Claim Missing Document
Check
Articles

Found 20 Documents
Search

Optimization of BROMO Application Use by Creating the Right Operating Standards for Data Flow at PT Telkom Akses Mataram: OPTIMALISASI PENGGUNAAN APLIKASI BROMO DENGAN MEMBUAT STANDAR OPERASIONAL YANG TEPAT UNTUK ALIRAN DATA PADA PT TELKOM AKSES MATARAM Jatmika, Andy Hidayat; Hadi, Risman; Huwae, Raphael Bianco; Wibowo, Hening Setio Cahyo
Jurnal Begawe Teknologi Informasi (JBegaTI) Vol. 6 No. 1 (2025): JBegaTI
Publisher : Program Studi Teknik Informatika, Fakultas Teknik Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jbegati.v6i1.1337

Abstract

Kantor Telkom Akses Langko merupakan salah satu kantor telkom yang berada di Mataram, kantor telkom langko saat ini belum mempunyai SOP dalam hal pengiriman data. Kantor telkom langko memiliki berbagai divisi di dalamnya salah satunya adalah admin. Admin bertugas untuk menginput data ke BROMO yang dikirimkan oleh petugas lapangan. Namun saat ini alur pengiriman data dari teknisi belum teratur yaitu masih menggunakan aplikasi telegram yang terkadang pihak admin langsung meminta ke teknisi tanpa melalui leader terlebih dahulu sehingga alur aliran data menjadi tidak baik yaitu dapat kehilangan dan kerusakan data. Untuk itu perlu adanya Standar Operasional Prosedur (SOP) untuk mengatur aliran data secara urut dari teknisi, leader, admin, hingga sampai ke site manager. Melalui penerapan SOP yang baru, diperoleh hasil survei dari 57 responden yang mengatakan bahwa aliran data lebih struktur dan memudahkan dalam pencarian data.
IMPLEMENTASI OWASP TOP 10 DALAM PENGUJIAN PENETRASI WEBSITE : MENGIDENTIFIKASI CELAH KEAMANAN DALAM SISTEM PENGELOLAAN VOTING INDONESIA Zairina, Zora; Huwae, Raphael Bianco; Jatmika, Andy Hidayat
JTIKA (Jurnal Teknik Informatika, Komputer dan Aplikasinya) Vol 7 No 1 (2025): Maret 2025
Publisher : Program Studi Teknik Informatika, Fakultas Teknik, Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jtika.v7i1.456

Abstract

The rapid advancement of information technology has had a major influence in every aspect of life, including in government operations. the availability of platforms such as websites can be a medium for disseminating information transparently, especially in Indonesia's democratic process, namely elections. However, this digital convenience also presents cybersecurity challenges. therefore this research focuses on identifying security gaps in the voting management system in Indonesia by conducting penetration testing based on the OWASP Top 10 2021. in conducting penetration testing, it focuses on 10 subdomains on the targeted voting management website. This research process starts from the process of scanning and testing security using various tools such as subfinder, dirsearch, nuclei, ex-param and JSRecon. thus getting the analysis results that of the 10 targets 9 of them have vulnerabilities related to the OWASP Top 10 categories, such as A01-Broken Access Control, A03-Injection, A05-Security Misconfiguration, and A06-Vulnerable and Outdated Components. Broken Access Control is the most commonly found gap, identified in 6 subdomains. this research aims to improve the security of voting management systems in Indonesia while contributing to the sustainability of a more secure digital democracy in Indonesia.
THREAT MODELING MENGGUNAKAN PENDEKATAN STRIDE DAN DREAD UNTUK MENGETAHUI RISIKO DAN MITIGASI KEAMANAN PADA SISTEM LAYANAN PENDIDIKAN Iwana, Alang Artha; Huwae, Raphael Bianco; Jatmika, Andy Hidayat
JTIKA (Jurnal Teknik Informatika, Komputer dan Aplikasinya) Vol 7 No 1 (2025): Maret 2025
Publisher : Program Studi Teknik Informatika, Fakultas Teknik, Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jtika.v7i1.461

