Claim Missing Document
Check
Articles

Found 23 Documents
Search

Rethinking Classroom Ventilation in post pandemic Situation Harwahyu, Ruki; Setiani, Hastin; Faroghi, Muhammad Surya; Sari, Riri Fitri
Journal of Sustainability Perspectives Vol 2, No 2 (2022)
Publisher : Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (304.841 KB) | DOI: 10.14710/jsp.2022.15479

Abstract

This paper aims to contribute in outlining the latest findings and formulating a simple practice in providing sufficient air circulation for classroom activities in preparation for the post-pandemic era. During this pandemic, remote learning over the internet has been a viable solution everywhere, including adopted by education institution to keep serving the learning process. However, as more and more people involved and the time elapses, several disadvantages of e-learning are realized. In addition, education institution should be prepared for the upcoming offline learning activity in post-pandemic era. This paper aims to refine the minimum airflow requirement for the classroom, finetuned based on student activity, ceiling height. Student activity is being the focus rather than teacher because student represents the majority of classroom occupant. In addition, a discussion on how it can be achieved using simpler ventilation system is presented. ON/OFF scheme for the usage of the active ventilation is also elaborated.Keyword: classroom, post-pandemic era, ventilation system, air circulation.
Rethinking Classroom Ventilation in post pandemic Situation Harwahyu, Ruki; Setiani, Hastin; Faroghi, Muhammad Surya; Sari, Riri Fitri
Journal of Sustainability Perspectives Vol 2, No 2 (2022)
Publisher : Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (304.841 KB) | DOI: 10.14710/jsp.2022.15479

Abstract

This paper aims to contribute in outlining the latest findings and formulating a simple practice in providing sufficient air circulation for classroom activities in preparation for the post-pandemic era. During this pandemic, remote learning over the internet has been a viable solution everywhere, including adopted by education institution to keep serving the learning process. However, as more and more people involved and the time elapses, several disadvantages of e-learning are realized. In addition, education institution should be prepared for the upcoming offline learning activity in post-pandemic era. This paper aims to refine the minimum airflow requirement for the classroom, finetuned based on student activity, ceiling height. Student activity is being the focus rather than teacher because student represents the majority of classroom occupant. In addition, a discussion on how it can be achieved using simpler ventilation system is presented. ON/OFF scheme for the usage of the active ventilation is also elaborated.Keyword: classroom, post-pandemic era, ventilation system, air circulation.
ZTSCAN: ENHANCING ZERO TRUST RESOURCE DISCOVERY WITH MASSCAN AND NMAP INTEGRATION Reikal Taupaani; Ruki Harwahyu
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) Vol. 10 No. 4 (2025): JITK Issue May 2025
Publisher : LPPM Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/jitk.v10i4.6628

Abstract

Implementing Zero Trust Architecture (ZTA) requires a comprehensive understanding of network assets as a fundamental step in implementing security policies. This study proposes ZTscan, an automated tool to increase the efficiency of network asset resource discovery. This proposed tool is then made open source in Github for anyone to evaluate and extend. The research constructs a GNS3-based testing scenario to evaluate the performance of the proposed tool against other scanning tools, including standalone Nmap, Masscan, RustScan, and ZMap. The evaluation focuses on three key metrics: accuracy, scanning speed, and generated data throughput. Experimental results demonstrate that ZTscan achieves 100% accuracy, matching Nmap_Pingsyn while outperforming faster tools such as Masscan, ZMap, and RustScan in precision. ZTscan completes scans 10.64%, faster than Nmap TCP SYN scan while maintaining comparable high accuracy. In terms of throughput, ZTscan reaches a stable peak throughput that is  13.8% lower than Nmap TCP SYN scan without causing disruptive traffic spikes. The findings of this study serve as a reference for resource discovery strategies in ZTA implementation, particularly in scenarios that require fast and accurate network scanning while minimizing potential disruptions or network interference.
Analysis of Employee Capacity Gap in Managing Network Security and Its Implementation Towards Insider Threat Prevention Sitorus, Felix Noel; Harwahyu, Ruki
MALCOM: Indonesian Journal of Machine Learning and Computer Science Vol. 5 No. 2 (2025): MALCOM April 2025
Publisher : Institut Riset dan Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.57152/malcom.v5i2.1878

