cover
Contact Name
Muhammad Iqbal
Contact Email
halopublikasi@hawari.id
Phone
+6281269617312
Journal Mail Official
redaksijnastek@hawari.id
Editorial Address
Jl. Sei Batu Gingging Ps. X No.33, Padang Bulan Selayang I, Kec. Medan Selayang, Kota Medan, Sumatera Utara 20153
Location
Kota medan,
Sumatera utara
INDONESIA
Jurnal Nasional Teknologi Komputer
Published by CV. HAWARI
ISSN : 28087801     EISSN : 28084845     DOI : -
Core Subject : Science,
Jurnal Nasional Teknologi Komputer di bidang ilmu komputer dan teknologi. Jurnal JNASTEK diterbitkan oleh CV. Hawari. Redaksi mengundang peneliti, praktisi, dan mahasiswa untuk menulis perkembangan ilmiah di bidang-bidang yang berkaitan dengan teknologi informasi, teknik informatika dan sistem komputer. Jurnal JNASTEK terbit 4 (Empat) kali dalam setahun pada bulan Januari, April, Juli dan Oktober. Jurnal ini berisi artikel penelitian dan kajian ilmiah.
Articles 5 Documents
Search results for , issue "Vol 3 No 2 (2023): April 2023" : 5 Documents clear
Implementasi Kriptografi Pengamanan Data File Dokumen Menggunakan Algoritma Advanced Encryption Standard Mode Chiper Block Chaining Sahat Manullang
Jurnal Nasional Teknologi Komputer Vol 3 No 2 (2023): April 2023
Publisher : CV. Hawari

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61306/jnastek.v3i2.69

Abstract

Dalam meningkatkan aspek keamanan suatu data dapat dilakukan dengan pengendalian teknik kriptografi. Algoritma AES (Advanced Encryption Standard) merupakan kriptografi yang dapat digunakan untuk melindungi data atau informasi dengan melakukan mengenkripsi dan mendekripsi blok data sepanjang 128 bit dengan panjang kunci 128 bit, 192 bit, atau 256 bit. Proses pengamanan data dapat dilakukan dengan menggunakan metode Chiper Block Chaining (CBC) dalam mode operasinya. Dalam persiapan untuk melakukan proses enkripsi yang digunakan adalah sebuah file dokumen pdf. Data 16 byte pertama dibaca sebagai blok pertama untuk proses enkripsi dengan metode CBC. Hasil dari penelitian yaitu dapat mengimplementasikan program aplikasi menggunakan algoritma Advanced Encryption Standard mode Chiper Block Chaining dengan melakukan enkripsi dan dekripsi file dokumen.
ANALISIS FITUR APLIKASI CINCAU STATION DENGAN METODE CUSTOMER KNOWLEDGE MANAGEMET (CKM) Dionsius Reinaldo
Jurnal Nasional Teknologi Komputer Vol 3 No 2 (2023): April 2023
Publisher : CV. Hawari

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61306/jnastek.v3i2.76

Abstract

Dalam era globalisasi, persaingan bisnis sangat ketat, terutama dalam industri makanan dan minuman. Cincau Station, yang awalnya hanya menyajikan es cincau dengan gula aren, telah berkembang menjadi variasi rasa dan dapat diakses melalui aplikasi mobile. Namun, aplikasi ini memiliki kekurangan dalam desain dan fitur yang dapat mempengaruhi minat konsumen. Penelitian ini menggunakan metode Customer Knowledge Management (CKM) untuk menganalisis UI/UX aplikasi Cincau Station. CKM adalah pendekatan yang mempertimbangkan kebutuhan pelanggan untuk mengembangkan produk yang ideal. Tujuan CKM adalah untuk mencapai efektivitas dan daya saing merek. Penelitian ini membatasi analisis pada aspek isi dan komposisi aplikasi.
IMPLEMENTASI PLATFORM AS A SERVICE (PAAS) PADA DATABASE E-COMMERCE BERBASIS CLOUD COMPUTING Fachrid Wadly; Arpan; Muhammad Muttaqin
Jurnal Nasional Teknologi Komputer Vol 3 No 2 (2023): April 2023
Publisher : CV. Hawari

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61306/jnastek.v3i2.88

Abstract

Business competition in the field of information technology continues to increase, one of the technologies itself is cloud computing. Cloud computing can be public or private. One type of cloud computing service used in this study is PaaS. The PaaS cloud computing service provides a platform that users can use to create applications. The Byna Cake shop is a shop that opens a cake business in Aceh, which is located on Pulau Tiga, Aceh, Tamiang. This shop sells various types of cakes which have been produced manually by themselves since 2021. The sales system uses WhatsApp and Instagram media and comes directly to the store, so this system is considered to be less effective and efficient. Therefore, an online sales system is needed, namely by building a web-based E-Commerce application. In implementing this web-based e-commerce application, the author utilizes cloud infrastructure as a cloud provider, namely Microsoft Azure. Computing service used in this research is CMS AbanteCart. Web-based e-commerce application at the Byna Cake store created by configuring a virtual machine to install CMS AbanteCart Packaged By Bitnami on the Microsoft Azure platform. The design used in creating web-based e-commerce applications at the Byna Cake store uses Use Cases and Class Diagrams.
Strategi Penanggulangan Kelemahan Terhadap Ancaman Keamanan Pada Jaringan Wireless Fachrid Wadly; Rio Septian; Zuhri Ramadhan
Jurnal Nasional Teknologi Komputer Vol 3 No 2 (2023): April 2023
Publisher : CV. Hawari

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61306/jnastek.v3i2.89

Abstract

The use of wireless-based technology devices at this time is so much, good used for voice and data communications. Because wireless technology utilizes frequency high to deliver a communication, then the vulnerability to security is also higher compared to other communication technologies. Various security measures can be taken through communication devices used by users and by operators who provide services communication. Weaknesses of wireless networks in general can be divided into 2 types, namely weaknesses on the configuration and weakness on the type of encryption used. Broadly speaking, the gap on wireless network spans over four layers where the four layers actually are is the process of occurrence of data communication on wireless media. The four layers are layers physical layer, network layer, user layer, and application layer. The security handling models that occur in each layer of wireless technology can be done, among others, by: hide SSID, make use of WEP keys, WPA-PSK or WPA2-PSK, facility implementation, MAC filtering, installation of captive portal infrastructure.
PENGEMBANGAN E-KOMIK SEBAGAI MEDIA PEMBELAJARAN KEAMANAN JARINGAN MATERI KRIPTOGRAFI admin admin
Jurnal Nasional Teknologi Komputer Vol 3 No 2 (2023): April 2023
Publisher : CV. Hawari

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61306/jnastek.v3i2.90

Abstract

Technology advances do not always have a positive effect on interest reading and learning student. From the facts that are often encountered, indicates that there are many students who do not like learning network security caused by several factors. Problems in this study is how the qualifications and the response of students to education media e-comics in cryptographic material. This study aimed to get a description of the qualifications e-comics and get response from the students to e-comics in the learning network security cryptographic material. This research method use a method of development research ADDIE (Analysis, Design, Development, Implementation, Evaluation). Instrument data sources using a questionnaire. validation of this research involve materials validator and media validator. The subjects were 25 students of Information Technology Education 2013 Unesa. The results showed appraisement of qualication from the validator is 84.5%. Thus e-Comics media can be said to be Very Well worth as a education learning of students.

Page 1 of 1 | Total Record : 5