Abstract

Information system security is increasingly crucial with the rise of cyber threats. This study identifies and evaluates security risks in education service systems using STRIDE and DREAD-based Threat Modeling. STRIDE identifies threats such as spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege, while DREAD assesses risk based on potential damage, ease of exploitation, affected users, and likelihood of detection. The analysis showed that information disclosure and elevation of privilege were the highest risks, mainly due to the permissive CORS configuration. Testing using Burp Suite revealed high-level vulnerabilities allowing unauthorized access and data leakage. To address this, mitigations in the form of CORS policy validation, HTTP method restrictions, data encryption, and role-based authentication were implemented. Simulation results after mitigation showed a significant reduction in security issues, such as critical issues dropping from 6 to 1. This research confirms STRIDE and DREAD are effective in identifying and evaluating security risks, providing a strong basis for designing mitigation strategies to maintain educational service security.
TRANSFORMASI PELAYANAN DESA BERBASIS DIGITAL MODERN DAN PENGEMBANGAN SUMBER DAYA MANUSIA MELALUI PROGRAM PELATIHAN Jatmika, Andy Hidayat; Muziburrahman, Ilham; Wati, Putri Bima; Dwiyanti, Putri; Hadiningrum, Diah Sunasti; Ainun, Ainun; Metamelya, Baiq Areta; Saputri, Hartini; R, Rifqi Januar Islami; Naim, Syahrul; Nizan, Afnan
Jurnal Wicara Vol 1 No 2 (2023): Jurnal Wicara Desa
Publisher : Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/wicara.v1i2.2418

Abstract

Mataram University as a tertiary institution has the duties and functions of implementing the Tri Dharma of Higher Education, namely education and teaching, research, and community service. Such efforts are not only carried out and become the obligation of lecturers alone, but also for students. The use of technology in the village of North Surabaya is still lacking, the village administration system is still carried out manually and the dissemination of village information is still uneven. With the existence of a village website, it is hoped that administrative management and distribution of information will be evenly distributed. The understanding of the North Surabaya village community about digital is still very minimal, of course there must be efforts that needs to be done to increase human resources regarding digitization in order to take advantage of the potential that exists in the village of North Surabaya. The implementation of the work program is carried out using a participatory method by collaborating with various existing stakeholders, the output of the real work lecture program is assisting SSID development, making a Local Area Network (LAN) master plan, and creating a temporary village website in the village of North Surabaya. For 45 days in North Surabaya Village we have carried out the main program, namely creating a temporary website containing village infographics and making a LAN master plan which later the village can use as a reference when installing a LAN network at the village office. In addition to the main work program, there is also an additional work program, namely the socialization of "Cute Internet" with the aim of developing human resources in North Surabaya Village to make positive use of the internet.
INSTALASI IRIGASI TETES BERTENAGA SURYA PADA PERTANIAN LAHAN KERING DESA GUMANTAR KABUPATEN LOMBOK UTARA: Solar-Powered Drip Irrigation Installation On Dryland Farms In Gumantar Village, North Lombok District Zubaidi, Ariyan; Wedashwara, Wirarama; Jatmika, Andy Hidayat; Mardiansyah, Ahmad Zafrullah; Wijayanto, Heri
Jurnal Begawe Teknologi Informasi (JBegaTI) Vol. 5 No. 2 (2024): JBegaTI
Publisher : Program Studi Teknik Informatika, Fakultas Teknik Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jbegati.v5i2.1271

Abstract

Desa Gumantar, yang terletak di Kabupaten Lombok Utara, menghadapi tantangan besar dalam sektor pertanian karena kondisi lahan yang kering dan cuaca panas ekstrem. Rendahnya curah hujan dan distribusi air yang terbatas mengakibatkan kesulitan dalam pengelolaan sumber daya air, yang berdampak negatif pada produktivitas pertanian. Untuk mengatasi permasalahan ini, teknologi irigasi hemat air seperti sistem irigasi tetes sangat diperlukan untuk memaksimalkan penggunaan air secara efisien. Selain itu, pemanfaatan tenaga surya sebagai sumber energi alternatif dapat mendukung keberlanjutan pertanian dengan mengurangi ketergantungan pada bahan bakar fosil. Dalam kegiatan pengabdian masyarakat ini, dilakukan instalasi sistem irigasi tetes yang digerakkan oleh tenaga surya pada lahan pertanian di Desa Gumantar. Sistem ini menggunakan panel surya untuk menggerakkan pompa air yang menyalurkan air melalui pipa langsung ke akar tanaman. Hasil implementasi menunjukkan pengurangan biaya operasional yang signifikan, khususnya dalam pengeluaran solar, serta peningkatan produktivitas tanaman tomat dan cabai. Teknologi ini tidak hanya meningkatkan efisiensi penyiraman tetapi juga memberikan pengetahuan dan keterampilan baru kepada petani mengenai teknologi irigasi berkelanjutan yang ramah lingkungan dan efisien.
Security Analysis of the Lombok Tourism Android Application Using Penetration Testing (Pentesting) Methods Based on the OWASP Mobile Top 10-2024 Framework Ida Bagus Adi Surya Kemenuh; Huwae, Raphael Bianco; Jatmika, Andy Hidayat
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 9 No 1 (2025): Juni 2025
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v9i1.624