Abstract

Network security is crucial for protecting organizational information in the rapidly evolving digital era. Threats to networks do not only come from external sources, such as malware or hacking, but also from within the organization, known as insider threats. These threats can cause significant losses, whether due to intentional or unintentional actions by employees or internal parties with access to the system. Therefore, employees' ability to manage network security is key to addressing these threats. Handling insider threats must be a top priority for organizations. This study aims to analyze the employee capacity gap in managing network security and its impact on preventing insider threats in XYZ Organization. By implementing ISO 27001 security standards, particularly within the context of the Information Security Management System (ISMS) using the PDCA approach, this research evaluates how human resource management relates to information asset management and network security maintenance. The findings indicate that gaps in employees' knowledge and skills regarding network security significantly contribute to vulnerabilities against insider threats. This study also highlights how the implementation of ISO 27001, which emphasizes asset analysis and the PDCA cycle, can help organizations improve information security governance and prevent insider threats
A Review Artikel : Studi Komprehensif Kinerja Sistem Keamanan Jaringan dalam Menangkal Serangan terhadap Infrastruktur Energi Listrik Harwahyu, Ruki; Nur Aprilla, Lendra
Jurnal Pendidikan dan Teknologi Indonesia Vol 5 No 8 (2025): JPTI - Agustus 2025
Publisher : CV Infinite Corporation

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jpti.954

Abstract

Infrastruktur energi listrik semakin bergantung pada teknologi informasi dan komunikasi sehingga menjadi lebih rentan terhadap serangan siber. Ketergantungan ini menambah risiko serius terhadap keandalan dan keamanan sistem tenaga listrik, terutama dalam menghadapi serangan yang semakin canggih dan terorganisir. Penelitian ini bertujuan untuk mengevaluasi kinerja sistem keamanan jaringan dalam melindungi infrastruktur energi listrik dari ancaman siber. Metode yang digunakan adalah studi literatur dengan pendekatan analisis deskriptif terhadap berbagai teknik pertahanan yang telah diterapkan maupun yang sedang dikembangkan. Hasil kajian menunjukkan bahwa sistem deteksi intrusi (IDS), firewall cerdas, dan algoritma pembelajaran mesin adalah pendekatan yang paling umum dan efektif. Namun, beberapa kelemahan ditemukan, seperti keterbatasan dalam mendeteksi serangan zero-day, kurangnya kemampuan adaptasi terhadap pola serangan baru, serta integrasi sistem yang belum optimal. Berdasarkan temuan ini, penelitian ini merekomendasikan peningkatan integrasi teknologi berbasis kecerdasan buatan, penguatan respons waktu nyata (real-time response), dan perbaikan koordinasi antar sistem keamanan. Temuan ini diharapkan dapat menjadi dasar dalam pengembangan strategi keamanan siber yang lebih kuat dan adaptif untuk menjaga keandalan serta ketahanan infrastruktur energi listrik dalam jangka panjang.
Risk Management Analysis in Digital Bank XYZ Using the COBIT 2019 Framework Purnomo, Rudi; Harwahyu, Ruki
MALCOM: Indonesian Journal of Machine Learning and Computer Science Vol. 5 No. 3 (2025): MALCOM July 2025
Publisher : Institut Riset dan Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.57152/malcom.v5i3.1876

Abstract

The digital transformation in the banking sector has driven the emergence of digital banks, offering online services without the need for physical branches. However, this transformation brings various risks, including information security threats and challenges in regulatory compliance. This study aims to evaluate the maturity level of risk management in Digital Bank XYZ using the COBIT 2019 framework. The research methodology employs a qualitative approach with gap analysis to compare the current state with expected standards. The findings reveal significant gaps in the APO13 (Managed Security) and DSS04 (Managed Continuity) domains between current risk management practices and the standards recommended by COBIT 2019. These results highlight the need for a more systematic and structured risk management approach to enhance Digital Bank XYZ's preparedness in addressing cybersecurity threats and other operational risks. Recommendations include strengthening security policies, implementing predictive technologies, and conducting regular training to improve the security team's competencies. This study is expected to serve as a strategic guideline for Digital Bank XYZ to mitigate risks, improve operational efficiency, and achieve international governance standards.
DETECTION OF SQL INJECTION VULNERABILITY IN CODEIGNITER FRAMEWORK USING STATIC ANALYSIS Fahmi Al Azhar, Muhammad; Harwahyu, Ruki
MULTITEK INDONESIA Vol 17 No 1 (2023): Juli
Publisher : Universitas Muhammadiyah Ponorogo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24269/mtkind.v17i1.7267

