Claim Missing Document
Check
Articles

ANALISIS EFEKTIVITAS DAN EFISIENSI METODE ENCODING DAN DECODING ALGORITMA BASE64 Mochammad Syahrul Kurniawan; I Gede Ardi Sukaryadi Putra; I Made Agastya Maheswara; Reynaldus Yoseph Maria Neto Labamaking; I Made Edy Listartha; Gede Arna Jude Saskara
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 3 No. 1 (2023): Maret : Jurnal Informatika dan Tekonologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v3i1.897

Abstract

This study discusses the methods of encoding and decoding the base64 cryptographic algorithm. The term encoding means a process of converting plaintext into ciphertext. While decoding is a term that means the process of turning ciphertext back into plaintext. In general, classical cryptography has been abandoned because of its logic which can be easily solved, so now it has switched to modern cryptography which operates in bit-binary mode which is formed from ASCII code. The base64 algorithm is a form of modern cryptography which is included in the modern type of block cipher cryptography. This study aims to obtain a comparison between 3 types of tools in carrying out a cryptographic encode and decode process on the base64 algorithm. The 3 types of tools include the Base64 Python Program, Bash Base64 Kali Linux, and CyberChef which are online tools. This type of research method uses qualitative methods because it tends to use analysis in research. Where the results of the first comparison are used to make it easier to see the accuracy of the encoding and decoding processes and the results of the second comparison are used to compare in terms of time efficiency when encoding the three tools using 1,000 words which will continue to be added by 4,000 words, up to a total of 9,000 words . These words are taken using dummy text (lorem ipsum).
ANALISA EVALUASI KINERJA SOFTWARE PASSWORD ATTACKER PADA BERKAS FILE ZIP Irhan Hisyam Dwi Nugroho; Kadek Pebriawan; Ketut Gede Tegar Maranom Jati; I Gede Cipta Aphila Diptha; I Made Edy Listartha; Gede Arna Jude Saskara
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 3 No. 1 (2023): Maret : Jurnal Informatika dan Tekonologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v3i1.899

Abstract

As we know, in this era of rapid technological progress, we cannot avoid threats to cyber security, cyber security itself is an effort to protect computer systems and data from various threats. In Indonesia alone, as of September 13, 2022, there have been recorded as many as 12.74 million accounts that have experienced leaks, and this makes Indonesia the 3rd country with the most number of data leaks in the world. One solution that can be done to protect the data that is owned is to put it in an archive such as ZIP, ZIP functions to combine several rice into one and reduce the size. And to secure the data in a ZIP file, you can set a password. The password is a combination of letters, numbers and symbols, with this combination it will be difficult for hackers to carry out their actions.
PENGUKURAN EFEKTIVITAS SERANGAN SQL INJECTION PADA WEBSITE DENGAN MENGGUNAKAN TOOLS JSQL, HAVIJ, DAN THE MOLE Aprilia Monica Sari; Trihana Santhi; Dewa Ketut Alit Maha Putra; Muhamad Bintang Haekal; I Made Edy Listartha; Gede Arna Jude Saskara
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 3 No. 1 (2023): Maret : Jurnal Informatika dan Tekonologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v3i1.905

Abstract

Along with current technological developments, security for data information residing on websites is very vulnerable to crimes in the internet world such as attacks on security holes in the database layer or often known as SQL Injection. SQL Injection attack is a method to insert SQL commands as input through an application, namely Kali Linux, in order to gain access to the database. This attack can find out usernames, passwords, and other data that is in the database. So that the SQL Injection attack is one of the most popular attacks and is often used to take advantage of security holes in the system because of how easy it is to use it. This study aims to test the level of effectiveness of SQL Injection attacks using the tools in it against a website. Testing the effectiveness is done by doing a comparison between the three tools that are in SQL Injection. The results of the research on the effectiveness of the tools in SQL Injection are the accuracy of database search times and the accuracy of information from the database.
ANALISIS PERBANDINGAN VULNERABILITY SCANNING PADA WEBSITE DVWA MENGGUNAKAN OWASP NIKTO DAN BURPSUITE Ni Putu Ana Rainita; Anak Agung Istri Callysta Athalia; Made Diva Putera Ananta; I Ketut Pratista Tri Pramana; Gede Arna Jude Saskara; I Made Edy Listartha
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 3 No. 2 (2023): Juli : Jurnal Informatika dan Teknologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v3i2.908