Abstract

Android has become the most widely used operating system for mobile devices, playing a crucial role in supporting the tourism sector. As tourism in Indonesia grows, the demand for quick and easy access to information for travel planning has increased. However, concerns about the security of user data in Android applications have emerged. This study focuses on penetration testing of tourism-related Android applications in Lombok to identify vulnerabilities, particularly based on the OWASP Top 10 Mobile Risks. Using static analysis with the Mobile Security Framework (MobFS), two critical vulnerabilities were identified: Insecure Data Storage and Insufficient Cryptography. Penetration testing revealed that although there was a risk related to insecure data storage, no sensitive user data was found in the application's database. The application was also found to use outdated encryption (CBC with PKCS7 padding), which could expose it to padding oracle attacks. This research emphasizes the need for robust security measures in mobile applications within the tourism sector.
Studi Eksperimen Keamanan Jaringan Wi-Fi Kampus: Analisis Kerentanan terhadap Serangan Evil Twin dan Deauthentication Asiana, Kia Putri; Huwae, Raphael Bianco; Jatmika, Andy Hidayat
Jurnal Pendidikan Informatika (EDUMATIC) Vol 9 No 2 (2025): Edumatic: Jurnal Pendidikan Informatika
Publisher : Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29408/edumatic.v9i2.31822

Abstract

The increasing use of Wi-Fi in higher education also brings security risks, such as Evil Twin Attacks that trick users into connecting to fake access points. This study aims to assess the vulnerability of Universitas Mataram’s Wi-Fi network to such attacks using a multihop model and to propose technical improvements. An ethical penetration testing method was applied using a NodeMCU ESP8266 with Deauther firmware, tested across 13 campus locations. Observed variables included the number of connected devices, user interaction with phishing pages, deauthentication success, and captured credentials. The results reveal that five out of 13 locations (38.46%) were vulnerable, where users were redirected to fake SSIDs and entered credentials, even though most deauthentication attempts failed. These findings highlight that attack success depends not only on deauthentication but also on firmware variation and AP configuration. The study implies the need for network security audits, firmware standardization, stronger authentication with full encryption, and enhanced user awareness to reduce phishing risks.
Construction of an Electricity Demand Forecasting Model for PT PLN (Persero) UIW NTB for the Year 2025 Using the Random Forest Algorithm Based on Tariff Categories: PEMBANGUNAN MODEL PREDIKSI KEBUTUHAN ENERGI LISTRIK PT PLN (PERSERO) UIW NTB TAHUN 2025 DENGAN METODE RANDOM FOREST BERDASARKAN KELOMPOK TARIF Anjani, Ida Ayu Dewi Purnama; Huwae, Raphael Bianco; Prawira, Komang Yehuda; Jatmika, Andy Hidayat
Jurnal Begawe Teknologi Informasi (JBegaTI) Vol. 6 No. 2 (2025): JBegaTI
Publisher : Program Studi Teknik Informatika, Fakultas Teknik Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jbegati.v6i2.1433

Abstract

Kebutuhan akan energi listrik di Nusa Tenggara Barat semakin tinggi seiring dengan meningkatnya aktivitas masyarakat dan jumlah pelanggan yang semakin banyak. Oleh karena itu, memiliki sistem prediksi yang akurat sangat penting untuk mendukung perencanaan distribusi energi yang efisien. Penelitian ini bertujuan untuk mengembangkan model yang dapat meramalkan konsumsi listrik pada tahun 2025 berdasarkan kategori tarif dengan menggunakan algoritma Random Forest. Data yang digunakan adalah konsumsi listrik dari tahun 2016 hingga 2024 yang diperoleh dari PT PLN (Persero) UIW NTB. Proses pengolahan data dilakukan melalui pembersihan dan preparasi, diikuti dengan pelatihan model serta penyesuaian hyperparameter menggunakan metode Grid Search. Hasil evaluasi model menunjukkan kinerja yang baik dengan nilai R² mencapai 0,9057 dan MAE sebesar 0,48. Prediksi untuk tahun 2025 memperlihatkan bahwa kelompok tarif rumah tangga dengan daya 450 VA akan menjadi kelompok konsumen yang paling besar. Hasil ini dapat dijadikan sebagai acuan untuk merencanakan strategi distribusi energi oleh PLN.
Training on Solar-Powered Drip Irrigation Installation for Youth and Farmers in Gumantar Village, North Lombok Regency: PELATIHAN INSTALASI IRIGASI TETES BERTENAGA SURYA BAGI PEMUDA DAN PETANI DI DESA GUMANTAR KABUPATEN LOMBOK UTARA Zubaidi, Ariyan; Wirawan, I Gde Putu Wirarama Wedashwara; Jatmika, Andy Hidayat; Mardiansyah, Ahmad Zafrullah; Wijayanto, Heri; Praseba, Diki
Jurnal Begawe Teknologi Informasi (JBegaTI) Vol. 6 No. 2 (2025): JBegaTI
Publisher : Program Studi Teknik Informatika, Fakultas Teknik Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jbegati.v6i2.1460

