Claim Missing Document
Check
Articles

Found 32 Documents
Search

Analisis Forensik Rekayasa Dokumen Digital dengan Metode NIST Arizona Firdonsyah; Danur Wijayanto
INFORMAL: Informatics Journal Vol 7 No 2 (2022): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v7i2.31198

Abstract

Digital Forensics is one of the technological fields contained many sub-fields that can assist technically in collecting digital evidence to be presented in a trial in accordance with applicable law. The example of digital forensics sub-field is Image Forensics, which aims to digitally collect and look for evidentiary facts in determining the authenticity of an image or document that contained images. Various criminal and pornographic cases involving image files are still happening nowadays, therefore forensics on images as evidence is an important key to assist the court in making decisions. This research examines the authenticity of documents in the form of digital letters using National Institute of Standard and Technology (NIST) method by applying the forensic ELA (Error Level Analysis). Several previous researches have proven that the forensic ELA is able to detect modifications that have been made to images. Differences with previous researches and this research are the authors also checked the metadata of the images before performing the ELA examination using Fotoforensics. The results of the analysis shows a high level of consistency in the images and writings due to the accumulation of white dots in several places such as in headers, logos, header’s writings, text contents, footnotes, and signatures.
ANALISIS KEAMANAN JARINGAN SISTEM INFORMASI SEKOLAH MENGGUNAKAN PENETRATION TEST DAN ISSAF Esi Putri Silmina; Arizona Firdonsyah; Rovalia Adhella Attya Amanda
Transmisi: Jurnal Ilmiah Teknik Elektro Vol 24, No 3 Juli (2022): TRANSMISI: Jurnal Ilmiah Teknik Elektro
Publisher : Departemen Teknik Elektro, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/transmisi.24.3.83-91

Abstract

Perkembangan teknologi di era industri 4.0 telah berkembang pesat, salah satunya Sistem Informasi Sekolah pada MTsN 8 Bantul. Sistem ini dibuat untuk memudahkan dalam mengolah data di sekolah. Sistem ini masih belum diluncurkan karena belum melalui proses pencarian celah keamanan jaringan. Tujuan dari pencarian celah keamanan ini untuk mengetahui tingkat keamanan jaringan untuk menghindari adanya tindakan yang tidak diinginkan seperti pencurian data, penyalahgunaan hak akses, dan sebagainya. Metode yang digunakan pada penelitian ini adalah ISSAF. ISSAF digunakan untuk mengkategorikan penilaian keamanan sistem informasi. Penetration Test juga digunakan untuk pengujian keamanan dengan menggunakan tool yang sudah ditentukan yaitu Kali Linux, Nmap, dan WireShark. Hasil dari penetrasi menggunakan 3 tool menunjukkan bahwa tool Kali Linux tidak mengeluarkan hasil yang diharapkan, WireShark tidak support untuk capturing pada Localhost, dan Nmap yang menampilkan 11 data pada setiap percobaan sebanyak 10 kali. Hasil dari penetrasi pada Nmap dihitung langsung menggunakan Algoritma Naive Bayes yang menghasilkan nilai akurasi 72,72% dan telah memenuhi Threshold Limit Value sebesar 70%. Hasil akurasi ini menunjukkan bahwa Sistem Informasi Sekolah MTsN 8 Bantul aman dari celah keamanan.
THE USE OF THE WEIGHTED PRODUCT METHOD IN A FOOD CHOICE DECISION SUPPORT SYSTEM FOR PATIENTS WITH TYPE 2 DIABETES MELLITUS Tikaridha Hardiani; Arizona Firdonsyah; Amalia Nur Afifah
Transmisi: Jurnal Ilmiah Teknik Elektro Vol 24, No 3 Juli (2022): TRANSMISI: Jurnal Ilmiah Teknik Elektro
Publisher : Departemen Teknik Elektro, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/transmisi.24.3.92-97

Abstract

Diabetes Mellitus is a disease caused by a disturbance in the balance between glucose transport into cells, which is stored in the liver and released by the liver, resulting in an increase in blood glucose levels. Diabetes Mellitus is listed as the top 6 cause of death in the world, so it should receive more attention. A person with Diabetes Mellitus must be able to maintain a diet and can only consume foods that are low in glucose, so the need for food selection for people with Type 2 Diabetes Mellitus is a must. The method used in this research is the Weighted Product as a choice of the multi-criteria calculation method and the research of literature for data collection through previous research. The results of this research using the calculation of the Weighted Product method, resulting in a ranking with the highest value of 0.065 and being the best alternative, namely Steamed Cassava.
Analisis Keamanan Jaringan dari Serangan DoS pada Sistem Inventaris Sanggar Tari Natya Lakshita menggunakan IDS Zahra Arwananing Tyas; Arizona Firdonsyah; Wulan Ramdhani
INFORMAL: Informatics Journal Vol 7 No 3 (2022): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v7i3.34943

