Claim Missing Document
Check
Articles

Found 31 Documents
Search

Desain E-Health: Sistem Keamanan Aplikasi E-health Berbasis Cloud Computing Menggunakan Metode Single Sign On Ramadhani, Erika
Seminar Nasional Informatika Medis (SNIMed) 2015: Prosiding SNIMED 2015
Publisher : Magister Teknik Informatika, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Salah satu jenis pelayanan kesehatan yang sedang berkembang saat ini adalah e-health.E-health memanfaatkan teknologi elektronik dan internet dalam pertukaran data. Berdasarkankanpada kompleksitas kebutuhan sistem pelayanan kesehatan dan teknologi internet yang semakinpesat menyebabkan e-health diintegrasikan dengan cloud computing. Teknologi cloud computingmerupakan teknologi yang memudahkan konsumen untuk mengakses layanan cloud melalui webbrowser atau layanan web. Pada umumnya aplikasi berbasis web merupakan salah satu contohlayanan SaaS (Software as a Service) yang dimanfaatkan untuk e-health. Terdapat banyak isukeamanan pada cloud computing. Masalah keamanan yang bisa terjadi adalah XML SignatureElemen Wrapping, Browser Security, Cloud Malware Injection Attack, dan Flooding Attacks.Namun isu keamanan difokuskan dari sisi pengguna, karena kehilangan atau kebocoran data danpembajakan account atau service merupakan ancaman yang sangat krusial bagi pengguna. Salahsatu cara untuk mengamankan kehilangan data dan pembajakan account tersebut adalah denganmelakukan identity management dan access control. Metode single sign on merupakan salah satusolusi identity management. Hasil akhir dari penelitian ini adalah sebuah aturan untuk melindungikeamanan data aplikasi e-health. Beberapa aturan yang digunakan adalah proses login denganmenggunakan otentikator, jalur komunikasi yang dilindungi dengan menggunakan enkripsi, sertamanajemen identitas untuk pemberian hak akses terhadap aplikasi e-health.
Development of conceptual framework for cyber fraud investigation Hidayati, Anisa Nur; Riadi, Imam; Ramadhani, Erika; Al Amany, Sarah Ulfah
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 7, No 2 (2021): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v7i2.2263

Abstract

The increase in the number of internet users in Indonesia as much as 175.4 million as recorded in the Datareportal.com report and 4.83 billion globally, impact the increase in the number of cyber fraud cases. Data states that 96% of fraud cases are not resolved due to fraud methods carried out online and make it difficult for legal officers to obtain evidence. Previous fraud investigation research mainly focused on fraud detection, so this research focuses on submitting a framework for investigating cyber fraud cases. The cyber fraud case requires a new framework for investigation because in this fraud case, there is digital evidence that is very prone to be damaged, lost, or modified, which makes this case unsolved. This research aims to develop a framework that is expected to help auditors to uncover cases of cyber fraud so that resolved cyber fraud cases can increase. The method used in making this framework uses Jabareen's conceptual framework development method, which consists of 6 stages, namely, Mapping the selected data source, extensive reading and categorizing of the chosen data, Identifying and naming objects, Deconstructing and categorizing the concept, Integrating concept, Synthesis, resynthesis. And make it all sense. The framework for cyber fraud investigation uses 22 digital forensic frameworks and eight frameworks for fraud audit investigations. The results of developing a framework using the Jabareen method resulted in 8 stages, integrating various concepts selected from digital forensics and fraud audits. Evaluation of framework development was carried out by giving limited questionnaires to practitioners and academics, which produced 89% for the feasibility value and needs of the framework and 67% there is no need for changes to the framework being developed.
Implementation of Logging Feature in Android Payment SDK using Scrum Method Ardian Dwi Rifai; Erika Ramadhani
IJISTECH (International Journal of Information System and Technology) Vol 5, No 4 (2021): December
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v5i4.150

Abstract

Electronic money or e-money is a technological innovation that allows payment transaction processing to be easier and more practical. PT Aino Indonesia is a payment gateway company that serves payment processes using this technology for various business segments. To satisfy the requirements of each business segment, Aino needs to develop a wide range of applications. These applications require a standard for the payment system to make it faster to integrate and maintain. The payment team at Aino has developed a module or SDK that provides a standard payment system for Android-based applications. Two new features will be added to this SDK, the logging feature and log file upload. The logging feature will record the data generated by each transaction process into a log file. Next, the SDK will upload the log files to the server to help retrieve transaction data uploaded from the device. Both features will help the process of tracking issues and problems that may arise during the transaction process. The development of the two features in this SDK uses the Scrum method to ensure it stays on track.
The Design of The TU Service Project Monitoring System in PT. GMF Aeroasia Tbk Erika Ramadhani; Handika Irawan
IJISTECH (International Journal of Information System and Technology) Vol 2, No 2 (2019): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v2i2.19

