Claim Missing Document
Check
Articles

Found 13 Documents
Search

Sistem Keamanan Website dari serangan Denial of Service, SQL Injection, Cross Site Scripting menggunakan Web Application Firewall Prasetyo, Stefanus Eko; Haeruddin, Haeruddin; Ariesryo, Kelvin
Antivirus : Jurnal Ilmiah Teknik Informatika Vol 18 No 1 (2024): Mei 2024
Publisher : Universitas Islam Balitar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35457/antivirus.v18i1.3339

Abstract

The Internet and web applications play an important role in our modern life today. Some of our day-to-day activities like browsing, booking flights or ships, paying bills are becoming easier and easier using a web application. Nowadays a lot of people are using web applications for the desired product or service. Users who provide names, personal data, payment data, can be a source of income for hackers targeting user sensitive information. Hackers can not only steal confidential user data, but can also insert malware into the attacked website. In another study, it was mentioned that a server is very vulnerable if it does not have a good firewall or security. The solution proposed by the author is to add a service between the user and the server as an intermediary so that the hacker cannot directly enter the server of a web application. In this study, researchers will use cloudflare-protected websites as targets for penetration testing using Kali Linux. By using cloudflare, we can set the rules and the level of security of the website so that we can easily prevent attacks by hackers.
APLIKASI MANAJEMEN INVENTARIS BERBASIS MOBILE PADA CV LAFEBY MENGGUNAKAN METODE AGILE Prasetyo, Stefanus Eko; Aripradono, Heru Wijayanto; Candra, Boby
JUSIM (Jurnal Sistem Informasi Musirawas) Vol 8 No 1 (2023): JUSIM (Jurnal Sistem Informasi Musirawas) JUNI
Publisher : LPPM UNIVERSITAS BINA INSAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32767/jusim.v8i1.2093

Abstract

The utilization of technology at this time increasingly encourages businesses or industries to build an efficient work ecosystem. Inventory management is one of the important keys in the company's ecosystem. Inventory management is a process of managing and monitoring raw or finished goods. CV Lafeby is a medium-sized business engaged in textiles. Currently CV Lafeby still uses a conventional system in managing its inventory management such as recording incoming products using paper or making paper notes. The use of conventional systems has many problems such as the absence of up to date product data and the use of paper notes is too risky to be damaged or lost. The impact of incomplete data on incoming goods and outgoing goods will affect CV Lafeby in the future. Therefore, CV Lafeby needs an inventory management system by utilizing technology, namely a mobile application and mysql database. The author uses the agile development method in developing mobile applications. Later, the backend of the mobile application will be built through hosting so that the data can be obtained up to date. Hopefully, the mobile application that the author will develop can solve the problems of the shortcomings caused by conventional systems in inventory management.
Rancangan Sistem Keamanan Jaringan dari serangan DDoS Menggunakan Metode Pengujian Penetrasi Mamuriyah, Nimatul; Prasetyo, Stefanus Eko; Sijabat, Abner Onesimus
Jurnal Teknologi Dan Sistem Informasi Bisnis Vol 6 No 1 (2024): Januari 2024
Publisher : Prodi Sistem Informasi Universitas Dharma Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jteksis.v6i1.1124

Abstract

With the growth of increasingly innovative technology, new media have been created to convey information, namely web applications. Current technology is needed to disseminate information widely and without borders. A web server being paralyzed can disrupt the client's process of accessing information. Web server paralysis can be caused by several attacks, one of which is Distributed Denial of Service (DDoS). The author uses Kali Linux as penetration testing software, using the GoldenEye tool as this tool can be used to test whether a site is vulnerable to DDoS attacks. Security design with Cloudflare involves implementing multiple layers of protection designed to mitigate security risks to applications and websites. In general, Cloudflare Web Application Firewall (WAF) is placed in front of the origin server to detect and block web-based attacks. Cloudflare's DDoS protection service is applied at a global layer, securing infrastructure from hacker attacks. Leveraging Cloudflare's infrastructure, this design provides an effective and efficient security solution against DDoS attacks, ensuring the availability and reliability of network services
Pemanfaatan Sistem Informasi Marketplace Go Market untuk UMKM di Kota Batam Bekerjasama dengan PT Pundi Mas Berjaya Prasetyo, Stefanus Eko; Basri, Germen
Jurnal Tiyasadarma Vol. 2 No. 1 (2024): Juli 2024 | Jurnal Tiyasadarma
Publisher : LPPM ITEBA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62375/jta.v2i1.344