Abstract

Kawasan pertanian di Dusun Amor-Amor, Desa Gumantar, Kabupaten Lombok Utara, menghadapi tantangan serius berupa keterbatasan sumber daya air akibat kondisi lahan kering dengan struktur tanah berpasir. Permasalahan ini berdampak pada produktivitas pertanian yang bergantung pada ketersediaan irigasi. Sebagai solusi, diterapkan teknologi irigasi tetes bertenaga surya yang dinilai hemat energi, efisien dalam penggunaan air, serta ramah lingkungan. Untuk mendukung adopsi teknologi ini secara berkelanjutan, tim pengabdian dari Universitas Mataram melaksanakan program pelatihan bagi petani dan pemuda setempat. Pelatihan dirancang melalui tahapan pengenalan komponen, penyampaian teori, demonstrasi instalasi, praktik lapangan, hingga latihan pengoperasian dan pemeliharaan sistem. Peserta dibagi dalam kelompok kecil untuk memastikan keterlibatan aktif, dengan bimbingan langsung dari dosen dan mahasiswa. Evaluasi dilakukan melalui kuesioner terhadap sepuluh peserta, yang menunjukkan tingkat kepuasan tinggi dengan skor rata-rata di atas 4,0 dari skala 5. Peserta menyatakan pelatihan membantu pemahaman, meningkatkan wawasan, serta menumbuhkan kepercayaan diri untuk menginstalasi dan mengoperasikan sistem secara mandiri. Hasil ini membuktikan bahwa pelatihan instalasi irigasi tetes bertenaga surya tidak hanya efektif dalam meningkatkan kapasitas teknis, tetapi juga berpotensi memperkuat ketahanan pertanian lokal secara efisien dan berkelanjutan.
Reducing Transmission Signal Collisions on Optimized Link State Routing Protocol Using Dynamic Power Transmission Mahabbati, Lathifatul; Jatmika, Andy Hidayat; Huwae, Raphael Bianco
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 24 No. 1 (2024)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v24i1.3899

Abstract

Many devices connected to a network inevitably result in clashes between communication signals. These collisions are an important factor that causes a decrease in network performance, especially affecting Quality of Service (QoS) like throughput, Packet Delivery Ratio (PDR), and end-to-end de- lay, which has a direct impact on the success of data transmission by potentially causing data loss or damage. The aim of this research is to integrate the Dynamic Power Transmission (DPT) algorithm into the Optimized Link State Routing (OLSR) routing protocol to regulate the communication sig- nal strength range. The DPT algorithm dynamically adapts the signal coverage distance based on the density of neighboring nodes to reduce signal collisions. In our protocol, the basic mechanism of a DPT algorithm includes four steps. The Hello message structure of OLSR has been modified to incorporate the ”x-y position” coordinate field data. Nodes calculate distances to neighbors using these coordinates, which is crucial for route discovery, where all nearby nodes can process route re-quests. The results of this research are that DPT-OLSR improves network efficiency in busy areas. In particular, the DPT-OLSR routing protocol achieves an average throughput enhancement of 0.93%, a 94.79% rise in PDR, and reduces end-to-end delay by 45.69% across various variations in node density. The implication of this research result is that the algorithm proposed automatically adapts the transmission power of individual nodes to control the number of neighboring nodes within a de-fined range. This effectively avoids unwanted interference, unnecessary overhearing, and excessive processing by other nodes, ultimately boosting the network’s overall throughput.