Abstract

To unit is one of the units in the GMF in the Information & Communication Technology division, one unit is the TOB has a Self Development Application (SDA) task. At present many requests for procurement of goods are submitted to the TU service. This is certainly very influential on TU services that become less optimal and irregular. So a system design was made to monitor the TU Service project. The research method is carried out by analyzing business requirements and business cases. After analyzing the two documents, then make a blueprint containing the system description starting from the explanation of each module or feature and appearance of the system. Then make the interactive prototype as a system simulation. After going through a number of these steps, a monitoring system for the Dinas TU project was developed which could be utilized by the TU Service in project management.
MEMBANGUN LINGKUNGAN INTERNET SEHAT DI RUMAH TINGGAL DENGAN MENGGUNAKAN APLIKASI WEB FILTERING Erika Ramadhani; Afif Wika Sadewa
Teknoin Vol. 23 No. 2 (2017)
Publisher : Faculty of Industrial Technology Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20885/teknoin.vol23.iss2.art4

Abstract

Healthy internet is a human activity that access to the public network that the Internet is done in an orderly manner, good, and ethical in accordance with norms and rules that apply in the community. Healthy internet usage is also by not doing unlawful internet activity, one of them is accessing illegal content (adult website). Currently, the use of Internet technology in the home environment has been very developed, with the ease that given the use of the Internet will be increasing. The problem is how to create a healthy internet environment by not accessing adult website links so that it can be protected from the access of children under age in the neighborhood. To maintain the activities of Internet use at home, then made an application that serves to monitoring the access to the Internet, especially to block the activities of accessing illegal content. This application is made by implementing Squid by way of doing filtering to access web. The results of this study is an application that can be used to monitor the Internet access at home. So it can create a healthy internet environment at home.
Design Thinking Method to Develop a Digital Evidence Handling Management Application Erika Ramadhani; Amrullah Sidiq
Khazanah Informatika Vol. 8 No. 1 April 2022
Publisher : Department of Informatics, Universitas Muhammadiyah Surakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v8i1.12760

Abstract

Handling digital evidence in forensics is a very crucial task. Incorrect handling can cause the evidence to become invalid as proof of a crime in court. The procedure of handling digital evidence, starting from its collection, usage, and storage, affects its acceptability in the judicial process. Therefore, a digital evidence management system becomes imperative for police researchers and investigators. This study aims at designing such a system using the design thinking method, which goes through five stages: empathy, definition, idea, prototype, and test. The result of the study is a web-based system prototype. The prototype user testing attains a system usability scale (SUS) value of 60. The SUS value means that the prototype is in the category of marginal low and indicates that the prototype does not meet the feasibility and needs improvement.
IMPLEMENTASI DYNAMIC APPLICATION SECURITY TESTING PADA APLIKASI BERBASIS ANDROID Fauzan Awanda Alviansyah; Erika Ramadhani
AUTOMATA Vol. 2 No. 1 (2021)
Publisher : AUTOMATA

