Claim Missing Document
Check
Articles

Found 13 Documents
Search

MODEL ARSITEKTUR UNTUK SISTEM INFORMASI BIMBINGAN KONSELING DENGAN METODE PROTOTYPING Nugroho, Irfan Hari; Sutanto, Imam; Akbar, Habibullah; Herwanto, Agus
Simtek : jurnal sistem informasi dan teknik komputer Vol. 10 No. 2 (2025): Oktober 2025
Publisher : STMIK Catur Sakti Kendari

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51876/simtek.v10i2.1644

Abstract

Penerapan teknologi informasi dalam layanan bimbingan konseling di lingkungan sekolah menjadi solusi atas permasalahan pengelolaan data dan penjadwalan yang selama ini dilakukan secara manual. Penelitian ini merancang dan mengembangkan sistem informasi manajemen bimbingan konseling berbasis website menggunakan framework Laravel yang mengadopsi arsitektur Model-View-Controller (MVC). Sistem dirancang untuk mempermudah guru BK dalam mencatat, mengelola, dan memantau proses konseling, serta memungkinkan Siswa dan orang tua untuk mengakses informasi layanan secara daring. Metode pengembangan yang digunakan adalah prototyping yang melibatkan pengguna sejak tahap awal untuk memastikan sistem sesuai kebutuhan. Hasil dari penelitian ini adalah sistem informasi bernama SIMANKO yang dapat menyimpan riwayat konseling, melakukan penjadwalan online maupun offline, serta menghasilkan laporan bimbingan secara otomatis. Sistem ini diharapkan mampu meningkatkan efisiensi, akurasi, dan kecepatan dalam layanan konseling di SMK Negeri 9 Jakarta.
Pengujian Kualitas Sistem Informasi Kesehatan Periksa.ID Berbasis Autentikasi Menggunakan Software Testing Life Cycle Salshabila, Andini Dwi; Sutanto, Imam; Hosizah, Hosizah; Pertiwi, Tria Saras
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 10 No 2 (2026): APRIL 2026
Publisher : Lembaga Otonom Lembaga Informasi dan Riset Indonesia (KITA INFO dan RISET)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v10i2.5477

Abstract

The advancement of information technology in the healthcare sector encourages hospitals to implement reliable and secure digital systems, one of which is the Periksa.id application. This application is used by doctors to record inpatient examination results and is now equipped with a fingerprint authentication feature. This study aims to evaluate the quality of the Periksa.id application using the Software Testing Life Cycle (STLC) method, which consists of six stages: requirement analysis, test planning, test case design, test environment setup, test execution, and test closure. The research was conducted at Soeharto Heerdjan Hospital over a period of three months with a total of 200 virtual users involved in the reliability testing. Testing was carried out on both functional and non-functional aspects, including response time, reliability, security, portability, as well as positive and negative testing, using tools such as JMeter, WAPT, and ZAP. The results showed that the application met over 85% of the software quality criteria, although several minor bugs and 12 security vulnerabilities (2 high, 10 medium) were identified and require improvement. This study contributes to the evaluation of web-based hospital application systems to enhance the efficiency of medical services and ensure secure patient data management.
Penerapan Penetration Testing pada Sistem EasyCart dalam Menghadapi Ancaman Keamanan Siber Fahrul Reza, Mochamad; Sutanto, Imam
Applied Information Technology and Computer Science (AICOMS) Vol 4 No 2 (2025)
Publisher : Pengelola Jurnal Politeknik Negeri Ketapang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58466/aicoms.v4i2.1937

Abstract

Information security in e-commerce applications is a crucial aspect in maintaining the integrity, confidentiality, and availability of user data. The method used is penetration testing with a black-box and grey-box approach, referring to the Penetration Testing Execution Standard (PTES) and the OWASP Top 10 framework for 2021. The testing was conducted through the seven PTES phases: Pre-engagement Interactions, Intelligence Gathering, Threat Modeling, Vulnerability Analysis, Exploitation, Post-Exploitation, and Reporting. The testing environment was run locally using tools such as Burp Suite, OWASP ZAP, Nikto, SQLMap, and Nmap. The testing results identified 20 vulnerabilities with high, medium, and low risk levels, including Cross-Site Scripting (XSS), SQL Injection, Broken Access Control, and Security Misconfiguration. Mitigation recommendations are based on ISO/IEC 27001:2022 controls, specifically Annex A.5 (information security policy), A.8 (asset management), and A.12 (operational security). This research contributes to the understanding and application of standards-based security testing in simulation applications, while emphasizing the importance of input validation, secure system configuration, and regular updates as mitigation measures against cyber threats.