Claim Missing Document
Check
Articles

Found 9 Documents
Search

Information security analysis on physical security in university x using maturity model Khairunnisak Nur Isnaini; Siti Alvi Solikhatin
Jurnal Informatika Vol 14, No 2 (2020): May 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jifo.v14i2.a14434

Abstract

The threat of physical security can be from human factors, natural disasters, and information technology itself. Therefore, to prevent threats, we need the right tools to control current activities, evaluate potential impacts, and make appropriate plans so that business processes at X University will not be affected. This research starts by analyzing the problems that arise, followed by collecting the data needed, discussing the results, and making conclusions and recommendations that can be given. The method uses quantitative descriptive research. The research instrument uses interviews and questionnaire techniques. COBIT 5 is used as a framework for measuring the performance that is being implemented and will be achieved. Maturity models are used to measure current and future activities. The goal to be achieved is that the organization can create a physical security environment by the CIA principle (confidentiality, integrity, & availability). Positioning results are at level 3, meaning that the process is currently running in two main standard operating procedures. However, this evaluation specifically on the DSS5.5.5 subdomain (Providing Service Support-Managing physical security for IT Assets) in COBIT 5, and the results are still below the level 3 standard (Established Process), at 2.9 points. So, the right suggestion is to keep activities safe, one of which is to improve facilities and infrastructure, one of which is the use of biometric control in data center management rooms or other rooms with limited access.
PELATIHAN DESAIN MENGGUNAKAN APLIKASI CANVA Khairunnisak Nur Isnaini; Dina Fajar Sulistiyani; Zezya Ramadhany Kharisma Putri
SELAPARANG Jurnal Pengabdian Masyarakat Berkemajuan Vol 5, No 1 (2021): Desember
Publisher : Universitas Muhammadiyah Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31764/jpmb.v5i1.6434

Abstract

ABSTRAKPenyajian informasi atau berita yang menarik, kreatif, dan informatif merupakan salah satu modal untuk menciptakan informasi yang mudah di terima oleh pembaca salah satunya guru-guru di sekolah. Tujuan pengabdian masyrakat yang dilakukan adalah menumbuhkan rasa kreativitas dan terciptanya inovasi terutama dalam pembuatan media pembelajaran. Pelatihan penggunaan Canva yang diberikan kepada Bapak dan Ibu Guru Madrasah Ibtidaiyah (MI) Muhammadiyah Rabak, Purbalingga. Metode yang dilakukan adalah demonstasi dengan mempraktikkan secara langsung melalui Zoom Meeting. Materi yang diberikan antara lain pembuatan akun, penggunaan template yang tersedia hingga pengaturan penggunaan elemen yang ada untuk penunjang materi yang akan dibuat ke dalam slide. Hasil kegiatan pengabdian yaitu para peserta mempraktikkan langsung sesuai arahan modul pelatihan. Evaluasi kegiatan yang dilakukan yaitu pembagian kuisioner dengan beberapa indikator yaitu kemudahan penggunaan, kejelasan materi yang disampaikan, dan manfaat yang dirasakan oleh peserta. Pelatihan ini dapat menambah wawasan dan ilmu pengetahun bagi para guru khususnya dalam menambah referensi cara penyampaian bahan ajar yang menarik dan mudah diterima oleh siswa. Saran yang dapat diberikan yaitu adanya pelatihan berkelanjutan agar para guru dapat memaksimalkan ilmu yang telah disampaikan. Kata kunci: canva; desain; infografis; presentasi. ABSTRACTPresentation of information or news that is interesting, creative, and informative is one of the capitals to create information is easily accepted by readers, one of which is teachers in schools. The purpose of community service to foster a sense of creativity and create innovation, especially in the manufacture of learning media. Training on the use of Canva given to the teachers of Madrasah Ibtidaiyah (MI) Muhammadiyah Rabak, Purbalingga. The method used demonstration by practicing directly through Zoom Meetings. The materials provided include account creation, use of available templates to setting the use of existing elements to support the material to be made into slides. The results of the service activities are that the participants practice directly according to the directions of the training module. The evaluation of the activities carried out was the distribution of questionnaires with several indicators, namely ease of use, clarity of the material presented, and the benefits felt by participants. This training can add insight and knowledge for teachers, especially in adding references to how to deliver teaching materials that are interesting and easily accepted by students. Suggestions that can be given are continuous training so that teachers can maximize the knowledge that has been conveyed. Keywords: canva; design; infographic; presentation.
PELATIHAN DAN PENDAMPINGAN PENGGUNAAN APLIKASI EDMODO SEBAGAI PENUNJANG KEGIATAN BELAJAR MENGAJAR DI KALANGAN GURU SMP NEGERI 3 KALIMANAH Khairunnisak Nur Isnaini; Siti Alvi Solikhatin; Ali Nur Ikhsan; Pungkas Subarkah
Jurnal Pengabdian Pada Masyarakat MEMBANGUN NEGERI Vol 4 No 1 (2020): Jurnal Pengabdian Kepada Masyarakat Membangun Negeri
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35326/pkm.v4i1.578

