Claim Missing Document
Check
Articles

Found 8 Documents
Search

Information security analysis on physical security in university x using maturity model Khairunnisak Nur Isnaini; Siti Alvi Solikhatin
Jurnal Informatika Vol 14, No 2 (2020): May 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jifo.v14i2.a14434

Abstract

The threat of physical security can be from human factors, natural disasters, and information technology itself. Therefore, to prevent threats, we need the right tools to control current activities, evaluate potential impacts, and make appropriate plans so that business processes at X University will not be affected. This research starts by analyzing the problems that arise, followed by collecting the data needed, discussing the results, and making conclusions and recommendations that can be given. The method uses quantitative descriptive research. The research instrument uses interviews and questionnaire techniques. COBIT 5 is used as a framework for measuring the performance that is being implemented and will be achieved. Maturity models are used to measure current and future activities. The goal to be achieved is that the organization can create a physical security environment by the CIA principle (confidentiality, integrity, & availability). Positioning results are at level 3, meaning that the process is currently running in two main standard operating procedures. However, this evaluation specifically on the DSS5.5.5 subdomain (Providing Service Support-Managing physical security for IT Assets) in COBIT 5, and the results are still below the level 3 standard (Established Process), at 2.9 points. So, the right suggestion is to keep activities safe, one of which is to improve facilities and infrastructure, one of which is the use of biometric control in data center management rooms or other rooms with limited access.
PELATIHAN DESAIN MENGGUNAKAN APLIKASI CANVA Khairunnisak Nur Isnaini; Dina Fajar Sulistiyani; Zezya Ramadhany Kharisma Putri
SELAPARANG Jurnal Pengabdian Masyarakat Berkemajuan Vol 5, No 1 (2021): Desember
Publisher : Universitas Muhammadiyah Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31764/jpmb.v5i1.6434

Abstract

ABSTRAKPenyajian informasi atau berita yang menarik, kreatif, dan informatif merupakan salah satu modal untuk menciptakan informasi yang mudah di terima oleh pembaca salah satunya guru-guru di sekolah. Tujuan pengabdian masyrakat yang dilakukan adalah menumbuhkan rasa kreativitas dan terciptanya inovasi terutama dalam pembuatan media pembelajaran. Pelatihan penggunaan Canva yang diberikan kepada Bapak dan Ibu Guru Madrasah Ibtidaiyah (MI) Muhammadiyah Rabak, Purbalingga. Metode yang dilakukan adalah demonstasi dengan mempraktikkan secara langsung melalui Zoom Meeting. Materi yang diberikan antara lain pembuatan akun, penggunaan template yang tersedia hingga pengaturan penggunaan elemen yang ada untuk penunjang materi yang akan dibuat ke dalam slide. Hasil kegiatan pengabdian yaitu para peserta mempraktikkan langsung sesuai arahan modul pelatihan. Evaluasi kegiatan yang dilakukan yaitu pembagian kuisioner dengan beberapa indikator yaitu kemudahan penggunaan, kejelasan materi yang disampaikan, dan manfaat yang dirasakan oleh peserta. Pelatihan ini dapat menambah wawasan dan ilmu pengetahun bagi para guru khususnya dalam menambah referensi cara penyampaian bahan ajar yang menarik dan mudah diterima oleh siswa. Saran yang dapat diberikan yaitu adanya pelatihan berkelanjutan agar para guru dapat memaksimalkan ilmu yang telah disampaikan. Kata kunci: canva; desain; infografis; presentasi. ABSTRACTPresentation of information or news that is interesting, creative, and informative is one of the capitals to create information is easily accepted by readers, one of which is teachers in schools. The purpose of community service to foster a sense of creativity and create innovation, especially in the manufacture of learning media. Training on the use of Canva given to the teachers of Madrasah Ibtidaiyah (MI) Muhammadiyah Rabak, Purbalingga. The method used demonstration by practicing directly through Zoom Meetings. The materials provided include account creation, use of available templates to setting the use of existing elements to support the material to be made into slides. The results of the service activities are that the participants practice directly according to the directions of the training module. The evaluation of the activities carried out was the distribution of questionnaires with several indicators, namely ease of use, clarity of the material presented, and the benefits felt by participants. This training can add insight and knowledge for teachers, especially in adding references to how to deliver teaching materials that are interesting and easily accepted by students. Suggestions that can be given are continuous training so that teachers can maximize the knowledge that has been conveyed. Keywords: canva; design; infographic; presentation.
Strategi Recovery Plan Teknologi Informasi di Perguruan Tinggi Menggunakan Framework NIST SP 800-34 Didit Suhartono; Khairunnisak Nur Isnaini
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol 20 No 2 (2021)
Publisher : LPPM Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (601.808 KB) | DOI: 10.30812/matrik.v20i2.1097