Abstract

SQL Injection attacks are still one type of attack that often occurs in web-based applications. The causes and ways to prevent SQL Injection have been widely explained in various sources. Unfortunately, until now, SQL Injection vulnerabilities are still often found in multiple applications. Web-based application frameworks that already have functions to protect against attacks are often not used optimally. This is inseparable from the role of programmers, who often forget the rules for writing program code to prevent SQL Injection attacks. We conducted this research to detect SQL Injection vulnerabilities in source code using a case study of the PHP CodeIgniter framework. We compared this research with static analysis tools like RIPS, Synopsys Coverity, and Sonarqube. The tool we have developed can detect SQL Injection vulnerabilities that cannot be detected by the two tools with an accuracy of 88.8%. The results of our research can provide suggestions for programmers so that they can improve the code they write.
Multichannel Slotted ALOHA Simulator Design for Massive Machine-Type Communication (mMTC) on 5G Network Feliana, Ferlinda; Harwahyu, Ruki; Overbeek, Marlinda Vasty
International Journal of Electrical, Computer, and Biomedical Engineering Vol. 1 No. 2 (2023)
Publisher : Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62146/ijecbe.v1i2.8

Abstract

Massive Machine-type Communication (mMTC) is one of the main service scenarios in 5G. At the time of initializing the connection to the base station, the MTC machines will make a connection request via the random access procedure. One of the schemes of random access procedure for handling this connection request is similar to how multichannel slotted ALOHA works. Multichannel slotted ALOHA itself is a development of the slotted ALOHA scheme which originally has only a single channel. At the initial state of mMTC, there will be an explosion of the number of demands to the available channels. Given the number of machines that will be connected, the likelihood of a collision on the same channel increases. As a result, the probability of failure also increases. The system's configuration has an impact on the likelihood of success and the time it takes to achieve it. The number of channels influences the likelihood of collisions, the backoff window influences the transmission distribution in each slot, and the maximum transmission limits the ability of device retransmission. These three arrangements have an impact on one another. The simulator build in this research is expected to make it easier for researchers to optimize multichannel slotted ALOHA configurations in 5G to handle the surge in access demands from mMTC devices.
OffensiveRezzer: A Novel Black-Box Fuzzing Tool for Web API Putera, Danar Gumilang; Harwahyu, Ruki
Scientific Journal of Informatics Vol. 11 No. 2: May 2024
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v11i2.4631

Abstract

Purpose: The purpose of this study is to introduce OffensiveRezzer, a novel tool designed for black-box fuzzing on Web APIs, and to evaluate its effectiveness in detecting errors, particularly focusing on errors related to input validation implementation. Methods: We introduced OffensiveRezzer and conducted a comparative analysis against existing fuzzing tools such as EvoMaster, Schemathesis, RestTestGen, Restler, and Tcases to assess its performance. Fuzzing experiments were carried out on a custom Web API application with different input validation levels, namely no input validation, partial input validation, and full input validation. Result: OffensiveRezzer demonstrated superior performance compared to other fuzzing tools in identifying errors in Web APIs. It outperformed competitors by detecting the highest number of unique errors. The total number of errors found by OffensiveRezzer in the application without validation, the application with partial validation, and the application with full validation was 416, followed by Restler (240), RestTestGen (145), EvoMaster (138), Tcases (78), and Schemathesis (42). Novelty: The study has presented OffensiveRezzer as a novel tool specifically designed for black-box fuzzing on Web APIs, with a primary focus on testing input validation implementation. This tool fills a gap in existing fuzzing tools and offers improved capabilities for detecting errors in Web APIs.
Information Security Management System Assessment Model by Integrating ISO 27002 and 27004 Fajri, Khafidh Sunny Al; Harwahyu, Ruki
MALCOM: Indonesian Journal of Machine Learning and Computer Science Vol. 4 No. 2 (2024): MALCOM April 2024
Publisher : Institut Riset dan Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.57152/malcom.v4i2.1245

Abstract

The rapid development of information and communication technology has also led to a significant increase in cybercrime activities. According to the Annual Cybersecurity Monitoring Report by the National Cyber and Cryptography Agency, there were 495 million instances of traffic anomalies or attempted attacks in 2020, which rose to 1.6 billion in 2021 in Indonesia. Implementing the ISO 27001 standard for information security management system (ISMS) can help mitigate these cyber-attack attempts. However, with various levels of resources and organizational commitment, different levels of ISMS maturity can be achieved. Therefore, there is a need for an ISMS assessment model. This is crucial, considering cyber incidents such as data breaches in organizations that have implemented or are certified with ISO 27001. This research proposed a concept of ISMS assessment model by integrating ISO 27002 and 27004 to a case study (Directorate XYZ), where the guidance function of ISO 27002 is transformed into assessment parameters and ISO 27004 for measuring performance. Using this model, the score of the case study’s ISMS was found to be 53.925, which is still below the established standard of 80.