Claim Missing Document
Check
Articles

Found 25 Documents
Search

PERBANDINGAN TOOLS FORENSIK PADA APLIKASI DOMPET DIGITAL Rusydi Umar; Anton Yudhana; Muhammad Noor Fadillah
JURNAL INFORMATIKA DAN KOMPUTER Vol 6, No 2 (2022): ReBorn -- September 2022
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat - Universitas Teknologi Digital Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (860.169 KB) | DOI: 10.26798/jiko.v6i2.621

Abstract

Penggunaan smartphone di Indonesia tidak hanya digunakan sebagai alat untuk komunikasi, akan tetapi dengan hadirnya aplikasi dompet digital maka mulai digunakan pula sebagai alat untuk bertransaksi. Proses forensik pada penelitian ini dilakukan pada empat aplikasi dompet digital yang ada di Indonesia dengan mengikuti metode forensik Digital Forensik Research Workshop (DFRWS) yang memiliki beberapa tahapan yaitu identification, preservation, collection, examination, analysis, dan presentation. Proses forensik dilakukan dengan tujuan untuk mencari informasi/dokumen elektronik yang berpotensi menjadi bukti digital yang bisa didapatkan dari aplikasi dompet digital. Tools forensik yang digunakan pada penelitian ini yaitu Autopsy dan Belkasoft Evidence Center. Berdasarkan hasil penelitian, tools forensik autopsy mendapatkan hasil lebih baik untuk mendapatkan data aktivitas transaksi yang ada pada aplikasi dompet digital dengan menemukan 8 dari 17 aktivitas transaksi mendapatkan presentase 47.05%, sedangkan tools Belkasoft Evidence Center mendapatkan 7 aktivitas transaksi dengan presentase 41,17%.
PERANCANGAN KLASIFIKASI PASIEN STROKE DENGAN METODE K-NEAREST NEIGHBOR Rahmat Ardila Dwi Yulianto; Imam Riadi; Rusydi Umar
Rabit : Jurnal Teknologi dan Sistem Informasi Univrab Vol 8 No 2 (2023): Juli
Publisher : LPPM Universitas Abdurrab

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36341/rabit.v8i2.3454

Abstract

Stroke is a disease characterized by impaired brain function caused by a lack of oxygen supply and blood flow to the brain, affecting several brain functions that make sufferers experience difficulty in carrying out activities. the classification of stroke patients found is still in the form of medical records that have not been integrated so it takes longer time to detect. The K-NN algorithm is part of a machine learning algorithm that can be used to classify one of the cases, namely the classification of stroke patients. K-NN is used as a class determining algorithm to enter new data that is input according to the format. Based on the results obtained, this study leads to system design using the Unified Model Language (UML) and system user interface design.
Security Analysis of Web-based Academic Information System using OWASP Framework Rusydi Umar; Imam Riadi; Elfatiha, Muhammad Ihya Aulia
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 4, November 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i4.2015

Abstract

The Academic Information System plays a crucial role in efficiently managing student, faculty, and campus administration data. However, system security needs to be a primary concern as it is vulnerable to cyber attacks. This research aims to analyze the security of the Academic Information System at the Muhammadiyah Business Institute Bekasi. The research method used is a comprehensive security analysis based on the OWASP framework. The study includes identifying potential vulnerabilities, penetration testing, and system improvement recommendations. Testing is conducted through simulated attacks based on the OWASP-released security risk list (OWASP Top Ten Most Critical Web Application Security Risks). The analysis results indicate that the system is vulnerable to Broken Authentication due to weak passwords, Sensitive Data Exposure due to URLs pointing to direct directories, and Security Misconfiguration due to open protocols. Furthermore, in CVSS scoring, Broken Authentication scored 4.8 (Medium), Sensitive Data Exposure and Security Misconfiguration scored 5.3 (Medium), Cross-Site Scripting scored 2.0 (Low) and Using Component with Known Vulnerabilities scored 2.0 (Low), while SQL Injection, XXE, Broken Access Control, Insecure Deserialization, and Insufficient Logging and Monitoring scored 0.0 (No Vulnerability). Recommendations for future system improvements include regularly updating the system to prevent new security vulnerabilities, better server configurations, and routine system monitoring to promptly anticipate suspicious activities.
Prediksi Kelulusan Tepat Waktu Berdasarkan Riwayat Akademik Menggunakan Metode Naïve Bayes Imam Riadi; Rusydi Umar; Rio Anggara
Decode: Jurnal Pendidikan Teknologi Informasi Vol. 4 No. 1: MARET 2024
Publisher : Program Studi Pendidikan Teknologi Infromasi UMK

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51454/decode.v4i1.308

Abstract

Kelulusan tepat waktu mahasiswa memiliki dampak besar dalam dunia pendidikan. Namun, tidak semua mahasiswa, mampu mencapai prestasi tersebut. Oleh karena itu, diperlukan penelitian yang mendalam dalam menganalisis data kelulusan sebagai upaya mendukung mahasiswa agar berhasil menyelesaikan studi mereka tepat waktu. Penelitian data kelulusan bisa dilakukan menggunakan tehnik klasifikasi data mining. Klasifikasi merupakan salah satu pengolahan dalam data mining dilakukan dengan cara mengelompokkan dengan metode tertentu. Penelitian ini membangun aplikasi dengan implementasi metode naive bayes dengan mempertimbangkan parameter menghasilkan klasifikasi mahasiswa lulus tidak tepat waktu dan lulus tepat waktu. Tahapan pada penelitian seperti load data, cleaning data, selection data, transformation data, data training, data testing, dan hasil prediksi. Tahapan pengujian akurasi penelitian menggunakan metode confusion matrix mendapat akurasi 72% dengan total penerapan data sejumlah 291 dengan detail 273 data training dan 18 data testing. Hasil akurasi menunjukkan bahwa sistem prediksi kelulusan dapat digunakan FTI UAD sebagai salah satu acuan dan pertimbangan fakultas mengambil langkah-langkah kelulusan mahasiswa.
Virtual Reality for Traffic Safety Education in Elementary Schools Vera Yuli Erviana; Wijaya, Oktomi; Dwi Sulisworo; Rusydi Umar
Media Publikasi Promosi Kesehatan Indonesia (MPPKI) Vol. 8 No. 2: FEBRUARY 2025 - Media Publikasi Promosi Kesehatan Indonesia
Publisher : Fakultas Kesehatan Masyarakat, Universitas Muhammadiyah Palu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56338/mppki.v8i2.6598

Abstract

Introduction: Traffic safety education needs to be taught to children at an early age. Traffic safety training for children in a real-world environment has several challenges and difficulties. Letting children practice in the real traffic environment will expose them to potential hazards. The purpose of this study was to develop media promotion for traffic safety education using a virtual reality (VR) for elementary school students. Methods: This research design used the 4-D model (define, design, develop, and disseminate). Data were collected qualitatively by conducting FGDs and interviews, while quantitative data were collected by distributing questionnaires. Results: The traffic safety VR media tested 4 scenarios, namely: driving equipment, traffic lights, how to cross the road, and walking etiquette. The validity test results show that VR traffic safety is feasible to be used as learning media for elementary school students. Students and teachers responded positively to this media. The advantage of this media is that it is fun and interactive for children. Conclusion: Media promotion for traffic safety education using virtual reality can be applied in a wider scope in other elementary schools. Future research can develop more complex scenarios such as cycling, crossing railroad, and many more. The use of virtual reality (VR) in traffic safety training provides an immersive and interactive learning experience, which is more engaging compared to traditional methods.