Abstract

Information technology from time to time is growing rapidly and has become part of human life in this modern era, with these developments, websites have an important role, however, existing developments also have an impact on the security of a website, testing web servers is very important. important thing to do, this test aims to test whether the web server is safe or not from the crimes of hackers. Appropriate methods and techniques are needed to see possible vulnerabilities in components, libraries and systems that underlie web applications used in anticipating this, OWASP, Nikto, and Burp Suite tools can be used to test website security vulnerabilities. Each tool has differences in terms of speed or duration, results, or scanned objects. The research objective of this article is how to analyze a comparison of tools in testing website security vulnerabilities. Therefore, the results of detection or analysis of website vulnerabilities are then compared based on scanned objects, duration, and results to then suggest tools that are effective and efficient in their use.
Analisis Kepuasan Pengguna Aplikasi Abdi Praja Mobile Menggunakan PIECES dan EUCS Loujien, Agil Aurora; Saskara, Gede Arna Jude; Darmawiguna, I Gede Mahendra
TIN: Terapan Informatika Nusantara Vol 6 No 7 (2025): December 2025
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/tin.v6i7.8823

Abstract

The Abdi Praja Mobile application is a system owned by KPN Abdi Praja to support the digital transformation of the cooperative, particularly in providing easier access to financial information for its members. Through this application, members are expected to receive services that are faster, more accurate, and more efficient without needing to visit the cooperative office directly. However, in its implementation, there are still several obstacles that affect the level of user satisfaction, such as limited features, a registration process that is not yet simple, and technical issues that occur at certain times. These conditions indicate the need for a comprehensive evaluation so that the application’s development can be more targeted and aligned with the needs of its members. This study aims to evaluate user satisfaction, analyze the influence of each variable contained in the PIECES and EUCS methods, and formulate improvement recommendations based on the results of the analysis. The findings show that the variables Performance, Information, Economic, Control, Efficiency, Service, and Content have a positive and significant impact on user satisfaction. This indicates that these aspects are perceived as beneficial by members and contribute to their experience in using the application. On the other hand, the variables Accuracy, Format, Ease of Use, and Timeliness do not have a significant influence, suggesting that these elements require more attention in future application development. The recommendations proposed include optimizing system reliability and stability, providing automatic notifications for financial information, developing more comprehensive service features, simplifying the registration process, strengthening data security, improving application accessibility across devices, and providing a 24-hour support service or call center to ensure that members can receive assistance whenever needed.
Implementasi Kubernetes Cluster untuk High Availability dan Load Balancing SIAK Undiksha Pradipta, Ketut Saka; Saskara, Gede Arna Jude; Yudistira, Bagus Gede Krishna
RIGGS: Journal of Artificial Intelligence and Digital Business Vol. 4 No. 4 (2026): November - January
Publisher : Prodi Bisnis Digital Universitas Pahlawan Tuanku Tambusai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/riggs.v4i4.5846

Abstract

Sistem Informasi Akademik (SIAK) merupakan layanan kritis pada lingkungan perguruan tinggi yang dituntut memiliki tingkat ketersediaan dan keandalan tinggi, khususnya pada periode lonjakan akses pengguna seperti pengisian KRS dan penginputan nilai. Pada Universitas Pendidikan Ganesha (Undiksha), arsitektur SIAK yang masih berbasis single server menimbulkan permasalahan berupa penurunan performa dan potensi downtime akibat keterbatasan mekanisme replikasi serta distribusi beban. Penelitian ini bertujuan mengevaluasi penerapan arsitektur Kubernetes Cluster untuk meningkatkan ketahanan layanan (service resilience), high availability, dan efektivitas load balancing pada SIAK Undiksha. Metode penelitian yang digunakan bersifat eksperimental teknis dengan melakukan simulasi kegagalan node dan variasi beban permintaan menggunakan Apache JMeter. Parameter yang dianalisis meliputi Mean Time to Repair (MTTR), tingkat availability, throughput, latency, dan error rate. Hasil pengujian menunjukkan bahwa Kubernetes Cluster mampu mempertahankan ketersediaan layanan di atas 99,9% pada skenario kegagalan satu node dengan waktu pemulihan rata-rata 60–70 detik. Pada pengujian performa, penerapan replikasi pod dan mekanisme load balancing internal Kubernetes mampu meningkatkan throughput secara signifikan serta menekan error rate hingga 0% pada beban menengah hingga tinggi. Temuan ini menunjukkan bahwa Kubernetes Cluster efektif dalam mengurangi risiko single point of failure serta meningkatkan resiliensi dan skalabilitas layanan akademik, meskipun performa sistem tetap dipengaruhi oleh kapasitas sumber daya dan konfigurasi cluster yang digunakan.
Analisis Kesadaran Keamanan Informasi Penggunaan Layanan M-Banking Menggunakan Human Aspects of Information Security Questionnaire Ananda, Ngurah Gede Prema Satya; Saskara, Gede Arna Jude; Yudistira, Bagus Gede Krishna
Journal of Informatics, Electrical and Electronics Engineering Vol. 5 No. 2 (2025): December 2025
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jieee.v5i2.2792