Abstract

The utilization of marketplace platforms is becoming increasingly popular and effective in the era of digitalization, helping SMEs to enhance their marketing focus and product sales. Marketplaces provide opportunities for business actors to expand their market reach and increase sales. The design and development of the marketplace information system named Go Market aims to assist PT Pundi Mas Berjaya in providing software solutions for the SME market. The development method for the Go Market application involves stages of Planning, Analysis, Design, Implementation, and Testing. The implementation schedule runs from January to May. The creation of the Marketplace, system implementation, and system testing are conducted in collaboration with PT Pundi Mas Berjaya. The results include the development of the Go Market application using the Laravel framework, which can be used to expand the SME market. The implementation of the marketplace system involves user-side and admin features, along with system testing to ensure optimal performance. The application's backend operates well, providing an efficient solution for data processing, with hopes for continuous development in the future. The output takes the form of an application that will be utilized by PT Pundi Mas Berjaya in enhancing users' understanding and skills in leveraging technology for SMEs. This project successfully developed the Go Market application with a well-functioning backend. All functionalities can assist users in processing sales data more efficiently.
Simulasi Rancangan Smart Home System Menggunakan Cisco Packet Tracer Prasetyo, Stefanus Eko; Dendi, Dendi
Jurnal Digital: Telnologi Informasi Vol 6, No 2 (2023): Jurnal Digital Teknologi informasi
Publisher : Universitas Muhammadiyah Palembang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32502/digital.v6i2.5396

Abstract

Perkembangan teknologi pada masa sekarang sangat cepat sehingga mendorong manusia untuk menggunakan teknologi yang ada saat ini, salah satunya yaitu teknologi smart home yang dapat menghubungkan manusia dengan perangkat serta perangkat dengan perangkat. Penerapan smart home juga terhubung dengan teknologi internet of things (IoT) dimana penggunaan dapat mengakses seluruh perangkat yang terhubung melalui jaringan internet untuk mempermudah manusia dalam mengontrol dan memantau peralatan elektronik yang terhubung ke jaringan smart home. Penerapan smart home dan IoT juga membantu dalam rangka penerapan hemat energi serta menjaga keamanan sekitar rumah. Penulis berhasil melakukan simulasi yang dilakukan di aplikasi Cisco packet tracer menggunakan metode Network Development Life Cycle (NDLC), dimana hasil dari simulasi rancangan bisa di kontrol penuh dari jaringan internal maupun ekternal sehingga membantu pengguna mengakses jaringan smart home secara berkala tanpa terkendala waktu dan lokasi dengan syarat smartphone atau komputer terhubung dengan jaringan internet.
Optimalisasi Keamanan Jaringan Di Era Digital menggunakan metode Zero Trust Haeruddin, Haeruddin; Prasetyo, Stefanus Eko; Kaharuddin, Ari Wahyuni
Journal of Information System and Technology (JOINT) Vol. 5 No. 3 (2024): Journal of Information System and Technology (JOINT)
Publisher : Program Sarjana Sistem Informasi, Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/joint.v5i3.9986

Abstract

In the digital era, computer networks serve as a crucial foundation for various aspects of life, including business and education. Network security, encompassing data confidentiality, integrity, and availability, is a critical factor in protecting against cyber threats. Universitas Internasional Batam (UIB) faces challenges such as intrusion and hacking, necessitating additional security measures. To address these challenges, the implementation of Zero Trust Network Access (ZTNA) supported by Virtual Private Network (VPN) and Multi-Factor Authentication (MFA) has become a highly relevant strategy. ZTNA ensures that every request for network access is evaluated individually, without assuming trust in any entity, thereby enhancing the necessary security layers. This study employs the Network Development Life Cycle (NDLC) method to design and develop a ZTNA network at UIB using the ZeroTier platform. The process includes network and security requirements analysis, ZTNA architecture design, implementation across various devices, and MFA integration with Google Authenticator. Monitoring and Quality of Service (QoS) testing using iPerf were also conducted to ensure the system's effectiveness. The research findings demonstrate that ZeroTier effectively facilitates direct communication with high-quality service, while the enhanced security provided by MFA makes it a reliable and secure solution for the exchange of sensitive data in the dynamic and complex environment of the university.
Phishing Website Detection Using the Decision Tree Algorithm Method Prasetyo, Stefanus Eko; Haeruddin , Haeruddin; ., Arron
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 8 No 2 (2024)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v8i2.2167

