Claim Missing Document
Check
Articles

Found 2 Documents
Search

SISTEM INVENTARIS TRANSFORMATIF: MEMANFAATKAN BLOCKCHAIN DAN LARAVEL DI PT. MANDIRI PLASTINDO sanjay, sanjay; Maulana, Donny; Kurniadi, Nanang Tedi
IDEALIS : InDonEsiA journaL Information System Vol 7 No 2 (2024): Jurnal IDEALIS Juli 2024
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36080/idealis.v7i2.3195

Abstract

Transformative Inventory System: Utilizing Blockchain and Laravel at PT. Mandiri Plastindo The aim of this research is to develop and execute a system. Transformative Inventory utilizes Blockchain technology and the Laravel framework at PT. Mandiri Plastindo. The problem raised is efficiency and reliability in inventory management which can be improved through the application of the latest technology. The proposed Waterfall model SDLC method involves developing a Blockchain-based system to secure and track inventory changes in a transparent and immutable manner. The Laravel framework is used to build application platforms that are user-friendly and easy to develop. A web-based application is the result of this research. allows PT. Mandiri Plastindo to efficiently manage their inventory by increasing speed, security and reliability. With Blockchain technology, inventory data can be clearly verified and cannot be manipulated, increasing trust and transparency in the inventory management process. The conclusion of this research is that implementing a transformative inventory system using Blockchain and Laravel can provide important benefits for businesses, including increased operational effectiveness, increased security of information and more openness in inventory management. The existence of an inventory system can make it easier to handle data on incoming and outgoing goods. Apart from that, it can speed up searching for stock and making stock reports. In addition, you can attach accurate stock reports. As a result, companies can optimize their business processes and achieve better overall performance
IMPLEMENTATION OF DYNAMIC METHOD FOR MALWARE DETECTION IN EMAIL PHISHING ATTACKS ON LET'S DEFEND Sanjay, Sanjay; Ningsih, Rahayu; Wahidin, Ahmad Jurnaidi
Journal of Data Analytics, Information, and Computer Science Vol. 1 No. 2 (2024): April
Publisher : Yayasan Nuraini Ibrahim Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59407/jdaics.v1i2.717

Abstract

In the rapidly evolving landscape of cybersecurity threats, the need for robust defenses against phishing attacks has become paramount. This study explores the efficacy of malware detection in phishing email attacks using dynamic analysis on the Letsdefend.io platform. Leveraging the insights provided by the Deloitte Center for Controllership regarding the escalating frequency of cyber adversaries targeting organizational data, this research investigates the effectiveness of the Letsdefend.io platform, particularly utilizing the SOC 146 rule, in identifying and mitigating phishing threats. Through a comprehensive analysis process encompassing dynamic malware analysis techniques, such as those employed by VirusTotal and URLHaus, alongside detailed examination of suspicious email attachments using the Mailbox feature, this study aims to provide insights into the evolving tactics of phishing attackers, specifically those utilizing Excel 4.0 Macros. The research methodology involves collecting malware samples for analysis, configuring sandbox environments with tools like Process Monitor and Regshot, and utilizing sophisticated analysis tools like ProcDot to visualize malware behavior. Additionally, the study examines the effectiveness of the Letsdefend.io platform in detecting phishing URLs and malicious domains reported by AnyRun and URLHaus databases. The findings reveal promising results in the detection and identification of phishing threats, shedding light on the potential of dynamic analysis methods in bolstering cybersecurity defenses against evolving phishing techniques. This research contributes to the ongoing efforts to enhance cybersecurity measures and protect organizational assets from the pervasive threat of phishing attacks.