Abstract

This study examines the gap between information security understanding and practice among employees of the Department of Trade, Industry, Cooperatives, Small and Medium Enterprises of Buleleng Regency when using M-Banking services vulnerable to phishing. Its objective is to measure the overall level of information security awareness and identify the weakest areas to serve as a basis for more focused mitigation recommendations. This research employs a quantitative approach using a survey method involving 119 employees. The research instrument was developed based on the Human Aspects of Information Security Questionnaire (HAIS-Q) framework to measure the dimensions of Knowledge, Attitude, and Behavior. The collected data were analyzed using the Multiple Weighted Score Analysis (MWSA) method to determine vulnerability scores and rankings. The overall level of employees' information security awareness falls into the “Good” category with a composite score of 3.69. However, the findings reveal a significant knowledge-attitude-behavior gap, where the "Good" scores for Knowledge and Attitude dimensions are not matched by the Behavior dimension score, which is categorized as “Moderate.” To bridge this gap, recommendations focus on developing Standard Operating Procedures (SOPs) designed as tools to foster secure habits. For effectiveness, SOP implementation must be supported by socialization activities oriented towards behavioral change, rather than mere information dissemination. This socialization should include practical training and direct simulations, particularly phishing attack simulations.
Pengembangan Simulasi berbasis Augmented Reality: Penyambungan Kabel Fiber dan Jaringan FTTH Pujayani, Ni Made Dwi; Sindu, I Gede Partha; Saskara, Gede Arna Jude
Jurnal Profesi Insinyur Universitas Lampung Vol. 6 No. 2 (2025)
Publisher : Fakultas Teknik Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jpi.v6n2.289

Abstract

Abstract. This study aims to develop Augmented Reality (AR)-based learning media on fiber optic cable and FTTH network materials to support FTTx learning. The method used is Research and Development (R&D) with a 4D development model that includes the Define, Design, Develop, and Disseminate stages. The developed media was tested through blackbox testing, whitebox testing, individual testing, small group testing, field testing, as well as pretest and posttest to measure its effectiveness. The test results showed that the application functioned well and was considered very feasible, as indicated by a small group test percentage of 91.5% and a field test percentage of 91.47%. The responses of students and teachers also showed very positive assessments. Overall, this AR learning media was declared valid, effective, and practical for use in fiber optic and FTTH network learning.
Peran Gamifikasi dalam Meningkatkan UX Aplikasi Shopee di Indonesia Putra, I Kadek Permana; Pradnyana, I Made Ardwi; Saskara, Gede Arna Jude
JUSIFOR : Jurnal Sistem Informasi dan Informatika Vol 4 No 2 (2025): JUSIFOR - Desember 2025
Publisher : Fakultas Sains Dan Teknologi, Universitas Raden Rahmat Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.70609/jusifor.v4i2.7225