Abstract

Saat ini perkembangan teknologi informasi berjalan begitu cepat. Hadirnya terknologi informasi berperan dalam berbagai aspek kehidupan salah satunya bidang pendidikan. Hal tersebut berpengaruh terhadap kesiapan sekolah dalam memaksimalkan performanya agar kegiatan belajar mengajar dapat dilaksanakan secara optimal. Salah satunya yaitu kesiapan para pengajar dalam memanfaatkan berbagai macam bentuk teknologi informasi. Tujuan pengabdian ini adalah melatih serta mendampingi guru dalam penggunaan aplikasi edmodo sehingga dapat diimplementasikan para guru dalam kegiatan belajar mengajar di sekolah. Hasil dari pengabdian ini adalah ilmu dalam penggunaan aplikasi edmodo. sehingga diharapkan kedepannya guru-guru SMP Negeri 3 Kalimanah menggunakan aplikasi tersebut dalam menunjang kegiatan belajar mengajar.
Analysis of Information Security Using ISO 27001 and Triangular Fuzzy Number Weighting Siti Alvi Sholikhatin; Khairunnisak Nur Isnaini
Jurnal Ilmiah Informatika Vol. 6 No. 1 (2021): Jurnal Ilmiah Informatika
Publisher : Department of Science and Technology Ibrahimy University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35316/jimi.v6i1.1224

Abstract

The business process of an organization can’t be done properly without appropriate information management, in which information is an important asset that needs to be protected with the utmost care and concern. Information security is a way to protect information from large scale threats, thus to ensure the sustainability of the organization's operational, to reduce business risks and to increase business opportunity and return of investment. This research is conducted to measure the accountability of ISO 27001 in assisting the organization to document the information security policy. ISO/IEC 27001:2005 is a standard of information security that is widely used, openly accepted and implemented, and suitable for providing rules related to implementation and evaluation of the information security system. The assessment from ISO controls and objectives will be converted into a triangular fuzzy number to help in the analysis purpose. The fuzzy number is used to simplify the measurement. The result shows that the organization is not yet complying with the standard procedures of the Information Security Management System so it is needed to document the security policy based on the ISO 27001 framework standard.
IMPLEMENTATION OF STEGANOGRAPHY ON DIGITAL IMAGE WITH MODIFIED VIGENERE CIPHER ALGORITHM AND LEAST SIGNIFICANT BIT (LSB) METHOD Gilang Miftakhul Fahmi; Khairunnisak Nur Isnaini; Didit Suhartono
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 2 (2023): JUTIF Volume 4, Number 2, April 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.2.340

Abstract

Digital image can be utilized as a media to hide messages. There should be a special treatment in securing the messages so that the information accessibility can be controlled. Hiding messages to an image can be conducted using steganography. It can be combined with cryptography algorithms in order to make it harder to be accessed by unauthorized parties. The modification of cryptography algorithms can improve the confidentiality of the message content. This research is aimed to know the implementation of steganography in desktop applications using Least Significant Bit (LSB) that is combined with the modification of Vigenere Cipher algorithms. The developed software namely waterfall supports the creation of applications. The result of the research shows that the encrypted picture will change into gray or display in grayscale so that the hidden message will be more difficult to be accessed by the attacker. The encrypted picture will also have a bigger size file than the original version and the extended file. The LSB method will work precisely according to the formula of the modified cryptography algorithm. The further research is suggested to focus on the variation of media for content message and the picture format in their encryption.
Perancangan Antarmuka Pengguna dan Pengalaman Pengguna dari Aplikasi Marketplace Bahan Makanan Dapur: Metode User-Centered Design Zain Arif Wildan Sugandi; Khairunnisak Nur Isnaini
JUSTIN (Jurnal Sistem dan Teknologi Informasi) Vol 11, No 3 (2023)
Publisher : Jurusan Informatika Universitas Tanjungpura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26418/justin.v11i3.67793