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Perkembangan teknologi yang sangat pesat membuat proses komunikasi ikut berubah dengan signifikan. Peningkatan yang pesat ini diikuti dengan banyaknya pengguna perangkat mobile atau smartphone. Melalui Statcounter Global Stats salah satu website yang melakukan perhitungan berbagai jenis sistem operasi mobile yang digunakan di dunia, pada rentan waktu 2018 – 2020 tercatat sebanyak 74.95% pengguna smartphone menggunakan Android sebagai sistem operasi yang digunakan. Banyaknya pengguna pengguna Android menyebabkan aplikasi Android menjadi target utama oleh Hacker dan Cracker dalam melakukan hacking. Hal tersebut terjadi karena pesatnya pertumbuhan aplikasi Android saat ini. Dari sekian banyaknya aplikasi Android yang beredar tidak semuanya sudah menerapkan pengujian keamanan dengan baik atau sesuai ISO/IEC 27001. Tingginya ancaman terhadap aplikasi Android seiring dengan bertambahnya jumlah pengguna sistem operasi Android membuat banyak pengembang membuat alat pengujian keamanan baik statis maupun dinamis. Diperlukan metode pengujian menggunakan metode DAST. Metode DAST dapat diterapkan menggunakan aplikasi MobSF. Tujuan akhir dari implementasi DAST pada aplikasi Android adalah memberikan hasil jenis kerentanan keamanan pada aplikasi Android.Perkembangan teknologi yang sangat pesat membuat proses komunikasi ikut berubah dengan signifikan. Peningkatan yang pesat ini diikuti dengan banyaknya pengguna perangkat mobile atau smartphone. Melalui Statcounter Global Stats salah satu website yang melakukan perhitungan berbagai jenis sistem operasi mobile yang digunakan di dunia, pada rentan waktu 2018 – 2020 tercatat sebanyak 74.95% pengguna smartphone menggunakan Android sebagai sistem operasi yang digunakan. Banyaknya pengguna pengguna Android menyebabkan aplikasi Android menjadi target utama oleh Hacker dan Cracker dalam melakukan hacking. Hal tersebut terjadi karena pesatnya pertumbuhan aplikasi Android saat ini. Dari sekian banyaknya aplikasi Android yang beredar tidak semuanya sudah menerapkan pengujian keamanan dengan baik atau sesuai ISO/IEC 27001. Tingginya ancaman terhadap aplikasi Android seiring dengan bertambahnya jumlah pengguna sistem operasi Android membuat banyak pengembang membuat alat pengujian keamanan baik statis maupun dinamis. Diperlukan metode pengujian menggunakan metode DAST. Metode DAST dapat diterapkan menggunakan aplikasi MobSF. Tujuan akhir dari implementasi DAST pada aplikasi Android adalah memberikan hasil jenis kerentanan keamanan pada aplikasi Android.
Factor Analysis Keberlanjutan Pengguna Jala Menggunakan Klasifikasi K-Means dan Algoritma Random Forest Andri Ruslam; Erika Ramadhani
AUTOMATA Vol. 2 No. 2 (2021)
Publisher : AUTOMATA

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Sebagai perusahaan yang berorientasi pengguna, Jala sangat peduli terhadap kenyaman pengguna dalam menggunakan produk-produk Jala, salah satunya produk software. Dari hasil pengelolaan data internal, pertumbuhan pengguna dari hari ke hari terus meningkat, akan tetapi tingkat churn juga tinggi. Oleh karena itu, penelitian mengenai Factor Analysis keberlanjutan pengguna diinisiasi untuk mencari tahu faktor yang mempengaruhi keberlanjutan pengguna sejak satu bulan pertama. Teknik-teknik yang digunakan adalah preprocessing menggunakan pandas, klasifikasi dengan algoritma k-means, dan modelling menggunakan random forest. Hasilnya, intensitas penggunaan fitur pakan dan sampling pada saat satu bulan pertama pengguna menggunakan Jala berpengaruh besar pada keberlanjutan penggunaan Jala pada bulan-bulan berikutnya
The Design of The TU Service Project Monitoring System in PT. GMF Aeroasia Tbk Erika Ramadhani; Handika Irawan
IJISTECH (International Journal of Information System and Technology) Vol 2, No 2 (2019): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (672.896 KB) | DOI: 10.30645/ijistech.v2i2.19

Abstract

To unit is one of the units in the GMF in the Information & Communication Technology division, one unit is the TOB has a Self Development Application (SDA) task. At present many requests for procurement of goods are submitted to the TU service. This is certainly very influential on TU services that become less optimal and irregular. So a system design was made to monitor the TU Service project. The research method is carried out by analyzing business requirements and business cases. After analyzing the two documents, then make a blueprint containing the system description starting from the explanation of each module or feature and appearance of the system. Then make the interactive prototype as a system simulation. After going through a number of these steps, a monitoring system for the Dinas TU project was developed which could be utilized by the TU Service in project management.
Implementasi Bcrypt dengan SHA-256 pada Password Pengguna Aplikasi Golek Kost Rynaldy Shulton Giffary; Erika Ramadhani
Jurnal Sistem Komputer dan Informatika (JSON) Vol 3, No 4 (2022): Juni 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v3i4.4285

Abstract

Brute force is the breaking of passwords in the SHA¬-256 algorithm, so that systems using this algorithm are easy to retrieve important data. In addition there is MD5 which can cause collusion. However, there is an algorithm that can withstand brute force attacks, namely bcrypt. Personal data security is a top priority on every system. Brute force is a cyber crime that needs to be watched out for. The purpose of this study is to examine the bcrypt algorithm used as a password in order to be able to survive brute force attacks. Because bcrypt has a cost and a salt value