Claim Missing Document
Check
Articles

Found 7 Documents
Search

ANALYSIS AND APPLICATION OF CLOUD STORAGE SECURITY UTILIZATION BASED ON AS A SERVICE (IaaS) INFRASTRUCTURE SERVICE MODEL AS A DOCUMENT SHARING MEDIA DURING PANDEMI Isra Wardanu, Fyan; Wibowo, Budi; Yuswanto, Andrie
TEKNOKOM Vol. 5 No. 1 (2022): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (302.766 KB) | DOI: 10.31943/teknokom.v5i1.67

Abstract

Storage via the cloud is very necessary which is carried out in this research can be used as a basis for research at PT. Indocode technology has a problem where the problem is that the process of storing and sharing data on storage media via the cloud can be used both on internal and external networks. Implementing cloud-based storage greatly simplifies the process of sharing files with employees or the board of directors to be able to filter which data can be accessed by all employees and limited needs.. The server is designed using the Owncloud application which aims to support the process of information or data transactions with commissioners, directors and employees using owncloud, so that the data transfer process no longer uses external storage from the internet or other physical storage media. In addition, the use of owncloud for enterprises is very helpful because it is easy to use and the file sharing capabilities can be adjusted according to the user's permissions and can be accessed anywhere and anytime.
DESIGN OF MACHINE LEARNING DETECTION MASK USING YOLO AND DARKNET ON NVIDIA JETSON NANO Danu Prasetia, Deny; Yuswanto, Andrie; Wibowo, Budi
TEKNOKOM Vol. 5 No. 1 (2022): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (712.977 KB) | DOI: 10.31943/teknokom.v5i1.69

Abstract

In the Covid-19 pandemic, wearing a mask has become the obligation of Indonesian citizen,for outdoor and indoor.  Public awareness of wearing masks when leaving the house according to the government's appeal is still low.  This can be seen from the many people who do not wear masks while on the public place or in other place.  Technology that can help increase public awareness of using masks is a mask detection application.  The application to detect use of masks is made using Artificial Intelligence and uses machine learning methods from a tool that will read every use of masks on the face automatically, either using masks appropriately, using inappropriate masks or not using masks. The method used in this research is to use the Research and Development method, namely research that can produce a product. Based on the test results using masks with facial motifs, there are different results from the two samples tested depending on the quality of the image on the mask Yolo (You Only Look Once) is an object detection system in real time.  Darknet is an open source neural network framework written in the C and CUDA programming languages.  The Jetson Nano is a System On Module (SoM) and developer kit from the Nvidia Jetson family.
Analisis Pengukuran Kompleksitas Website SOC Menggunakan Function Point Sidqi, Akbar; Yuswanto, Andrie; Yaqin, Muhammad Ainul
Journal Automation Computer Information System Vol. 4 No. 2 (2024): November
Publisher : Indonesian Journal Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47134/jacis.v4i2.82

Abstract

Pengukuran kompleksitas perangkat lunak telah menjadi fokus utama dalam pengembangan perangkat lunak, merupakan cara untuk menggambarkan seberapa rumitnya suatu program, bertujuan untuk menilai dan memprediksi berbagai karakteristik, seperti tingkat kompleksitas komputasi dan keandalan model, serta kemampuan evaluasi model tersebut, dengan memanfaatkan beragam metrik dan alat analisis. pada penelitian ini bertujuan mengukur kompleksitas dengan metode pengukuran Function Point Analysis dengan pendekatan berorientasi pada fungsi yang banyak digunakan untuk mengukur fungsionalitas perangkat lunak. pada setiap dashboard website diukur menggunakan kriteria FPA yang menyatakan tingkat kompleksitas dengan level simple, average, dan complex. pada penelitian ini bertujuan mengukur nilai kuantitatif dari fungsionalitas perangkat lunak website soc untuk menghasilkan tingkat kompleksitas website. Hasil dari pengukuran terdapat 3 faktor yaitu: Crude Function Point, Relative Complexity Adjustment Factor, dan Function Point. yang menunjukkan nilai CFP 310, RCAF 70, dan FP 418,5 yang menunjukkan kompleksitas tinggi pada website soc
Cyber Resilience to Digital Threats for Education Institutions 4.0 Wibowo, Budi; Yuswanto, Andrie; Hidayat, Taufik; Ibrahim, Nadim
International Journal of Management Science and Application Vol. 4 No. 1 (2025): IJMSA
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/ijmsa.v4i1.370