Abstract

Suatu organisasi memerlukan sumber daya yang memadai dan mendukung, seperti informasi yang harus dijaga serta dilindungi dari berbagai macam bencana maupun ancaman. Ancaman yang menyerang suatu sistem pun masih banyak terjadi khususnya pada sistem yang krusial. Risiko-risiko yang dapat terjadi adalah kerusakan fisik dari server maupun gangguan jaringan sehingga membutuhkan rancangan penanganan bencana menggunakan DRP. Perencanaan pemulihan risiko atau disebut sebagai Disaster Recovery Planning (DRP) merupakan mekanisme atau sebuah perencanaan yang dilakukan sebagai pemulihan dari bencana yang terjadi. Strategi Recovery Plan dibuat berdasarkan kerangka kerja NIST (National Institute of Standard and Technology) SP 800-34 terdiri dari Risk Assesment, Business Impact Analysis (BIA), Recovery Strategy, Testing, dan Plan Documentation. Hasil yang diperoleh dari penelitian ini menunjukan dokumen Disaster Recovery Plan dapat membantu memulihkan sistem informasi apabila terjadi suatu bencana berdasarkan tingkat prioritas risiko dampak yang terjadi. Urutan tingkat prioritasnya antara lain Website Student dengan nilai 100% dan masing-masing 67% untuk E-Learning; Absensi Perkuliahan; dan Smart Dosen.
Evaluation of Basic Principles of Information Security at University Using COBIT 5 Khairunnisak Nur Isnaini; Didit Suhartono
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol 21 No 2 (2022)
Publisher : LPPM Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (241.824 KB) | DOI: 10.30812/matrik.v21i2.1311

Abstract

Information security issues commonly arise in a company and institution, including those in University. Some of the threats and attacks are unauthorized access, system user accountability, and logical and physical issues. This study reveals the obedience rate of the information security principle in Universitas Amikom Purwokerto and provides a recovery strategy. The domains being used were APO13, DSS5, and MEA3. The researcher employed a descriptive quantitative method by having documentation, interview, and administering a questionnaire to the respondents. The respondents were 83 employees who got selected by using the purposive sampling technique. The result shows that the capability level is in level 3, known as the established process. It means that the employees have applied the current procedure, even though they have not applied information security management. The proposed refinement strategy emphasizes the security policy, classification and asset management, physics and environment security, and business continuity management. The gap can be fixed by implementing the proposed refinement strategy. Future researchers may evaluate obedience based on the identified variables by keeping the standard in mind.
PELATIHAN DAN PENDAMPINGAN PENGGUNAAN APLIKASI EDMODO SEBAGAI PENUNJANG KEGIATAN BELAJAR MENGAJAR DI KALANGAN GURU SMP NEGERI 3 KALIMANAH Khairunnisak Nur Isnaini; Siti Alvi Solikhatin; Ali Nur Ikhsan; Pungkas Subarkah
Jurnal Pengabdian Pada Masyarakat MEMBANGUN NEGERI Vol 4 No 1 (2020): Jurnal Pengabdian Kepada Masyarakat Membangun Negeri
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35326/pkm.v4i1.578

Abstract

Saat ini perkembangan teknologi informasi berjalan begitu cepat. Hadirnya terknologi informasi berperan dalam berbagai aspek kehidupan salah satunya bidang pendidikan. Hal tersebut berpengaruh terhadap kesiapan sekolah dalam memaksimalkan performanya agar kegiatan belajar mengajar dapat dilaksanakan secara optimal. Salah satunya yaitu kesiapan para pengajar dalam memanfaatkan berbagai macam bentuk teknologi informasi. Tujuan pengabdian ini adalah melatih serta mendampingi guru dalam penggunaan aplikasi edmodo sehingga dapat diimplementasikan para guru dalam kegiatan belajar mengajar di sekolah. Hasil dari pengabdian ini adalah ilmu dalam penggunaan aplikasi edmodo. sehingga diharapkan kedepannya guru-guru SMP Negeri 3 Kalimanah menggunakan aplikasi tersebut dalam menunjang kegiatan belajar mengajar.
Analysis of Information Security Using ISO 27001 and Triangular Fuzzy Number Weighting Siti Alvi Sholikhatin; Khairunnisak Nur Isnaini
Jurnal Ilmiah Informatika Vol. 6 No. 1 (2021): Jurnal Ilmiah Informatika
Publisher : Department of Science and Technology Ibrahimy University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35316/jimi.v6i1.1224

