Claim Missing Document
Check
Articles

Found 6 Documents
Search
Journal : Infotech: Journal of Technology Information

REKONSTRUKSI DAN INVESTIGASI DIGITAL FORENSIK PADA APLIKASI WHATSAPP DENGAN METODE NIST : KASUS PELECEHAN SEKSUAL Ginting, Jusia Amanda; Setiawan, Harry; Andry, Johannes Fernandes; Ngurah Suryantara, I Gusti
Infotech: Journal of Technology Information Vol 10, No 1 (2024): JUNI
Publisher : ISTEK WIDURI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37365/jti.v10i1.249

Abstract

The rapid advancement of technology, especially during the pandemic, has drastically changed the way we conduct activities, with the majority now being carried out online through smart devices such as smartphones. However, along with this progress comes new challenges in the form of cybercrime, increasingly known as cybercrime. Cybercrime on mobile platforms, known as mobile cybercrime, encompasses various activities such as fraud, spreading hoaxes, pornography, and sexual harassment. This research aims to examine the effectiveness of cybercrime investigation methods, particularly in cases of sexual harassment, with a focus on the WhatsApp platform. The method used is the National Institute of Standards Technology (NIST), implemented using appropriate tools to support this research. The testing process involves four main stages: data collection, examination, analysis, and reporting. This includes steps such as securing the device, acquiring data, and analyzing it using software such as FTK Imager and WhatsApp Viewer. The test results show that most deleted messages can be recovered, although messages deleted using the "unsent" feature cannot be recovered due to WhatsApp policy. Of the total 11 messages in the case conversation, 55% were successfully recovered while 45% were not. These findings highlight the importance of mobile forensic methods in investigating cybercrime, while also indicating that policies and platform features such as WhatsApp can affect the success of investigations. ABSTRAKPerkembangan teknologi yang pesat, terutama selama pandemi, telah mengubah cara kita beraktivitas secara drastis, dengan mayoritas kegiatan dilakukan secara online melalui perangkat pintar seperti smartphone. Namun, dengan kemajuan ini juga muncul tantangan baru dalam bentuk kejahatan cyber, yang semakin dikenal sebagai cybercrime. Cybercrime di platform mobile, dikenal sebagai mobile cybercrime, meliputi berbagai aktivitas seperti penipuan, penyebaran hoaks, pornografi, dan pelecehan seksual. Penelitian ini bertujuan untuk menguji efektivitas metode investigasi cybercrime, terutama dalam kasus pelecehan seksual, dengan fokus pada platform WhatsApp. Metode yang digunakan adalah National Institute of Standards Technology (NIST), yang diterapkan dengan menggunakan alat yang sesuai untuk mendukung penelitian ini. Proses pengujian melibatkan empat tahap utama: pengumpulan data, pemeriksaan, analisis, dan pelaporan. Ini melibatkan langkah-langkah seperti mengamankan perangkat, mengakuisisi data, dan menganalisis menggunakan perangkat lunak seperti FTK Imager dan WhatsApp Viewer. Hasil pengujian menunjukkan bahwa sebagian besar pesan yang dihapus dapat dipulihkan, meskipun pesan yang dihapus menggunakan fitur "unsent" gagal dipulihkan karena kebijakan WhatsApp. Dari total 11 pesan dalam percakapan kasus, 55% berhasil dipulihkan sementara 45% tidak berhasil. Temuan ini menyoroti pentingnya metode forensik mobile dalam menyelidiki kejahatan cyber, sementara juga menunjukkan bahwa kebijakan dan fitur-fitur platform seperti WhatsApp dapat mempengaruhi keberhasilan investigasi.
PENGEMBANGAN APLIKASI OPERASIONAL RESTORAN DENGAN FRAMEWORK SCRUM (STUDI KASUS: RESTORAN PT.XYZ) Ngurah Suryantara, I Gusti; Michael, Michael; Andry, Johanes Fernandes; Ginting, Jusia Amanda
Infotech: Journal of Technology Information Vol 9, No 2 (2023): NOVEMBER
Publisher : ISTEK WIDURI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37365/jti.v9i2.168

Abstract

In software development, it is necessary to plan carefully, so that the software developed is in accordance with user needs. Software development without good planning will result in a patchwork of software development. To avoid the patchwork of software development, a software development framework is required. The research "Developing Restaurant Operational Applications With Scrum Framework (Case Study: PT.XYZ Restaurant)" aims to develop restaurant operational software at PT. XYZ. The software development framework used in software development uses the Scrum framework. The Scrum framework is a variant of the Agile framework. Agile has a dynamic way of working (iterative and incremental). The Scrum framework has a product backlog, then the product backlog is divided into several sprints. One sprint will be run in one iteration, so that each end of a product sprint that meets the definition of “Done” must be achieved. The use of the Scrum framework emphasizes communication and collaboration between various stakeholders. The result of this research is a software that helps restaurant operations at PT. XYZ starting from master files, transactions files, to reports files. By using the Scrum framework in application development, the application development life cycle is created. Software development can be done by implementing an enterprise architecture that already belongs to a company. Data architecture, application architecture, and technology architecture as the basis for application development in the enterprise
PENGEMBANGAN ARSITEKTUR ENTERPRISE PADA DEPARTEMEN FINANCE (STUDI KASUS: DEALER MOBIL PT.XYZ) Ngurah Suryantara, I Gusti; Ginting, Jusia Amanda; Sulaiman, Dewi Candani
Infotech: Journal of Technology Information Vol 8, No 1 (2022): JUNI
Publisher : ISTEK WIDURI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37365/jti.v8i1.124

