cover
Contact Name
Hidra Amnur
Contact Email
hidra@pnp.ac.id
Phone
+6282386434344
Journal Mail Official
admjitsi@gmail.com
Editorial Address
Kampus Politeknik Negeri Padang, Jurusan Teknologi Informasi. Gedung E. Limau Manis, Pauh. Padang - Sumatera Barat. Indonesia
Location
Kota padang,
Sumatera barat
INDONESIA
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi
ISSN : 27224619     EISSN : 27224600     DOI : 10.30630/jitsi
Core Subject : Science,
The journal scopes include (but not limited to) the followings: Computer Science : Artificial Intelligence, Data Mining, Database, Data Warehouse, Big Data, Machine Learning, Operating System, Algorithm Computer Engineering : Computer Architecture, Computer Network, Computer Security, Embedded system, Coud Computing, Internet of Thing, Robotics, Computer Hardware Information Technology : Information System, Internet & Mobile Computing, Geographical Information System Visualization : Virtual Reality, Augmented Reality, Multimedia, Computer Vision, Computer Graphics, Pattern & Speech Recognition, image processing Social Informatics: ICT interaction with society, ICT application in social science, ICT as a social research tool, ICT education
Articles 5 Documents
Search results for , issue "Vol 3 No 1 (2022): Computer Engineering" : 5 Documents clear
Sistem Keamanan Pintu Rumah Berbasis Cloud Computing Humaira; Maulana Ibrahim, Alfajri; Alanda, Alde
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 1 (2022): Computer Engineering
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/jitsi.3.1.56

Abstract

Sistem door security ini diciptakan agar dapat memantau lingkungan sekitar area jangkauan dari alat ini. Sistem ini bekerja dengan menggunakan pantulan sinyal ultrasonic dari Sensor jarak yang terhubung ke server database dan terekam pada aplikasi Android User. Sistem ini menggunakan Arduino Mega, Wemos D1 R2, sensor jarak, kamera vc0706, selonid doorlock, dan buzzer. System kerjanya sensor jarak akan diterima di Arduino Mega dan dikirim ke Wemos D1 R2 menggunakan software serial yang data akan dikirim ke database menggunakan jaringan internet yang terhubung di Wemos.
Keamanan Jaringan Wireless Dengan Kali Linux Rasyidah; Setyawan, Fajar; Amnur, Hidra
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 1 (2022): Computer Engineering
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/jitsi.3.1.57

Abstract

The development of wireless technology or wireless produces something interesting to discuss. Wireless technology is not always about how fast communication can be done. Security issues are very important to discuss, especially in an era that is all digital and all minimalist which no longer requires cables. Security needs to be considered to provide a sense of security when using a device connected to a Wi-Fi. For that, it is necessary to do a security analysis on a wifi. This analysis is carried out using the Penetration Testing method by carrying out attacks to find weaknesss in the Wi-Fi network security system. So, you will see the strength of the password on the Wi-Fi network. Security testing is also carried out on the communication path between clients and access points. So that from the results of this test it will be seen how safe the Wi-Fi network security system is
Deteksi Ancaman Keamanan Pada Server dan Jaringan Menggunakan OSSEC Ronal Hadi; Yuliana, Yarmis; Mooduto, Hanriyawan Adnan
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 1 (2022): Computer Engineering
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/jitsi.3.1.58

Abstract

Cyber crimes can attack computer networks, infiltrate the network, retrieve confidential data and paralyze computer network systems. In overcoming the crimes that will occur, a system equipped with a firewall and an Intrusion Detection System (IDS) is needed. Firewall and IDS as network security features that can protect servers, networks, and block attacks. Firewall and IDS features can be implemented in OSSEC Tools. OSSEC is an open-source host-based intrusion detection system (HIDS) capable of performing log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerts, and active responses. OSSEC is capable of monitoring a single server or thousands of servers in server/agent mode
Wazuh sebagai Log Event Management dan Deteksi Celah Keamanan pada Server dari Serangan Dos Fitri Nova; Pratama, Muhammad Dehan; Prayama, Deddy
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 1 (2022): Computer Engineering
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/jitsi.3.1.59

Abstract

Server monitoring is the process of monitoring server system resources such as monitoring server performance also helps identify other performance-related problems such as resource utilization, application downtime, and response time to a service. File Integrity Monitoring (FIM) is the activity of monitoring the integrity of a file to maintain the integrity of a file from unauthorized changes, by utilizing Wazuh as one of the open source applications to monitor has various features to perform monitoring. Computer network security becomes something that needs to be considered as technology develops rapidly. It is the responsibility of a network administrator to monitor system security at any time. Given the various threats that can enter the system at any time, an application is needed that can detect and prevent the threat in real time. The problem raises the idea for the author to utilize one of the applications, namely Suricata in which there is an IDS (Intruction Detection System) method that will serve as an attacker detection. Suricata will display an alert when there is a suspicious package. The resulting alert will be stored in the file log. Then the log will be displayed on the Wazuh web interface. Alerts that appear on Wazuh will be sent to network administrators via e-mail
Alat Keamanan Pintu Menggunakan E-KTP, Modul RFID dan AWS EC2 berbasis NODEMCU ESP8266 Ramdhani, Verdian; Hidayat, Rahmat; Hendrick
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 1 (2022): Computer Engineering
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/jitsi.3.1.60

Abstract

The current door locking sistem still uses conventional keys, making it less efficient for homes with many doors because there are too many keys to carry. In addition, conventional locks are easily opened by thieves and also locks can be duplicated by irresponsible people. So that a more practical and efficient lock is needed, from this problem the author has the idea to produce a safe and practical RFID-based door security device. By utilizing E-KTP as an RFID tag as a security for the door of the house. Design and build a house door security using the NodeMCU ESP8266 microcontroller as a circuit controller. This study uses the Research and Development method, which is a method that aims to produce or develop certain products. Based on the test results, it can be concluded that the simulation of the door safety device can operate properly, according to the design made. The RFID reader used has a frequency of 13.56 Mhz which is placed on the door to read the E-KTP ID and sent to the AWS server with AWS EC2 as the website infrastructure to add other information and be stored in the MySQL database. If the ID is not in the database, Led The red light will light up and the buzzer will sound. If the ID is in the database, the servo motor will pull the door latch The yellow LED will light up, and will close the door again within 10 seconds.

Page 1 of 1 | Total Record : 5