Abstract

The business process of an organization can’t be done properly without appropriate information management, in which information is an important asset that needs to be protected with the utmost care and concern. Information security is a way to protect information from large scale threats, thus to ensure the sustainability of the organization's operational, to reduce business risks and to increase business opportunity and return of investment. This research is conducted to measure the accountability of ISO 27001 in assisting the organization to document the information security policy. ISO/IEC 27001:2005 is a standard of information security that is widely used, openly accepted and implemented, and suitable for providing rules related to implementation and evaluation of the information security system. The assessment from ISO controls and objectives will be converted into a triangular fuzzy number to help in the analysis purpose. The fuzzy number is used to simplify the measurement. The result shows that the organization is not yet complying with the standard procedures of the Information Security Management System so it is needed to document the security policy based on the ISO 27001 framework standard.
IMPLEMENTATION OF STEGANOGRAPHY ON DIGITAL IMAGE WITH MODIFIED VIGENERE CIPHER ALGORITHM AND LEAST SIGNIFICANT BIT (LSB) METHOD Gilang Miftakhul Fahmi; Khairunnisak Nur Isnaini; Didit Suhartono
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 2 (2023): JUTIF Volume 4, Number 2, April 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.2.340

Abstract

Digital image can be utilized as a media to hide messages. There should be a special treatment in securing the messages so that the information accessibility can be controlled. Hiding messages to an image can be conducted using steganography. It can be combined with cryptography algorithms in order to make it harder to be accessed by unauthorized parties. The modification of cryptography algorithms can improve the confidentiality of the message content. This research is aimed to know the implementation of steganography in desktop applications using Least Significant Bit (LSB) that is combined with the modification of Vigenere Cipher algorithms. The developed software namely waterfall supports the creation of applications. The result of the research shows that the encrypted picture will change into gray or display in grayscale so that the hidden message will be more difficult to be accessed by the attacker. The encrypted picture will also have a bigger size file than the original version and the extended file. The LSB method will work precisely according to the formula of the modified cryptography algorithm. The further research is suggested to focus on the variation of media for content message and the picture format in their encryption.
Perancangan Antarmuka Pengguna dan Pengalaman Pengguna dari Aplikasi Marketplace Bahan Makanan Dapur: Metode User-Centered Design Zain Arif Wildan Sugandi; Khairunnisak Nur Isnaini
JUSTIN (Jurnal Sistem dan Teknologi Informasi) Vol 11, No 3 (2023)
Publisher : Jurusan Informatika Universitas Tanjungpura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26418/justin.v11i3.67793

Abstract

Penelitian ini bertujuan untuk merancang antarmuka pengguna (UI) dan pengalaman pengguna (UX) yang efektif untuk aplikasi marketplace bahan makanan dapur. Metode yang digunakan adalah User Centered Design (UCD) yang terdiri dari empat tahap, yaitu Understand Context of Use, Specify User Requirements, Design Solutions, dan Evaluate Against Requirements.,Pada tahap Understand Context of Use, dilakukan identifikasi pengguna target, survei pengguna, dan pengidentifikasian kebutuhan pengguna. Tahap Specify User Requirements melibatkan analisis data dari wawancara dan survei untuk mengidentifikasi pain points pengguna. Tahap Design Solutions melibatkan pembuatan konsep, prototype, dan desain akhir menggunakan alat desain Figma. Tahap Evaluate Against Requirements melibatkan pengujian usability menggunakan System Usability Scale (SUS) untuk mengevaluasi tingkat kepuasan pengguna terhadap aplikasi.Hasil penelitian menunjukkan bahwa aplikasi marketplace bahan makanan dapur yang dirancang memperoleh skor rata-rata sebesar 83,5 dalam pengujian usability, menandakan kategori "acceptable" dan rating "Excellent". Hal ini mengindikasikan bahwa desain antarmuka aplikasi berhasil memenuhi kebutuhan pengguna dan memiliki tingkat kegunaan yang baik.Penelitian ini menggarisbawahi pentingnya perancangan UI/UX yang baik dalam membangun kepuasan pengguna dan kepercayaan terhadap platform e-marketplace. Dengan menerapkan metode UCD, aplikasi marketplace bahan makanan dapur dapat disesuaikan dengan kebutuhan dan preferensi pengguna, meningkatkan pengalaman pengguna, serta mencapai tingkat kegunaan yang tinggi.Kata kunci: UI/UX, aplikasi marketplace, User Centered Design, pengalaman pengguna, kepuasan pengguna, usability.