Abstract

The emergence of Education 4.0, characterized by personalized learning, smart technologies, and digital interconnectivity, has revolutionized academic environments. However, this digital transformation has simultaneously increased the exposure of educational institutions to sophisticated cyber threats. This research addresses the pressing need for a robust cyber resilience framework tailored to the education sector. Employing a qualitative descriptive methodology, supported by secondary data analysis and case study reviews, the study identifies core vulnerabilities in digital infrastructure, policy shortcomings, and a general lack of cybersecurity awareness among stakeholders. In response, the paper proposes a contextualized cyber resilience framework grounded in layered security principles, zero-trust architecture, and institution-wide digital hygiene initiatives. Key findings indicate that effective cyber resilience in Education 4.0 must be multidimensional, incorporating stringent policy enforcement, continuous digital skills training, and adaptive technological strategies. The primary contribution of this study lies in offering a practical, scalable framework that aligns cybersecurity practices with the evolving demands of digital education. Future research is encouraged to explore real-time implementation metrics, cross-institutional collaborations, and the integration of AI-driven threat detection systems to further strengthen educational cyber resilience.
Cybersecurity Education Strategies Based on Open-Source Intelligence (OSINT) to Enhance Public Awareness Hidayat, Taufik; Wibowo, Budi; Yuswanto, Andrie; Fathul Jannah, Annisa
International Journal of Science Education and Cultural Studies Vol. 4 No. 2 (2025): ijsecs
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/ijsecs.v4i2.422

Abstract

In today’s rapidly evolving digital landscape, cybersecurity threats are escalating in both frequency and complexity, which points to the urgent need for effective educational approaches to enhance public awareness. Open-Source Intelligence (OSINT), which leverages publicly available information, offers a practical framework for identifying and understanding cyber risks. This study proposes the design, implementation, and evaluation of an OSINT-based cybersecurity education strategy aimed at non-technical audiences. Employing a mixed-methods approach including literature review, module development, and surveys, this research measures the strategy’s effectiveness in improving cybersecurity comprehension. The results indicate that the OSINT-based educational approach significantly enhances participants’ understanding of cyber risks, yielding an average increase of 35% in comprehension scores. Furthermore, the integration of real-world OSINT demonstrations makes cybersecurity threats more tangible and personally relevant, thereby motivating proactive preventive behavior. In conclusion, incorporating OSINT into cybersecurity education provides an effective and scalable strategy for improving public awareness and resilience against modern digital threats.
A Review Method for Analysis of the Causes of Data Breach in the Pasca Pandemic Yuswanto, Andrie; wibowo, Budi; Hafiz, Luqman
Jurnal Komputer dan Elektro Sains Vol. 3 No. 1 (2025): komets
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/komets.v3i1.205

Abstract

The vulnerability of personal data breaches makes countries aware of the importance of regulations governing the protection of personal data Therefore, the importance of this research is to conduct a systematic review of the causes of data breaches based on the mechanism of activities carried out to answer problems and provide solutions to problems related to information security. The Systematic Literature Review (SLR) method was used to identify 283 papers in IEEE Xplore database, direct and signature digital science library based on automated search and predefined strings. Then 18 papers were selected for study based on inclusion and exclusion criteria. From the literature study, it can be concluded that the trends analyzed, data breaches are caused by user behavior that has not been educated about the dangers of data theft and awareness of information security.
Enhancing Network Security and Performance using DNS Sinkhole and QoS: A Practical ISO/IEC 27001:2022 Implementation Wibowo, Budi; Hidayat, Taufik; Yuswanto, Andrie; Nurrohman, Aji
International Journal of Management Science and Application Vol. 4 No. 2 (2025): IJMSA
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/ijmsa.v4i2.421

Abstract

This study aims to design and validate a low-cost network security model based on open-source solutions by integrating Pi-hole and Quality of Service (QoS) as a technical implementation of ISO/IEC 27001:2022 controls for resource-constrained organizations. The implementation results demonstrate a significant improvement in security posture by blocking 14.1% of malicious and irrelevant DNS queries, while simultaneously enhancing network performance by reducing critical application latency by 45%. The key advantage of this model lies in its cost efficiency and its dual benefits of improved security and optimized performance within a single framework. However, the study also identifies limitations, particularly the potential for false positives that require manual whitelist management and reliance on trained personnel to ensure operational sustainability. The main contribution of this research is the provision of a simple, cost-effective, and standards-compliant technical framework, while also introducing a mathematical formulation to assess the trade-offs between security, performance, and cost. Future directions include integrating Intrusion Detection/Prevention Systems (IDS/IPS) for layered Defense and replicating the model into a turnkey security appliance that can be widely adopted by other organizations facing similar challenges.