Abstract

Along with the increasing number of internet users and the rapid development of technology, cyber security threats are becoming more complex, including phishing threats that often cause major losses such as loss of individual or corporate privacy. This study aims to identify phishing websites effectively through the application of machine learning algorithms. The dataset used in this study comes from the UCI learning repository developed by the University of Huddersfield. The research methodology includes the stages of problem identification, Cart algorithm collection, validation, and model evaluation. With this method, the study found that the CART algorithm was able to achieve an accuracy level of 90.5% in detecting phishing sites. These results show cyber security, especially in protecting users from phishing threats, this study is expected to contribute to improving data protection and privacy of internet users, as well as encouraging the application of machine learning technology in a more adaptive cyber security system.
Evaluasi Keamanan Sistem Autentikasi Biometrik pada Smartphone dan Rekomendasi Implementasi Optimal Yeovandi, Felix; Sabariman, Sabariman; Prasetyo, Stefanus Eko
JTIM : Jurnal Teknologi Informasi dan Multimedia Vol. 7 No. 1 (2025): February
Publisher : Puslitbang Sekawan Institute Nusa Tenggara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35746/jtim.v7i1.653

Abstract

Biometric authentication on smartphones is a modern solution for more practical and secure login security. This technology offers advantages such as speed of access and resistance to forgery compared to password-based methods. However, there are various weaknesses, such as the potential for exploitation through malware, spoofing, or brute force attacks that exploit security holes, such as Cancel-After-Match-Fail (CAMF) and Match-After-Lock (MAL). Additionally, hacked biometric data cannot be replaced, leaving users vulnerable to long-term security threats. To overcome these weaknesses, this article recommends a security approach based on Trusted Execution Environment (TEE), AES-256 encryption, spoofing detection based on liveness recognition, anti-tamper mechanisms, and the application of rate limiting. The secure authentication flow implementation is designed to protect biometric data locally without transmission to external servers, ensuring user integrity and privacy is maintained. This flow includes suspicious activity detection, login encryption, and data protection with advanced encryption. Through a combination of these technologies, the biometric authentication system is characterized as being able to significantly maximize security by minimizing the risk of attacks on user data. This research provides evaluation results that the DNN deep neural network model trained with AES-256 is characterized as being able to produce accuracy above 99.9% with less than 5,000 power traces. Then, the implementation of liveness detection is characterized as being able to produce an F1-Score of 97.78% and an HTER of 8.47% in the intra-dataset scenario, as well as an F1-Score of 74.77% and an HTER of 29.05% in the cross-dataset scenario. This combination of technologies provides secure and efficient biometric authentication without compromising user comfort.
IMPLEMENTASI ZERO TRUST NETWORK UNTUK MENINGKATKAN KEAMANAN JARINGAN MENGGUNAKAN FERRUMGATE DENGAN METODE NDLC Haeruddin, Haeruddin; Favian, Felix; Prasetyo, Stefanus Eko
Infotech: Journal of Technology Information Vol 10, No 2 (2024): NOVEMBER
Publisher : ISTEK WIDURI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37365/jti.v10i2.324