Abstract

Information technology is advancing very quickly. Currently, there is highly qualified support for internet facilities. A quality internet service has both advantages and disadvantages for its users. An example of the negative impact of the development of internet technology is attacks from irresponsible parties or often called hackers. Sanggar Tari Natya Lakshita’s Inventory System is a newly built system, so attack testing is needed because network security is important to maintain data integration in the network. The test is carried out using a DoS attack with the LOIC tool. IDS is the method used in research with the Snort tool that functions as an intruder detector. The study aims to determine the results and effects of attacks on the Inventory System and determine how the IDS framework works with the Snort tool in detecting attacks. carried using 1 computer and 1 laptop. The results of the attack on the inventory system showed that Snort succeeded in detecting an attack sent by LOIC by displaying the attacker's IP and IP target through port 80, then the recommendations were given related to the stages of handling network security based on CSIRT guidelines at Sanggar Tari Natya Lakshita that can be implemented.
Peningkatan Pengetahuan Remaja tentang Bijak menggunakan Media Sosial di SMU Muhammadiyah Gombong Arizona Firdonsyah; Zahra Arwananing Tyas
Hasil Karya 'Aisyiyah untuk Indonesia (Hayina) Vol 1, No 1 (2021): Oktober
Publisher : Universitas 'Aisyiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (529.723 KB) | DOI: 10.31101/hayina.2227

Abstract

Perkembangan media sosial dengan berbagai fitur yang dapat diakses dimanapun membuat semakin banyak pengguna media sosial dari berbagai kalangan seperti remaja. Penggunaan media sosial dengan berbagai dampaknya perlu disosialisasikan kepada remaja karena saat ini media sosial memiliki dampak positif dan negatif. Kegiatan pengabdian terhadap masyarakat yang dilaksanakan di Sekolah Menengah Umum (SMU) Muhammadiyah Gombong, Kebumen berupa penyuluhan tentang dampak media sosial terutama terhadap remaja dan bagaimana menggunakannya dengan bijak. Pengabdian ini bertujuan untuk memberikan pemahaman mengenai dampak media sosial dan bagaimana para remaja dapat menggunakannya dengan bijak sehingga terhindar dari hal-hal yang bersifat negatif seperti tindakan asusila, penghinaan, pencemaran nama baik serta penyebaran berita bohong yang dianggap menyesatkan dan mengakibatkan adanya permusuhan antar individu dan atau kelompok masyarakat tertentu dilihat dari kelompoknya beradasarkan suku, agama, ras, dan antar golongan (SARA)
Penerapan Metode Design Thinking Pada Perancangan UI/UX Sistem Informasi Penelitian Mahasiswa Berbasis Web Arizona Firdonsyah; Zahra Arwananing Tyas; LM Ma'rifatun
INFORMAL: Informatics Journal Vol 8 No 2 (2023): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v8i2.33468

Abstract

Advances in technology provide opportunities to increase efficiency in various sectors, including the licensing process and the operations of government agencies. The Bantul District Health Office, as a health and research service provider, still relies on a semi-manual research licensing process. To overcome this, a structured research licensing information system is needed on a website basis. The stages of making a website start with UI/UX design. This study designed a UI/UX system using the Design Thinking method. The Empathize stage involves interviews and observations to understand the needs of users, especially the Head of the Health Office Program Subdivision. The Define phase identifies core requirements such as a list of user requirements, business process flowcharts, and the use of Figma for design and prototyping. The Ideate Stage involves brainstorming and wireframes, while the Prototype Stage produces the final design for testing. The Test phase involved Usability Testing, with fixes such as changing the message feature to notifications and adding the option to sign in with a Google account. The results showed that the prototype answered the problems of the Bantul District Health Office in designing the SIPENA UI/UX according to user needs.
Peningkatan Kualitas Manajemen Keuangan Menggunakan Aplikasi Android Pada Usaha Mikro Kecil dan Menengah Ima Food Nindiasari, Avininda Dewi; Firdonsyah, Arizona
Jurnal Pemberdayaan Masyarakat Vol 9 No 1 (2024): Mei
Publisher : Direktorat Penelitian dan Pengabdian kepada Masyarakat (DPPM)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21067/jpm.v9i1.8469

Abstract

The PKM activity partner is Ima Food, which is located in Purwomartani Village, Kalasan, Sleman, D.I. Yogyakarta. The primary issue that partners deal with is that they continue to mix up personal and business finances. This is motivated by a lack of skills and the media used to record business financial reports. Do not have Financial Reports because financial records are not optimal. To overcome partner problems, the PKM team offers the following solutions: (1) Financial literacy education related to MSME Financial Management; (2) Assistance using the android application “Akuntansi UKM” to facilitate recording and preparing financial reports. This PKM implementation method uses Participatory Learning and Action (PLA) theory. Some of the steps taken are planning, implementation, monitoring and evaluation. The result of this activity is that Ima Food has financial reports that comply with established standards. Through financial reporting using the Aplikasi UKM, partners can calculate the cost of goods sold based on their expenses, not based on the market selling price. This will certainly provide added value to business activities, increase business enthusiasm and expand business capital.
Penerapan Kebijakan Data Privacy di Era Teknologi 5G di Indonesia: The Implementation of Data Privacy Policies in the 5G Technology Era in Indonesia Fatmawati, Yuli; Firdonsyah, Arizona
Pencerah Publik Vol. 11 No. 1 (2024): Pencerah Publik
Publisher : Institute for Research and Community Services Universitas Muhammadiyah Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33084/pencerah.v11i1.7851

