Claim Missing Document
Check
Articles

Found 9 Documents
Search

An Approach for Risk Estimation in Information Security Using Text Mining and Jaccard Method Prajna Deshanta Ibnugraha; Lukito Edi Nugroho; Paulus Insap Santosa
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (835.108 KB) | DOI: 10.11591/eei.v7i3.847

Abstract

Involvement of digital information in almost of enterprise sectors makes information having value that must be protected from information leakage. In order to obtain proper method for protecting sensitive information, enterprise must perform risk analysis of threat. However, enterprises often get limitation in measuring risk related information security threat. Therefore, this paper has goal to give approach for estimating risk by using information value. Techniques for measuring information value in this paper are text mining and Jaccard method. Text mining is used to recognize information pattern based on three classes namely high business impact, medium business impact and low business impact. Furthermore, information is given weight by Jaccard method. The weight represents risk levelof information leakage in enterprise quantitatively. Result of comparative analysis with existing method show that proposed method results more detailed output in estimating risk of information security threat.
An Approach for Risk Estimation in Information Security Using Text Mining and Jaccard Method Prajna Deshanta Ibnugraha; Lukito Edi Nugroho; Paulus Insap Santosa
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (835.108 KB) | DOI: 10.11591/eei.v7i3.847

Abstract

Involvement of digital information in almost of enterprise sectors makes information having value that must be protected from information leakage. In order to obtain proper method for protecting sensitive information, enterprise must perform risk analysis of threat. However, enterprises often get limitation in measuring risk related information security threat. Therefore, this paper has goal to give approach for estimating risk by using information value. Techniques for measuring information value in this paper are text mining and Jaccard method. Text mining is used to recognize information pattern based on three classes namely high business impact, medium business impact and low business impact. Furthermore, information is given weight by Jaccard method. The weight represents risk levelof information leakage in enterprise quantitatively. Result of comparative analysis with existing method show that proposed method results more detailed output in estimating risk of information security threat.
An Approach for Risk Estimation in Information Security Using Text Mining and Jaccard Method Prajna Deshanta Ibnugraha; Lukito Edi Nugroho; Paulus Insap Santosa
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (835.108 KB) | DOI: 10.11591/eei.v7i3.847

Abstract

Involvement of digital information in almost of enterprise sectors makes information having value that must be protected from information leakage. In order to obtain proper method for protecting sensitive information, enterprise must perform risk analysis of threat. However, enterprises often get limitation in measuring risk related information security threat. Therefore, this paper has goal to give approach for estimating risk by using information value. Techniques for measuring information value in this paper are text mining and Jaccard method. Text mining is used to recognize information pattern based on three classes namely high business impact, medium business impact and low business impact. Furthermore, information is given weight by Jaccard method. The weight represents risk levelof information leakage in enterprise quantitatively. Result of comparative analysis with existing method show that proposed method results more detailed output in estimating risk of information security threat.
Workshop Dan Pelatihan Pembuatan E-Katalog Sebagai Media Penjualan Online Dan Cloud Application Untuk Umkm Saat Wfh Covid-19 Arry Widodo; Candra Wijayangka; R. Nurafni Rubiyanti; Ade Irma Susanty; Anita Silvianita; Romat Saragih; Gita Indah Hapsari; Prajna Deshanta Ibnugraha; Mia Rosmiati
Charity : Jurnal Pengabdian Masyarakat Vol 5 No 1 (2022): Charity-Jurnal Pengabdian Masyarakat
Publisher : PPM Universitas Telkom

