Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Jurnal Sistem Informasi Galuh

Perancangan Aplikasi Virtual Reality Sebagai Media Pembelajaran Sistem Tata Surya Syani, Mamay; Rizky Hadiansyah , Muhammad; Ahmad Firdaus, Eryan; Mulyana, Dadan; Yudi Permana, Nana
Jurnal Sistem Informasi Galuh Vol 2 No 1 (2024): Journal of Galuh Information Systems
Publisher : Fakultas Teknik Jurusan Sistem Informasi Universitas Galuh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25157/jsig.v2i1.3726

Abstract

Learning media have now followed existing technological developments, ranging from print technology, audio visual, computers to technology that combines print technology with computers. Currently, educational media, the result of a combination of print technology and PC, can be realized with Virtual Reality (VR) technology media. Virtual Reality (VR) is a technology that allows users to relate to an area simulated by a PC, an actual area that is imitated or an area that is only in the imagination. Traditional learning as usual where only one interaction occurs makes learning at this time very monotonous, examples of this traditional learning are through pictures, books or even other projection tools. However, with the existence of learning media that utilizes Virtual Reality that is able to realize objects in the virtual world into the real world, it can replace these objects into 3D objects, so that educational procedures are not monotonous.
Aplikasi Sistem Informasi Geografis (SIG) Pendataan Pada Pengawasan Dan Pengendalian Menara Telekomunikasi Berbasis Android (Studi Kasus Dinas Komunikasi Dan Informatika Kota Cimahi) Syani, Mamay; Mahdani; Laia, Firdaus; Mulyana, Dadan; Yudi Permana, Nana
Jurnal Sistem Informasi Galuh Vol 2 No 2 (2024): Journal of Galuh Information Systems
Publisher : Fakultas Teknik Jurusan Sistem Informasi Universitas Galuh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25157/jsig.v2i2.3950

Abstract

A Geographic Information System (GIS) application based on Android is used for the purpose of data collection and monitoring of telecommunication towers, with a case study conducted at the Department of Communication and Informatics (Diskominfo) of Cimahi City. The aim of this research is to optimize the process of data collection and monitoring of telecommunication towers through the utilization of Android-based technology and geographic information. The hope is that the developed application will provide efficient support for Diskominfo in data management, accurate monitoring of telecommunication tower locations, and enhanced supervision of this crucial infrastructure. By combining Android technology and GIS features, it is expected that this application can become an effective tool in supporting the monitoring and control of telecommunication towers in Cimahi City. The methodology used in designing this system is the Waterfall Software Development Life Cycle (SDLC) methodology, which consists of seven stages: Requirement Definition, Design, Development, Testing, Implementation, Maintenance, and Evaluation. This application is built using Flutter version 3.10.6. From the results of the conducted User Acceptance Test (UAT), the average parameter scores are as follows: user interface (85.6%), application performance (88.4%), application functionality (88.4%), application security (80%), and final feedback (91.4%). The overall test result is 86.7%.
Vulnerability Assessment pada Situs XYZ Menggunakan Web Vulnerability Scanner Burp Suite Syani, Mamay; Taufik Fajar Mustafa; Maalik Falah, Hafizh; Rohayati, Tuti; Abdul Rosid, Usep
Jurnal Sistem Informasi Galuh Vol 3 No 2 (2025): Journal of Galuh Information Systems
Publisher : Fakultas Teknik Jurusan Sistem Informasi Universitas Galuh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25157/jsig.v3i2.4961

Abstract

The increasing adoption of digital services by local governments demands greater attention to cybersecurity aspects. This study applies the penetration testing method using a Blue Teaming approach on XYZ, a web-based public service portal using Burp Suite tools, to identify potential security vulnerabilities. The testing follows the NIST SP 800-115 guidelines and reveals 16 vulnerabilities classified as low to medium severity. Findings indicate weaknesses such as cookies without Secure and HttpOnly attributes, the use of vulnerable JavaScript libraries, and the absence of HSTS policy. Recommendations are provided to help site administrators enhance overall system security resilience.
Uji Keamanan Aplikasi Website XYZ Menggunakan Burp Suite Berdasarkan Kerangka NIST SP 800-115 Syani, Mamay; Nurhakim, Ridwan; Rifgi Pratama, Fadhil; Maulana, Haisyam; Nurdin, Ali; Pamungkas, Bayu
Jurnal Sistem Informasi Galuh Vol 3 No 2 (2025): Journal of Galuh Information Systems
Publisher : Fakultas Teknik Jurusan Sistem Informasi Universitas Galuh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25157/jsig.v3i2.4965

Abstract

Advancements in digital technology have prompted government institutions to adopt online services, including the provision of public information through their official websites. However, the growing reliance on digital systems has also led to an increase in cybersecurity threats. This study aims to assess potential security vulnerabilities on the XYZ website, which is managed by a regional government, using a penetration testing approach based on the NIST SP 800-115 framework and the Burp Suite tool. The testing process was carried out in four phases: planning, discovery, attack execution, and reporting. The results revealed eight vulnerabilities, including two classified as high severity: code injection and unencrypted communication (HTTP). Additionally, publicly accessible backup files and support for XML input were identified, posing risks of XML External Entity (XXE) attacks. These findings highlight the critical importance of input validation, full implementation of HTTPS protocols, and strict file management to enhance website security. The study also recommends conducting further audits related to XML vulnerabilities and implementing continuous system monitoring to address evolving cyber threats.