Claim Missing Document
Check
Articles

Found 13 Documents
Search

Implementasi Multi-Factor Authentication Untuk Optimalisasi Keamanan Akses Data Di PT.ABC Haeruddin, Haeruddin; Prasetyo, Stefanus Eko; Mindy, Avista
Jurnal Manajemen Informatika JAMIKA Vol 15 No 1 (2025): Jurnal Manajemen Informatika (JAMIKA)
Publisher : Program Studi Manajemen Informatika, Fakultas Teknik dan Ilmu Komputer, Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/5rdjmw37

Abstract

This study explores the implementation of Multi-Factor Authentication (MFA) as a strategic measure to enhance data security at PT. ABC, where the company's online system previously relied solely on traditional authentication methods such as usernames and passwords. In the context of the rapid increase in internet users following the Covid-19 pandemic, data security has become a critical issue. Through observation, interviews, and the Network Development Life Cycle (NDLC) approach, this study identifies existing security vulnerabilities and proposes an MFA-based solution using the Auth0 service. The implementation was tested through system penetration using the Burp Suite tool to ensure resilience against cyber attacks. The results demonstrate that the implementation of MFA significantly improves protection against unauthorized access and increases security awareness among employees. This study highlights the importance of adopting advanced authentication technology as an integral part of a company's data security strategy to address increasingly complex cyber challenges.
IMPLEMENTASI CHATBOT AI DAN WHATSAPP UNTUK MENDUKUNG PENJUALAN DAN KONSULTASI RAKITAN KOMPUTER DI TOKO MICRO BATAM Prasetyo, Stefanus Eko; Puteri, Vier Adinda; Sabariman, Sabariman
Journal of Information System Management (JOISM) Vol. 7 No. 1 (2025): Juni
Publisher : Universitas Amikom Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24076/joism.2025v7i1.2098

Abstract

Perkembangan teknologi membuat kemajuan pada Artificial Intelligence (AI) semakin banyak dimanfaatkan untuk mempermudah mencari informasi, termasuk dalam bidang edukasi teknologi komputer, salah satunya pada toko Micro Batam. Seiring meningkatnya permintaan, toko menghadapi berbagai kendala dalam layanan konsultasi teknis, seperti masih dilakukannya tanya jawab secara manual, keterbatasan waktu dan tenaga kerja yang menyebabkan antrean panjang, serta sulitnya menjawab pertanyaan teknis secara cepat. Selain itu, layanan belum tersedia di luar jam operasional. Sehingga dibutuhkanlah sebuat Chatbot AI yang dapat menjawab pertanyaan seputar perakitan komputer secara langsung melalui platform WhatsApp. Chatbot ini dirancang dengan memanfaatkan Google Sheet untuk menyimpan dan pembacaan data oleh AI Agent serta untuk memahami dan merespons pertanyaan pengguna menggunakan teknologi Natural Language Processing (NLP). Sistem dikembangkan menggunakan model Waterfall dan diuji dengan metode Black Box Testing. Hasil menunjukkan chatbot mampu mempercepat layanan, mengurangi beban staf, dan dapat diakses 24 jam. Data interaksi juga membantu dalam penyesuaian produk dan strategi pemasaran. Hasil pengujian menunjukkan bahwa chatbot ini mampu menjawab pertanyaan dengan cukup akurat dan membantu pengguna, khususnya pemula, dalam memahami spek-spek komputer. Secara keseluruhan, solusi ini terbukti efektif dalam menyediakan layanan informasi yang praktis dan mudah diakses di bidang edukasi teknologi.
The Application of Smart Contracts in Cybersecurity for Threat Detection and Response Prasetyo, Stefanus Eko; Wijaya, Gautama; ., Kennedi
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 9 No 1 (2025)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v9i1.2285

Abstract

Cybersecurity is becoming an increasingly important issue in the digital era due to the rise in threats and attacks on information systems. One innovative technology with great potential to enhance cybersecurity is smart contracts. This article discusses the application of smart contracts in detecting and responding to cybersecurity threats. With their automatic, transparent, and immutable nature, smart contracts can be used to manage threat responses in real-time, improve attack detection efficiency, and minimize the risk of human error. This study also explores use cases such as secure data access management, blockchain-based anomaly detection, and incident response automation. Furthermore, implementation challenges such as scalability, interoperability, and smart contract code vulnerabilities are also addressed to provide a comprehensive overview. Through the integration of smart contracts into cybersecurity, this article concludes that this technology holds great potential to strengthen information systems' resilience against increasingly complex and dynamic threats.