Abstract

Penelitian ini mengevaluasi penerapan kebijakan data privasi di Indonesia dalam konteks perkembangan teknologi 5G. Meskipun Undang-Undang Perlindungan Data Pribadi (UU PDP) telah memberikan kerangka hukum yang lebih jelas, penelitian ini mengidentifikasi sejumlah tantangan signifikan dalam implementasinya. Salah satu temuan utama adalah rendahnya tingkat kesadaran masyarakat mengenai hak-hak privasi mereka, yang meningkatkan risiko penyalahgunaan data pribadi di era 5G. Selain itu, penegakan hukum terhadap pelanggaran data pribadi dinilai masih lemah, dengan sanksi yang tidak memadai untuk memberikan efek jera. Penelitian ini juga menemukan bahwa infrastruktur keamanan siber di Indonesia belum sepenuhnya siap menghadapi kompleksitas yang dihadirkan oleh teknologi 5G dan perangkat Internet of Things (IoT). Celah dalam regulasi yang ada semakin memperburuk situasi ini, menyoroti kebutuhan akan revisi regulasi yang berkelanjutan. Untuk mengatasi tantangan tersebut, penelitian ini merekomendasikan kolaborasi antara pemerintah, sektor swasta, dan masyarakat sipil, serta peningkatan edukasi publik, penegakan hukum yang lebih ketat, dan inovasi dalam teknologi keamanan sebagai langkah-langkah penting untuk memperkuat perlindungan data privasi di Indonesia.
Analisis Perbandingan SAW dan TOPSIS pada Sistem Pendukung Keputusan Karyawan Terbaik Firdonsyah, Arizona; Warsito, Budi; Wibowo, Adi
Sinkron : jurnal dan penelitian teknik informatika Vol. 6 No. 3 (2022): Article Research Volume 6 Number 3, July 2022
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v7i3.11475

Abstract

The decision-making process has many assessment criteria needed as the basis for its assessment. A large number of problems regarding the length of time required in the decision-making process require decision-makers to find solutions. Decision Support System is one option that can be developed by decision makers because it can help improve efficiency and accuracy in the decision-making process. The process of developing decision support requires certain calculation methods as part of the processing. The methods that are quite widely used to build a decision support system include the Simple Additive Weighting (SAW) method and the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method. This research aims to analyze the accuracy of the cases raised as solutions to decision-making problems. A dynamic decision support system has been successfully created to design dynamics in the calculation of the SAW method and the TOPSIS method. The system is evaluated and analyzed for its accuracy level based on manual calculations. The results obtained are the SAW system has an accuracy value of 65% and the TOPSIS system is 100%. Furthermore, the calculation of the accuracy value of the SAW and TOPSIS methods in order to find out the best method to use by taking parameters in the form of the same value results generated from the calculations of the two methods. The results obtained are the accuracy value of the SAW method of 40% and the TOPSIS method of 100% based on testing using 60 employee data and 8 criteria used.
Implementation of Continous Delivery using Jenkins And Kubernetes with Docker Local Images Wijayanto, Danur; Arizona Firdonsyah
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 4 (2023): Article Research Volume 7 Issue 4, October 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i4.12624

Abstract

The need for software has increased and the development process has also become more complex as technology has developed which resulted application will take a long time to deployed, which can be completed in weeks or even months. One reason is the large number of teams involved in application development, especially the Development Team and Operations Team. These teams can cause the application delivery process to the user's side to be hampered if a conflict occurs, so the term DevOps appears. Support for DevOps continues to be improved, so there is CI/CD (Continuous Integration and Continuous Delivery/Deployment). Banyak penelitian mengenai CI/CD yang sudah dilakukan dan menggunakan tools Jenkins, Kubernetes, dan Docker. Namun penelitian yang sudah ada menggunakan repository DockerHub untuk menyimpan Docker Image This research focuses on the local implementation of the docker image which is then run with Kubernetes Orchestration so it can reduce the platform used by CI/CD. This implementation requires conversion from docker image to Kubernetes Image Cache. The results show that the Continous Delivery implementation using Kubernetes with the Local Docker image is successful and can run well. The results show that the average time required to create a docker image is 649 seconds (10 minutes 49 seconds) and image conversion process which takes an average time of 275 seconds (4 minutes 35 seconds). Research can be developed further by researching techniques to shorten build time, minimize resource utilitation and minimize time conversion from docker images to Kubernetes Image Cache.