Claim Missing Document
Check
Articles

Found 3 Documents
Search

Service Operation ITIL V3 Pada Analisis dan Evaluasi Layanan Teknologi Informasi Yoga Pratama; Tata Sutabri
NUANSA INFORMATIKA Vol 17, No 1 (2023)
Publisher : FKOM UNIKU

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/fkom uniku.v17i1.7233

Abstract

Pesatnya perkembangan teknologi informasi dan pelayanan teknologi yang baik menjadi harapan bagi semua orang, organisasi, lembaga, maupun perguruan tinggi agar dapat mendukung kegiatan, memudahkan aktivitas dan proses bisnis mereka. Salah satunya teknologi pembelajaran berbasis elektronik dan jarak jauh pada Universitas Bina Darma Palembang. Selain mendukung proses akademik dan bisnis pada universitas, e-learning juga dalam penggunaannya teridetifikasi terdapat masih banyak masalah yang terjadi dalam sistem, data maupun infrastruktur, sehingga penggunaan layanan teknologi e-learning masih harus didukung juga dengan manajemen layanan teknologi informasi agar proses bisnis berjalan sesuai dengan yang diharapkan. Di penelitian ini akan membahas tentang bagaimana analisis pada layanan teknologi elearning Universitas Bina Darma dengan mengacu pada kerangka kerja pada domain service operation berdasarkan framework ITIL V3. Kerangka ITIL V3 ini banyak digunakan di berbagai organisasi, lembaga, maupun institusi untuk membuat sebuah standar dalam memberikan pelayanan teknologi informasi yang maksimal untuk penggunanya. Berdasarkan kondisi alamiah pada objek penelitian, dipilih pendekatan kualitatif dangan tipe deskriptif yang akan digunakan dalam penelitian. Hasil temuan akan dianalisis dan akan mengeluarkan rekomendasi best practice manajemen atau pengelolaan layanan yang mengacu pada kerangka agar dapat diimplementasikan pada universitas.Kata Kunci – ITSM, ITIL V3, Service Operation, e-learning
Analisis Kriptografi Algoritma Blowfish pada Keamanan Data menggunakan Dart Yoga Pratama; Tata Sutabri
Jurnal Informatika Terpadu Vol 9 No 2 (2023): September, 2023
Publisher : LPPM STT Terpadu Nurul Fikri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54914/jit.v9i2.975

Abstract

Data security is a vital aspect of information technology to maintain the integrity and authenticity of data from unauthorized access. In supporting this, an approach is taken to protect sensitive information and data. In this research, cryptographic techniques were analyzed and tested to secure data in text, which is commonly used as a password using the Blowfish cryptographic algorithm. The goal is to determine how strong, secure, and fast the blowfish algorithm maintains and executes the text data encoding. The research method used is an in-depth theoretical analysis followed by computational experiments using dart programming. Based on the study and testing carried out, the results of this research show that the use of cryptographic techniques with the blowfish algorithm on text data samples can be used as an alternative for securing data. The results show that the blowfish algorithm pattern has security because it uses various techniques to change and present data, supported by an execution time of less than 10 seconds and minimal memory usage of under 5 MB. Therefore, the blowfish algorithm can be used as a cryptographic choice in developing robust and fast text-based data security.
ANALISIS PERBANDINGAN PERFORMANSI KEKUATAN DAN KINERJA ALGORITMA RIVEST SHAMIR ADLEMAN (RSA) DAN ELLIPTIC CURVE CRYPTOGRAPHY (ECC) PADA FLUTTER Yoga Pratama; Jerry Hansen; Tata Sutabri
JURSIMA Vol 10 No 3: Jursima Vol.10 No.3
Publisher : INSTITUT TEKNOLOGI DAN BISNIS INDOBARU NASIONAL

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47024/js.v10i3.612

Abstract

Technological changes and advances have made human life easier. Along with this, the crime factor in technology is also becoming more open, for example data theft, or other technological crimes that threaten the pace of technology itself. For this reason, handling and prevention are needed in anticipating technological crimes, one of which is cryptography. Cryptography is an important science in the digital world which is intended to protect data and information from unauthorized access. RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography) are two examples of cryptographic algorithms used to secure data. This study aims to compare the power and performance of the RSA and ECC algorithms. The implementation of these two algorithms is carried out in the Flutter environment which will be evaluated, including aspects of security and speed of data encryption and decryption. The results of this study are intended to add a deeper understanding and provide an overview of these two cryptographic algorithms in protecting data in an information technology system.