Abstract

The implementation of gamification on e-commerce platforms holds the potential to enhance user engagement and satisfaction. However, several studies indicate that the impact of gamification on User Experience (UX) can vary, with gamification elements sometimes only providing short-term effects or even being insignificant. This research aims to analyze how gamification influences the perception of User Experience (UX) among users of the Shopee Games feature in Indonesia. A simple linear regression method was employed in this study. Data collection was conducted through surveys distributed to Shopee Games users. Regression analysis revealed a significant relationship between gamification and UX, with a correlation coefficient (R) of 0.755, indicating a strong relationship. The R Square value of 0.571 confirms that 57.1% of the variance in UX can be explained by gamification. The results of the ANOVA test reinforce these findings with a significance value of < 0.001, proving that the regression model used is valid and that gamification has a statistically significant impact on UX. Furthermore, further analysis found no issues of heteroscedasticity, thus fulfilling the classical regression assumptions. The implications of this research affirm that the effective implementation of gamification elements enhances users' perception of their experience when using the Shopee application. These findings recommend that e-commerce companies further optimize their gamification strategies to increase user engagement.
Co-Authors Agus Seputra I Ketut Alit Alit Juniska Anak Agung Istri Callysta Athalia Ananda, Ngurah Gede Prema Satya Aprilia Monica Sari Apriliyanto, Bagus Arijaya Kusuma, Kadek Angga Decky Pratama Putra Dewa Ayu Deby Cintiya Dewa Ketut Alit Maha Putra Dewa Made Julijati Putra Dewa, Ayu Deby Cintiya Dharma Putra, I Putu Surya Diva Ananda Putra Dwipayoga, Dewa Made Wisma Fransesko Indrajid Fridayanti, Ni Putu Eka Gede Agus Supriatmaja Gede Ananta Cahya Maheswara Gede Rasben Dantes Gede Saindra Santyadiputra Gede Saindra Santyadiputra Gede Saindra Santyadiputra, Gede Saindra Gusti Ayu Mas Ekayanti Gusti Kade Surya Aditya Putra Herlambang, Varelly Arletta Tyora Putri I Gede Ardi Sukaryadi Putra I Gede Bagastia Widi Atmaja I Gede Cipta Aphila Diptha I Gede Mahendra Darmawiguna I Gede Pasek Wedana I Gede Wahyu Parama Sucipta I Gede Wahyu Parama Sucipta I Gusti Agung Ayu Ananda Dewi I Gusti Ayu Agung Diatri Indradewi I Gusti Lanang Agung Raditya Putra I Gusti Lanang Agung Raditya Putra I Gusti, Lanang Agung Raditya Putra I Ketut Pratista Tri Pramana I Ketut Resika Arthana I Komang Wisnu Budi Wijaya I Made Agastya Maheswara I Made Ardwi Pradnyana I Made Edy Listartha I Made Gede Sunarya I Made Wedana Yuda Yana, Yuda I Nyoman Namo Yoga Anantra I Putu Mas Yuda Pratama I Putu Oktap Indrawan I Wayan Ari Pramana Putra Ida Ayu Mas Putri Mahalini Ida Bagus Kusuma Dewantara Ida Bagus Nyoman Pascima Ilham Ramdhani Irhan Hisyam Dwi Nugroho Jaya Deva Kadek Andi Surya Negara Kadek Dedi Krisma Prayudi Kadek Dwika Darma Widyaputra Kadek Ferdy Andika Kadek Karisma Bramanda Kadek Pebriawan Kadek Sukma Jayanti Ketut Gede Tegar Maranom Jati Komang Mahendra Komang Widhi Dharma Pratiwi Krisna, I Gede Natha Kumara, I Ketut Bagus Surya Loujien, Agil Aurora Made Diva Putera Ananta Mahadiv Wikrama, Kadek Sudewo Maharani, Made Donita Maheswara, Gede Ananta Cahya Medes Mendrofa, Linda Zal Mita Dewi, Ni Luh Listiana Putri Mochammad Syahrul Kurniawan Muhamad Bintang Haekal Neno, Joseph Extrada Ngurah Manik Mahardika Ni Ketut Rika Suryani Ni Luh Listiana Putri Mita Dewi Ni Made Gita Ayu Padmasari Ni Putu Ana Rainita Ni Putu Diah Ratih Rakasiwi Ni Putu Eka Fridayanti Permana, Made Ody Gita Pradipta, Ketut Saka Pratama, Gede Ade Pratiwi, Komang Widhi Dharma Pujayani, Ni Made Dwi Purba, Darma Putra Putra, Decky Pratama Putra, Diva Ananda Putra, I Kadek Permana Putra, I Wayan Ari Pramana Putri, Kadek Rosila Putu Adhitya kusuma Putu Candra Ariani Putu Damar Jagat Pratama Putu Maha Putra Putu Surya Ardi Bhuana Putu Yoga Suartana Raditia, Kadek Rama Rama Ngurah Putera Pinatih Ramdhani, Ilham Rangga Firdaus Reynaldus Yoseph Maria Neto Labamaking Sindu, I Gede Partha Sucipta, I Gede Wahyu Parama Sudiasta Putri, Nyoman Dinda Indira Suputri, Komang Ayu Trihana Santhi Utama, I Made Putra Wirayuda, Anak Agung Eka Yogantara, Ketut Manik Yudistira, Bagus Gede Krishna Zulvan Avito Anwari