Claim Missing Document
Check
Articles

Found 16 Documents
Search

Workshop Pengelolaan Administrasi Data Internal Inventaris Sekolah SMK N 1 Bengkalis Berbasis Online Mansur, Mansur; Kasmawi, Kasmawi; Hidayasari, Nurmi; Karisma, Elana; Azzuhra, Nur Aida; Mansur
TANJAK : Jurnal Pengabdian Kepada Masyarakat Vol 5 No 2 (2024): TANJAK : Jurnal Pengabdian Kepada Masyarakat
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/v261a590

Abstract

Sekolah sebagai lembaga pendidikan perlu mengikuti perkembangan teknologi, termasuk dalam pengelolaan data inventaris secara digital. Pengelolaan inventaris yang efektif sangat penting untuk mendukung efisiensi operasional dan kualitas pendidikan. SMKN 1 Bengkalis menghadapi tantangan dalam pengelolaan inventaris yang masih dilakukan secara manual, menyebabkan ketidakakuratan data, kesulitan dalam pemantauan, dan hambatan dalam pengambilan keputusan. Tujuan pengabdian ini adalah pembuatan aplikasi untuk mempermudah proses distribusi, peminjaman, dan pengembalian barang, serta meningkatkan efisiensi operasional sekolah. Kegiatan ini menggunakan metode penelitian tindakan dengan tahapan sosialisasi kegiatan, identifikasi kebutuhan, desain database, proses setup sistem, melakukan workshop, evaluasi sistem, dan pembuatan laporan akhir. Kegiatan pengabdian ini berlangsung selama dua hari dalam bentuk teori maupun praktik. Hasil pengabdian ini adalah Aplikasi Administrasi Data Internal Inventaris Sekolah Berbasis Online yang merupakan layanan pencatatan dan kontrol untuk melakukan pengendalian terhadap data internal inventaris baik berupa barang habis pakai, barang yang pinjam dan barang yang diserahkan kepada bagian sekolah yang membutuhkan sehingga mempermudah proses pelaksanaan aktivitas sekolah.
Implementation of The Information Service Application Portal for Registration of Prospective Santri and Recording of School Activities Using The Extreme Programming Method Hidayasari, Nurmi; Mansur, Mansur; Ilma, Elfira Nurul; Anisa, Dinda
JURNAL TEKNOLOGI DAN OPEN SOURCE Vol. 6 No. 1 (2023): Jurnal Teknologi dan Open Source, June 2023
Publisher : Universitas Islam Kuantan Singingi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36378/jtos.v6i1.3125

Abstract

For Islamic boarding schools, the website functions as a medium of information and school introduction to the public. In order for prospective students to register easily, complete information is needed so that the boarding school can easily manage the data of prospective students. Apart from teaching and learning, teachers and students also have other activities at school. The categories of activities carried out by teachers are training, teaching, RPP (Learning Implementation Plans), and clubs or CCA (Co-Curricular Activities), while the categories of activities carried out by students are extracurricular activities, organizations, and competitions. All information on teacher and student activities requires data to be stored properly for a certain period of time. This study aims to build an information service application for registration of prospective students and recording of school activities using the extreme programming method. This application is made using the PHP programming language with the CodeIgniter framework, a MySQL database, and extreme programming as an application development method. Based on the tests carried out, this application can run on various browser applications, such as Google Chrome, Mozilla Firefox, and Microsoft Edge.
PENGAMANAN AKSES LAPORAN KEUANGAN UMKM MENGGUNAKAN QR CODE TERENKRIPSI DAN MULTI-FACTOR AUTHENTICATION Riduwan, Riduwan; Hidayasari, Nurmi; Ikhsan Wibowo, Muhammad
SIBATIK JOURNAL: Jurnal Ilmiah Bidang Sosial, Ekonomi, Budaya, Teknologi, Dan Pendidikan Vol. 5 No. 1 (2025)
Publisher : Penerbit Lafadz Jaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54443/sibatik.v5i1.4235