Abstract

Penelitian ini bertujuan untuk merancang antarmuka pengguna (UI) dan pengalaman pengguna (UX) yang efektif untuk aplikasi marketplace bahan makanan dapur. Metode yang digunakan adalah User Centered Design (UCD) yang terdiri dari empat tahap, yaitu Understand Context of Use, Specify User Requirements, Design Solutions, dan Evaluate Against Requirements.,Pada tahap Understand Context of Use, dilakukan identifikasi pengguna target, survei pengguna, dan pengidentifikasian kebutuhan pengguna. Tahap Specify User Requirements melibatkan analisis data dari wawancara dan survei untuk mengidentifikasi pain points pengguna. Tahap Design Solutions melibatkan pembuatan konsep, prototype, dan desain akhir menggunakan alat desain Figma. Tahap Evaluate Against Requirements melibatkan pengujian usability menggunakan System Usability Scale (SUS) untuk mengevaluasi tingkat kepuasan pengguna terhadap aplikasi.Hasil penelitian menunjukkan bahwa aplikasi marketplace bahan makanan dapur yang dirancang memperoleh skor rata-rata sebesar 83,5 dalam pengujian usability, menandakan kategori "acceptable" dan rating "Excellent". Hal ini mengindikasikan bahwa desain antarmuka aplikasi berhasil memenuhi kebutuhan pengguna dan memiliki tingkat kegunaan yang baik.Penelitian ini menggarisbawahi pentingnya perancangan UI/UX yang baik dalam membangun kepuasan pengguna dan kepercayaan terhadap platform e-marketplace. Dengan menerapkan metode UCD, aplikasi marketplace bahan makanan dapur dapat disesuaikan dengan kebutuhan dan preferensi pengguna, meningkatkan pengalaman pengguna, serta mencapai tingkat kegunaan yang tinggi.Kata kunci: UI/UX, aplikasi marketplace, User Centered Design, pengalaman pengguna, kepuasan pengguna, usability.
Strategi Recovery Plan Teknologi Informasi di Perguruan Tinggi Menggunakan Framework NIST SP 800-34 Didit Suhartono; Khairunnisak Nur Isnaini
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 20 No. 2 (2021)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v20i2.1097

Abstract

Suatu organisasi memerlukan sumber daya yang memadai dan mendukung, seperti informasi yang harus dijaga serta dilindungi dari berbagai macam bencana maupun ancaman. Ancaman yang menyerang suatu sistem pun masih banyak terjadi khususnya pada sistem yang krusial. Risiko-risiko yang dapat terjadi adalah kerusakan fisik dari server maupun gangguan jaringan sehingga membutuhkan rancangan penanganan bencana menggunakan DRP. Perencanaan pemulihan risiko atau disebut sebagai Disaster Recovery Planning (DRP) merupakan mekanisme atau sebuah perencanaan yang dilakukan sebagai pemulihan dari bencana yang terjadi. Strategi Recovery Plan dibuat berdasarkan kerangka kerja NIST (National Institute of Standard and Technology) SP 800-34 terdiri dari Risk Assesment, Business Impact Analysis (BIA), Recovery Strategy, Testing, dan Plan Documentation. Hasil yang diperoleh dari penelitian ini menunjukan dokumen Disaster Recovery Plan dapat membantu memulihkan sistem informasi apabila terjadi suatu bencana berdasarkan tingkat prioritas risiko dampak yang terjadi. Urutan tingkat prioritasnya antara lain Website Student dengan nilai 100% dan masing-masing 67% untuk E-Learning; Absensi Perkuliahan; dan Smart Dosen.
Evaluation of Basic Principles of Information Security at University Using COBIT 5 Khairunnisak Nur Isnaini; Didit Suhartono
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 21 No. 2 (2022)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v21i2.1311