Abstract

Along with advances in technological developments, the development of making applications in a enterpriseis also experiencing development. This is in line with the increasingly complex business developments today. For this reason, careful planning is needed to invest in IT / IS (Information Technology / Information Systems) in a enterprise. The failure of IT/IS investment in a enterprise is one of the factors due to not having an IT/IS investment roadmap in a enterprise in the form of Enterprise Architecture. To get maximum results from an IT/IS investment in a enterprise, it is necessary to develop Enterprise Architecture. Enterprise architecture is a blueprint for a enterprise in achieving the enterprise's vision and mission supported by the implementation of IT/IS. So the selection of an Enterprise Architecture development framework is very important, one of the frameworks that can be used in the development of Enterprise Architecture such as the Zachman Framework. The Zachman Framework uses a 6-row and 6-column matrix to generate a blueprint. With the existence of the Enterprise Architecture blueprint, the enterprise can then use it for a roadmap for the development of applications needed by the enterprise, so that IT/IS technology investment in the enterprise can help the enterprise's business processes to achieve the vision and mission.
PENGUJIAN KERENTANAN SISTEM DENGAN MENGGUNAKAN METODE PENETRATION TESTING DI UNIVERSITAS XYZ Ginting, Jusia Amanda; Ngurah Suryantara, I Gusti Gusti
Infotech: Journal of Technology Information Vol 7, No 1 (2021): JUNI
Publisher : ISTEK WIDURI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37365/jti.v7i1.105

Abstract

Awareness of information security will be a priority in the event of data loss or damage. This certainly harms the performance of a company or organization due to unpreparedness to resolve or minimize risks that can occur. The impact that occurs on the security system used is that the system cannot provide a sense of security because the system used and has security holes that can be used to exploit systems and networks at XYZ University. This study aims to examine the internal and external security controls of the system by identifying threats that can pose serious problems to assets at XYZ University by using the penetration testing method, the results can be used as a benchmark in measuring the weaknesses of the network and system from external attacks. The goal is to implement preventive controls against risks that can occur to improve system security at XYZ University.
REVOLUTIONIZING DIGITAL TRUST: NETWORK INTRUSION DETECTION SYSTEMS FOR IDENTITY AND SECURITY ASSURANCE IN THE METAVERSE Ginting, Jusia Amanda; Sembiring, Irwan; Putra, Yonathan Rahadi; Marvelino, Matthew
Infotech: Journal of Technology Information Vol 11, No 1 (2025): JUNI
Publisher : ISTEK WIDURI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37365/jti.v11i1.381

Abstract

Digital security has become a major challenge in the metaverse, an interactive virtual space that integrates augmented reality and virtual reality. This study develops a machine learning-based Network Intrusion Detection System (NIDS) to enhance security reliability within the metaverse. K-Means and Apriori algorithms are applied to optimize rules in the Snort IDS, enabling more accurate detection of Distributed Denial of Service (DDoS) and Malware Command and Control (CNC) attacks. The results show that rule optimization using machine learning increases detection accuracy for DDoS attacks from 60% to 75% and for CNC attacks from 35% to 40%. Furthermore, this approach successfully reduces the false positive rate. The implementation of the optimized NIDS provides a significant contribution to securing activities in the metaverse, ensuring a safer and more reliable virtual environment.
PENGEMBANGAN APLIKASI PEMBELAJARAN IMERSIF BERBASIS VIRTUAL REALITY MENGGUNAKAN METODE MDLC DAN EVALUASI EUQ Ginting, Jusia Amanda; Sembiring, Irwan; Suryantara, I Gusti Ngurah; Mulyana, Teady Matius Surya; Alamsyah, Ferry
Infotech: Journal of Technology Information Vol 11, No 2 (2025): NOVEMBER
Publisher : ISTEK WIDURI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37365/jti.v11i2.426

Abstract

The advancement of technology in the field of Virtual Reality (VR) offers new opportunities for developing more interactive and immersive learning media. One of the main challenges in online learning is the low level of student engagement in the learning process, as well as the tendency for instructional methods to remain passive. Recognizing this gap and the need for a new technological approach that can encourage active participation, this study aims to develop a VR-based learning application called “FirstMetaClass”. This application is designed to simulate a virtual classroom environment to enhance students’ learning experiences. The application development process follows the Multimedia Development Life Cycle (MDLC) method. The quality of the user experience was evaluated using the Extended User Experience Questionnaire (EUQ). The respondents consisted of 42 university students who participated in the application trial and completed the evaluation questionnaire. The results of the study show that all EUQ dimensions achieved an average score above 4.0 on a 1–5 scale. These findings confirm that the “FirstMetaClass” application successfully provides a positive, engaging, and user-friendly learning experience, while creating a classroom atmosphere that closely resembles the real world and fosters a sense of presence for users.