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/charity.v5i1.2991

Abstract

Tujuan dari pengabdian masyarakat ini adalah untuk memberikan pengetahuan kepada pelaku bisnis terutama UMKM (Usaha Mikro Kecil dan Menengah) dalam meningkatkan bisnis yang mereka jalani. Setiap perusahaan yang profesional harus memiliki strategi penjualan, terutama di tengah wabah Covid-19. Strategi ini dibutuhkan sebagai bentuk pertanggungjawaban perusahaan dan untuk mengukur kemampuan perusahaan untuk bertahan. Untuk itu, diperlukan strategi penjualan melalui E-Katalog pada media online, serta penggunaan cloud computing sebagai pusat pengelolaan data. Penggunaan teknologi ini harus mudah dipahami oleh pihak yang berkepentingan. Selain itu juga harus relevan artinya bisa digunakan oleh pelaku bisnis UMKM. E-Katalog tersebut juga harus andal, yaitu dapat digunakan terus-menerus sehingga dapat digunakan untuk meningkatkan penjualan, tidak hanya di tengah kondisi wabah. Hasil yang diharapkan adalah masyarakat sasar dapat membuat E-Katalog sederhana, sehingga mampu bertahan di tengah kondisi bisnis saat ini dan dapat meningkatkan kompetensi masyarakat di masa depan
The Reliability Analysis for Information Security Metrics in Academic Environment Prajna Deshanta Ibnugraha; Anas Satria; Fabian Sekar Nagari; Moch Fahru Rizal; Khamla NonAlinsavath NonAlinsavath
JOIV : International Journal on Informatics Visualization Vol 7, No 1 (2023)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.1.1593

Abstract

Today, academic institution involves digital data to support the educational process. It has advantages, especially related to ease of access and process. However, security problems appear related to digital data. There were several information security incidents in the academic environment. In order to mitigate the problem, metrics identification is required to determine the risk of incidents. There are many risks model and metrics to estimate the risk, such as DREAD, OWASP, CVSS, etc. However, specific metrics are required to obtain appropriate risk values. Therefore, this study aims to define metrics for an academic institution. The proposed metrics are obtained from The Family Educational Rights and Privacy Act (FERPA) regulation. It consists of directory information, educational information, personally identifiable information, and risk of information leakage. In order to achieve the objective, this study involves survey and reliability analysis to result in output. The survey is conducted by involving 90 respondents with various levels of education and jobs. The Cronbach's alpha and Test-retest are methods to determine this study's reliability. According to reliability analysis, the Cronbach's alpha method results in coefficients for the metrics between 0.730 - 0.911, while the Test-retest method results in coefficients between 0.630 - 0.797. These coefficients have a reliable category, so the proposed metrics are adequate for determining risk of information security incidents in academic environments. The reliable metrics will be developed as variables of the risk assessment model for the academic environment in the future study. 
PENGEMBANGAN WEBSITE SEBAGAI MEDIA PROMOSI UMKM MOTHER’S BLESSING Prajna Deshanta Ibnugraha; Periyadi Periyadi; Devie Ryana Suchendra; Moch Fahru Rizal; Rini Handayani
Prosiding COSECANT : Community Service and Engagement Seminar Vol 1, No 2 (2021)
Publisher : Universitas telkom

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (254.786 KB) | DOI: 10.25124/cosecant.v1i2.17513

