Claim Missing Document
Check
Articles

Found 4 Documents
Search

A Prototype of Monitoring and Early Warning System of Public Water Flow Interference based on Arduino, Firebase Realtime DB, and Android Dharmaadi, I Putu Arya; Arsa, Dewa Made Sri; Sasmita, Gusti Made Arya
Jurnal Pekommas Vol 6 No 2 (2021): October 2021
Publisher : Sekolah Tinggi Multi Media “MMTC” Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56873/jpkm.v6i2.3774

Abstract

The majority of the population uses clean water sourced from the PDAM (Indonesian Regional Water Supply Company) pipeline to meet their daily needs. However, clean water utilization is sometimes not smooth because the upstream's water supply is stalled or the PDAM pipeline disrupted. This disruption that often occurs slowly causes routine community activities, such as bathing or cooking, become stop because clean water is a basic need. Thus, a system is needed to provide early warning when the PDAM water supply starts to have problems so that the community can make initial anticipation. This study designed a prototype of an early warning system using an Arduino-based water flow sensor that records water flow discharge data on the PDAM pipeline and sent to the Firebase Realtime Database to be monitored in real-time through an Android application. The system testing is done by black-box testing, i.e. we check all functions of this system, mainly on sending a warning notification when the water flow debt is at a low rate. In the end, by using this system, the user can prepare themselves early, such as collecting residual water debit in the tub and save water when there is a disruption in PDAM water.
Audit Tata Kelola TI pada BMKG dengan Menggunakan Framework COBIT 2019 Studi Kasus: BMKG Wilayah III Denpasar Aprianingsih, Ade Irma; Githa, Dwi Putra; Sasmita, Gusti Made Arya
JATISI Vol 11 No 4 (2024): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Universitas Multi Data Palembang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v11i4.8541

Abstract

The development of science and technology is currently constant along with increasingly modern developments. Technology today has become something or could be said to be an important need in people's daily lives. COBIT is a framework developed by ISACA for IT-related management and control in an organization to maximize the use of IT. Several problems that often occur in organizations often cause a decline in the quality of governance in BMKG Region III Denpasar, so it is necessary to carry out an audit of information technology governance. This IT governance audit research uses COBIT 2019 as a framework that can help organizations maintain high quality information by supporting organizational decision making. In this research, process domains APO13, BAI01, and BAI10 were obtained. Therefore, the ability level value obtained in the APO13 process domain is located at level 2, BAI01 is located at level 2, and BAI10 is located at level 2. So, the GAP value obtained from each of these domains is 3.
Design and Implementation of Point to Point Wireless Network with VPN IPSec and GRE Security for Internet Network Distribution in Sulangai Village Wiranata, Agus Budiman; Sasmita, Gusti Made Arya; Raharja, I Made Sunia
Jurnal Ilmiah Merpati (Menara Penelitian Akademika Teknologi Informasi) Vol 12 No 3 (2024): Vol. 12, No. 3, December 2024
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JIM.2024.v12.i03.p06

Abstract

Sulangai Village experiences limited internet access due to its geographical condition in a mountainous area, so cable infrastructure such as fiber optics is difficult to implement. The proposed solution is to use point-to-point wireless networks to provide reliable internet access. The research method used is the Network Development Life Cycle (NDLC), including the stages of analysis, design, simulation, implementation, monitoring and management. The test results show that the signal strength at the Base Station and Client Station is -69 dBm each, which is in the very good category. Security testing using IPsec VPN and GRE also showed adequate results, with the ability to encrypt data and protect the network from outsiders. Bandwidth speed testing before and after security implementation shows stable and satisfactory network performance, with consistent transmission and reception speeds. The results of the Quality of Service (QoS) analysis also show a significant increase after implementing security, with good throughput, packet loss, delay and jitter values.
OWASP Framework and OCTAVE Method for Penetration Testing Web Apps of College X Darmayuda, I Putu Gede Angga Mas; Sasmita, Gusti Made Arya; Putri, Gusti Agung Ayu
Jurnal Ilmiah Merpati (Menara Penelitian Akademika Teknologi Informasi) Vol 12 No 2 (2024): Vol. 12, No. 2, August 2024
Publisher : Lembaga Penelitian dan Pengabdian kepada Masyarakat Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/JIM.2024.v12.i02.p03

Abstract

Information system security is a major focus for many organizations as increasingly sophisticated cyberattacks threaten the confidentiality, integrity and availability of online services. This research aims to identify and assess vulnerabilities in web applications at College X by using the OWASP framework and OCTAVE method. OWASP is used to identify common and critical web vulnerabilities, while OCTAVE provides a holistic understanding of an organization's security risks. Testing was conducted with the tools and techniques recommended by both frameworks. The results found a number of vulnerabilities, including two low-level and one high-level. The findings underscore the importance of systematic penetration testing and risk assessment to keep web applications secure in educational environments.