Abstract

As Cyber threats grow increasingly sophisticated, traditional network security measures are no longer adequate to safeguard critical data and resources. This study focuses on enhancing network security through the deployment of a Zero Trust Network utilizing the Ferrumgate platform. Employing the Network Development Life Cycle (NDLC) methodology, the research encompasses requirements analysis, the design of a segmented network, the implementation of Multi-Factor Authentication (MFA) using Google Authenticator, and User activity Monitoring. Findings reveal that Ferrumgate effectively restricts network access to verified Users and devices, significantly reducing risks posed by both internal and external threats. The adoption of MFA enhances security standards, while continuous Monitoring successfully detects and mitigates potential Cyberattacks. In summary, the NDLC-driven implementation of Ferrumgate demonstrated its effectiveness in bolstering network security, with a recommendation for regular evaluations and monitoring to ensure the system remains robust against emerging threats. ABSTRAKDalam menghadapi ancaman Cyber yang semakin kompleks, pendekatan keamanan jaringan tradisional tidak lagi cukup untuk melindungi data dan aset penting. Penelitian ini bertujuan untuk memperkuat keamanan jaringan melalui implementasi Zero Trust Network dengan menggunakan platform Ferrumgate. Pendekatan penelitian dilakukan menggunakan metodologi Network Development Life Cycle (NDLC), yang meliputi analisis kebutuhan, perancangan jaringan yang tersegmentasi, penerapan autentikasi Multi-Factor Authentication – MFA dengan Google Authenticator, serta pemantauan aktivitas pengguna. Hasil penelitian mengindikasikan bahwa Ferrumgate mampu memastikan hanya perangkat dan pengguna yang terverifikasi yang dapat mengakses jaringan, sehingga risiko ancaman internal dan eksternal dapat diminimalkan. Integrasi MFA memberikan peningkatan signifikan pada keamanan, sementara sistem pemantauan berkelanjutan efektif dalam mendeteksi serta mencegah potensi serangan Cyber. Kesimpulannya, penerapan Ferrumgate berbasis NDLC terbukti efektif dalam meningkatakan keamanan jaringan, dengan rekomendasi untuk melakukan evaluasi dan pemantauan berkala guna menjaga efektivitas sistem terhadap ancaman yang terus berkembang.
OPTIMALISASI SEARCH ENGINE OPTIMIZATION (SEO) UNTUK MENINGKATAKAN PEMASARAN DIGITAL PADA WEBSITE PT. PETRO JAYA SAMUDRA Prasetyo, Stefanus Eko; Wijaya, Gautama; Haeruddin, Haeruddin; Sopiyan, Sopiyan
Journal of Information System Management (JOISM) Vol. 6 No. 2 (2025): Januari
Publisher : Universitas Amikom Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24076/joism.2025v6i2.1962

Abstract

Teknologi informasi membantu perusahaan untuk meningkatkan produktivitas, efisiensi, serta daya saing dalam bisnis. Pemasaran digital adalah salah satu aktivitas penting dalam menjalankan sebuah industri bisnis, karena itu dengan strategi pemasaran yang efektif maka perusahaan tersebut tentu berkembang. Sebuah perusahaan sudah bisa dipastikan mempunyai jejaring sosial dalam mendukung Promosi untuk meningkatkan bisnis serta tidak jarang jua sebuah perusahaan tersebut yang mengutamakan media promosinya menggunakan media digital, salah satu cara yang sangat efektif yaitu dengan memanfaatkan teknik optimisasi mesin pencari, dikarenakan pengguna pada umum mencari informasi melalui internet di mesin pencarian. tujuan dari penelitian ini ialah untuk meneliti visibilitas serta meningkatkan pengunjung pada kualitas volume dan trafik kunjungan penggunaan media pemasaran digital serta efektivitas dampak pelaksanaan optimalisasi pemasaran pada media digital menggunakan search engine optimization (SEO) pada website PT.Petro Jaya Samudra. Metode penelitian yang digunakan adalah metode kualitatif deskriptif. Sumber data yang digunakan pada penyusunan penelitian yaitu data primer. analisis data yang digunakan pada penelitian ini yaitu analisis secara langsung mengenai fenomena yang terjadi. Hasil dari penelitian ini adalah bahwa hasil analisis ini didapatkan setelah penggunaan SEO selama kurang lebih selama 3 bulan pada website mengalami kenaikan yang sangat signifikan, ini menandakan hasil yang diperoleh sangatlah baik dan menunjukkan indikator yang positif dari tingkat optimalisasi SEO suatu halaman atau postingan pada website. Dengan meningkatnya jumlah kunjungan pada media pemasaran digital, diharapkan hal ini akan berdampak pada peningkatan jumlah penjualan dan pangsa pasar, sesuai dengan tujuan yang diharapkan.