination of the two succeeded in raising 77% of evidence in the form of data messages, videos, and hashtags. Where these data have been previously defined as initial data posted in the simulation process
Metode Dempster Shafer pada Sistem Pakar Penentuan Penyakit Bayi Herman Herman; Sunardi Sunardi; Virasanty Muslimah
JURIKOM (Jurnal Riset Komputer) Vol 9, No 5 (2022): Oktober 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v9i5.4908

Abstract

The baby’s immune system is still weak so it needs special attention. Parents are advised to check their baby to the health service regularly. There are along queues due to limited hours of service or doctor’s practice in serving patients. Parents need expert systems to facilitate detection and early prevention. Systems that try to adapt human knowledge to computers to solve problems in the way that experts do are called expert systems. The dempster shafer method will be used in this study as an expert system for infant disease. The way the dempster shafer works is by defining each sysptom with a density value. This study uses 23 type pf symptoms with 3 types of disease. Dengue fever can be identified based on 11 symptoms, 13 sysmptoms of malaria, and 14 symptoms of diarrhea. The results of  calculation on a case study found that the Malaria (TOD02) was the strongest with a value of 0,83 or 83% obtained from the symptoms of the body shivering but sweating (SOD02), vomiting (SOD03), blood in the stool (SOD06), fever appears and disappears simultaneously (SOD16), and red eyes (SOD17) so it is believed that the baby’s disease is Malaria
Analisis Keamanan Jaringan LAN Terhadap Kerentanan Jaringan Ancaman DDoS Menggunakan Metode Penetration Herman Herman; Rusydi Umar; Agus Prasetyo Marsaid
JURIKOM (Jurnal Riset Komputer) Vol 10, No 1 (2023): Februari 2023
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v10i1.5835

Abstract

At this time, there are many crimes in the internet world that cause the need for surveillance and detection of network security so that it can be anticipated quickly. The purpose of this study is to provide an analysis of the detection of network attacks located on the LAN network of the Institution's Campus  . So that detection such as snort applications are needed  that can detect a network attack focused on TCP, UDP, and HTTP, in order to detect instructions from the process of  monitoring events that  occur in  a computer system or network and  analyzing the possibility of an incident can recognize data packets that pass by and generate alerts according to  pre-made rules.  In this study using  the penetration test  method which is a method that aims to test the system or network security directly located and activities to evaluate the security of a computer network system. This method can also be called pentest and is usually done by pentesters at the University Institution. In this study, the use of  snort can run well, because snort  can detect and send alerts to administrators through applications that will be used as simulations are Drak Fantasy, Loic  and Wirshak and every network 
Audit Tata Kelola Academic Information System Menggunakan Framework Cobit 2019 Satriya Dwi Putra; Herman Herman; Anton Yudhana
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 10, No 3: Juni 2023
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.20231036361

Abstract

Pengelolaan sumber daya Teknologi Informasi yang baik efektif, efisien, dan terkendali menghasilkan value bagi sebuah institusi. Upaya untuk mendukung proses manajemen mengembangakan AIS sebagai alat untuk mengevaluasi arah kebijakan, kebutuhan fungsional, dan risiko belum diterapkan secara sempurna. Penelitian ini merupakan audit disertai analisis sistematis untuk mengukur tingkat kematangan sistem Academic Information System (AIS) di STIKES Guna Bangsa Yogyakarta menggunakan framework COBIT 2019. Fokus penelitian adalah pada tata kelola proyek pengembangan AIS yaitu pada proses pengelolaan sumber daya (EDM04) dan inovasi terkelola (APO04). Luaran yang diharapkan adalah sebuah rekomendasi untuk memaksimalkan proses pengembangan sistem menggunakan metode bertahap, yaitu observasi, data collection, data validation, dan identifikasi data maturity level. Audit dan analisis yang dilakukan penelitian ini menemukan tata kelola dalam pengembangan AIS kondisi saat ini berada pada maturity level 2 (managed process) dengan nilai EDM04 = 2,29 dan APO04 = 2,25. Artinya proses sudah dilakukan, tetapi hanya sekedar dilakukan sehingga kurang mencapai tujuan yang diharapkan. Hal ini ditandai dengan ada proses yang tidak lengkap dan tidak terorganisasi dengan baik. Untuk menuju maturity level yang maksimal yaitu level 5, penelitian ini merekomendasikan pengelola untuk melengkapi SOP yang akan dijadikan rujukan dan juga memperbaharui dokumen-dokumen sehingga mengikuti sistem yang dikembangkan sesuai teknologi terkini. Sebagai catatan tambahan lingkungan kerja yang kondusif perlu diciptakan guna mencapai inovasi yang maksimal sesuai dengan sumber daya yang dimiliki. AbstractGood management of Information Technology resources is effective, efficient, and controlled to produce value for an institution. Efforts to support the management process to develop AIS as a tool to evaluate policy directions, functional requirements, and risks have not been implemented perfectly. This research is an audit accompanied by a systematic analysis to measure the maturity level of the Academic Information System (AIS) system at STIKES Guna Bangsa Yogyakarta using the COBIT 2019 framework. The focus of the research is on the governance of the AIS development project, namely the resource management process (EDM04) and managed innovation ( APO04). The expected output is a recommendation to maximize the system development process using a gradual method, namely observation, data collection, data validation, and identification of maturity level data. The audit and analysis conducted in this study found that governance in the development of AIS is currently at maturity level 2 (managed process) with a value of EDM04 = 2.29 and APO04 = 2.25. This means that the process has been carried out, but only done so that it does not achieve the expected goals. It is characterized by incomplete and poorly organized processes. To reach the maximum maturity level, namely level 5, this study recommends managers complete SOPs that will be used as references and also update documents so that they follow the system developed according to the latest technology. As an additional note, a conducive work environment needs to be created to achieve maximum innovation following the available resources.