Abstract

Mother’s Blessing merupakan Usaha Mikro, Kecil, dan Menengah yang bergerak dibidang perlengkapan outdoor. Produk mitra UMKM tersebut berupa topi, tas outdoor, perlengkapan lari, perlengkapan sepeda, dan sebagainya. Untuk saat ini promosi yang dilakukan untuk proses penjualan melalui media social seperti Instagram. Hal tersebut dirasa kurang profesional. Oleh karena itu perlu pemanfaatan website untuk menunjang kegiatan promosi secara online tersebut sehingga dapat meningkatkan kepercayaan calon pembeli terhadap kualitas produk dan badan usaha UMKM tersebut. Pengabdian masyarakat yang dilakukan adalah menjawab permasalahan tersebut. Integrasi antara landing page, layanan blogger dengan domain dilakukan untuk mebuat website media promosi yang efektif dan efisien. Pengembangan website dengan konten berupa profil badan usaha, jenis produk dan jangkauan pelanggan diharapkan mampu menjembatani kebutuhan promosi produk secara profesional melalui website tersebut.
Pengendali Raspberry Pi Jarak Jauh Menggunakan Protokol Mqtt Berbasis Web Mitsal Fabian Nadhiem; Prajna Deshanta Ibnugraha; Aris Pujud Kurniawan
eProceedings of Applied Science Vol 10, No 4 (2023): Agustus 2023
Publisher : eProceedings of Applied Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Fasilitas pelayanan dalam transportasi umum seperti CCTV dan GPS perlu diterapkan agar rasa aman dan nyaman dapat terpenuhi sehingga timbul kepercayaan masyarakat dalam menggunakan transportasi umum. Penerapan solusi teknologi ini memunculkan beberapa kendala seperti kesulitan dalam konfigurasi perangkat yang terpasang pada kendaraan, karena lokasi kendaraan yang selalu berpindah atau berada di lokasi yang jauh. Penelitian ini bertujuan untuk membuat sistem manajemen berbasis web yang dapat mengelola Raspberry Pi sebagai unit kontrol perangkat penunjang keamanan dalam kendaraan. Message Queue Telemetry Transport Protocol (MQTT) dapat diterapkan dalam sistem untuk mendukung komunikasi antara website dengan Raspberry Pi. Hasil yang di dapat adalah sebuah sistem berbasis website yang dapat melakukan konfigurasi data berupa nilai interval waktu, GPIO pin activation, dan manual capture. Pengujian juga dilakukan dengan mengukur tingkat kesesuaian dan latency dari setiap transmisi data. Hasil pengukuran kesesuaian menunjukkan bahwa data dapat diterima dengan benar dan sesuai oleh Raspberry Pi, dengan tingkat kesesuaian mencapai 100%. Sedangkan hasil pengukuran latency menunjukkan data dapat diterima oleh Raspberry Pi dengan rata-rata latency sebesar 443,93 ms.Kata Kunci— mqtt, raspberry pi, sistem manajemen transportasi, website, latency.
Automatic temperature detector to mitigate the spread of COVID-19 Prajna Deshanta Ibnugraha; Rini Handayani; Khamla NonAlinsavath
JURNAL INFOTEL Vol 15 No 1 (2023): February 2023
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v15i1.847

Abstract

The COVID-19 causes wide impact in business operation. The enterprise must mitigate the risk of COVID-19 spread in its environment. The monitoring of body temperature for employees can be applied as a method to prevent COVID-19 spread. However, the monitoring system must consider several factors such as contactless system, accountable, and simple. The integration between IR temperature sensor and attendance system based on ESP32 is able to provide those need. The use of proximity, IR, and RFID sensor is affordable to detect body temperature properly within 10 cm. The proposed system provides notification if user gets fever or suspect of COVID-19 by detecting the body temperature. The accuracy of sensor is adequate. It is based on the comparison testing between proposed system with body thermometer where the testing is performed 30 times for each condition. In order to deduce the comparison result, this study uses analysis of variance method. The analysis produces F-critical (4,006) greater than F-value (0,022) where it means that the proposed system and body thermometer have similar testing result. It is shown good accuracy for the proposed system.
Mengirim Data Berupa Video Melalui Cahaya Tampak ( Visible Light Communication ) Berbasis Arduino Uno La Ode Badarudin Ramadan; Prajna Deshanta Ibnugraha; Mia Rosmiati
eProceedings of Applied Science Vol 10, No 5 (2023): Oktober 2023
Publisher : eProceedings of Applied Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak— Visible Light communication merupakan media komunikasi yang menggunakan cahaya sebagai media transmisinya. Dengan media ini diharapkan dapat menjadi alternatif dalam pengiriman informasi dengan kapsitas yang lebih besar dan waktu yang relatif singkat. Penelitian ini merupakan pengembangan dari penelitian Visible light Commuication yang menggunakan cahaya tampak menjadi media komunikasi agar dapat mengirimkan data berupa video. Sistem komunikasi ini menggunakan Arduino sebagai mikrokontroller yang berfungsi untuk melakukan pengolahan data, dengan menggunakan Light Emmiting Diode (LED) sebagai komponen utama dalam rangkaian Transmitter dan Photodiode sebagai rangkaian utama rangkaian Receiver, berdasarkan pengujian yang telah dilakukan sistem ini mampu mengirimkan video dengan kapasitas maksimal 1,36 MB dengan jarak maksimal 8 cm pada kondisi terang.Kata kunci: Visible Light Communication , Transmitter, Receiver, LED, Photodioda