Abstract

Information security issues commonly arise in a company and institution, including those in University. Some of the threats and attacks are unauthorized access, system user accountability, and logical and physical issues. This study reveals the obedience rate of the information security principle in Universitas Amikom Purwokerto and provides a recovery strategy. The domains being used were APO13, DSS5, and MEA3. The researcher employed a descriptive quantitative method by having documentation, interview, and administering a questionnaire to the respondents. The respondents were 83 employees who got selected by using the purposive sampling technique. The result shows that the capability level is in level 3, known as the established process. It means that the employees have applied the current procedure, even though they have not applied information security management. The proposed refinement strategy emphasizes the security policy, classification and asset management, physics and environment security, and business continuity management. The gap can be fixed by implementing the proposed refinement strategy. Future researchers may evaluate obedience based on the identified variables by keeping the standard in mind.
Peningkatan keilmuan cyber security sebagai langkah teknis persiapan lomba kompetensi siswa di SMKN 1 Wanayasa Khairunnisak Nur Isnaini; Muhammad Thoriq Jamil; Anisaa Qothrunnada Khoirunnita; Didit Suhartono
SELAPARANG: Jurnal Pengabdian Masyarakat Berkemajuan Vol 8, No 4 (2024): December
Publisher : Universitas Muhammadiyah Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31764/jpmb.v8i4.26966

Abstract

AbstrakSMK N 1 Wanayasa yang menjadi salah satu peserta Lomba Kompetensi Siswa (LKS) Cyber Security di tingkat Kabupaten Banjarnegara dan menjadi perwakilan tim kabupaten untuk maju ke tingkat Provinsi pada Tahun 2023 memiliki kendala perihal ahli atau praktisi yang mengajarkan informasi seputar Cyber Security. SMK N 1 Wanayasa sendiri dalam mempersiapkan talenta lomba telah membuat sebuah club dalam memahami dan mendalami materi-materi yang dilombakan pada Lomba Kompetensi Siswa namun belum bisa maksimal dalam mendampingi para calon peserta lomba. Tujuan dilaksanakannya pelatihan adalah memberikan peningkatan ilmu keamanan informasi dan cyber security Metode yang digunakan adalah seminar dan demo praktik. Pelaksanaan pelatihan cyber security  dilaksanakan di Laboratorium komputer SMK Negeri 1 Wanayasa Hari Rabu, 31 Juli 2024 mulai pukul 11.00 WIB dapat berjalan dengan baik meskipun masih belum maksimal dikarenakan pengetahuan dasar siswa-siswi yang belum merata menyebabkan durasi pelaksanaan menjadi lama dan beberapa materi tidak tersampaikan. Selain itu, koneksi internet yang kurang stabil dan juga fasilitas yang kurang memadai sehingga beberapa materi praktik yang membutuhkan sumber daya yang tinggi urung dilakukan. Namun, pelatihan ini tetap antusias dilakukan oleh peserta, menurut salah satu testimoni yang diberikan menyatakan bahwa melalui pelatihan ini peserta memiliki ilmu baru yang sebelumnya tidak diketahui cara atau penggunaanya serta meningkatkan ketertarikan tentang cyber security. Kata kunci: peningkatan keilmuan; pelatihan; lomba kompetensi siswa; cyber security; keamanan informasi AbstractSMK N 1 Wanayasa, which is one of the participants in the student competency competition at the Banjarnegara district level and represents the district team to advance to the provincial level in 2023, faces challenges regarding experts or practitioners who can teach information related to Cyber Security. SMK N 1 Wanayasa has established a club to prepare talents for the competition by understanding and delving into the materials that will be contested in the Student Competency Competition, but it has not yet been able to fully support the prospective participants. The purpose of the training is to enhance knowledge in information security and cyber security. The methods used are seminars and practical demonstrations. The implementation of cyber security training can proceed well, although it is still not optimal due to the uneven basic knowledge of the students, which causes the duration of the training to be extended and some materials to remain unaddressed. In addition, the unstable internet connection and inadequate facilities meant that several practical materials requiring high resources could not be carried out. However, this training was still enthusiastically participated in by the attendees. According to one of the testimonials provided, it was stated that through this training, participants gained new knowledge that they previously did not know how to use, as well as an increased interest in cyber security. Keywords: increase in knowledge; training; student competency competition; cyber security; information security