Abstract

The web-based financial recording and reporting system for Micro, Small, and Medium Enterprises is a digital solution designed to assist business actors in managing financial transactions in a structured, safe, and efficient manner, including recording income, expenses, business capital, and operational expenses, and generating automated financial reports. The development of this system uses the Waterfall method which includes the stages of analysis, design, implementation, testing, and deployment. The system is equipped with a security mechanism in the form of Quick Response Code authentication and PIN verification to improve access protection to accounts and financial statements. The results of the study show that the system is able to generate financial reports accurately, as well as implement effective security controls based on Black Box testing. Thus, the implementation of a Quick Response Code-based login and report access mechanism has been proven to be able to increase the security and ease of access to financial statements for Micro, Small, and Medium Enterprises without requiring business owners to log in directly to the system.
Penerapan Enkripsi AES-256 Untuk Pengamanan Data Pada Website Layanan Administrasi Desa Cantik Febiola, Febiola; Kasmawi, Kasmawi; Hidayasari, Nurmi
Jurnal Ilmiah Teknologi Informasi Asia Vol 20 No 1 (2026): Volume 20 Issue 1 2026 (8)
Publisher : LP2M Institut Teknologi dan Bisnis ASIA Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32815/jitika.1229

Abstract

Data security in village administration service systems is a critical concern, as these systems manage sensitive personal information such as full names, National Identity Numbers (NIK), Family Card (KK) numbers, addresses, and supporting documents. Many existing village administration systems store such data without adequate protection, increasing the risk of data leakage, identity theft, and unauthorized access. This study implements the Advanced Encryption Standard (AES-256) algorithm to enhance data security in a village administration services website. The research methodology includes system requirements analysis, system design, AES-256 implementation for personal data and document encryption, and functional and performance evaluation. The system automatically encrypts all sensitive data before storing it in the database and decrypts it only for authorized administrators. In addition, the system supports secure processing of statistical Excel files to facilitate the Desa CANTIK program. Experimental results show that the proposed system provides strong data protection with minimal performance overhead, averaging less than 120 ms for encrypting and decrypting 5 MB files, while maintaining acceptable CPU and memory usage. These results indicate that AES-256 can be effectively integrated into village administration services to improve data security without compromising system efficiency.
Implementation of Role-Based Access Control (RBAC) in a Drug Stock Management Information System Purba, Dea Agustina; Hidayasari, Nurmi
Sistemasi: Jurnal Sistem Informasi Vol 15, No 2 (2026): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v15i2.5958

Abstract

Role-Based Access Control (RBAC) is a role-based access management mechanism that restricts user privileges according to their authority within an information system. The implementation of this mechanism is particularly important in pharmacy drug stock management systems, especially at Apotek Pratama dr. Moris, which still relies on manual stock recording. This condition often results in data discrepancies, delays in monitoring expired medications, difficulties in report generation, and the absence of clear access restrictions for each user. This study focuses on developing a web-based drug stock management information system with RBAC as the primary mechanism for user authorization and security. The system was developed using the Waterfall methodology, which includes requirement analysis, system design, implementation, and testing. The application was built using Laravel framework version 11, MySQL database, and the Laravel Spatie Permission package for managing roles and permissions. Black Box Testing results indicate that all functional test scenarios were executed successfully, achieving a 100% success rate. User acceptance testing, conducted using the System Usability Scale (SUS), yielded an average score of 76, categorized as Good. The findings demonstrate that the implementation of RBAC effectively restricts user access based on roles, enhances data security, and improves the accuracy and efficiency of drug stock management compared to the previous manual system.
Implementasi Prototipe SIEM Berbasis Wazuh pada Website dengan Pengujian FIM dan Threat Hunting Hidayasari, Nurmi; Mansur; Kasmawi; Efendi, Zuliar
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 6 No 4 (2025)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.6.4.523

Abstract

This study implements a Wazuh-based Security Information and Event Management (SIEM) prototype to enhance security monitoring for a web application. The architecture uses two VPS instances: a web server as the log source equipped with a Wazuh Agent, and a monitoring server running the Wazuh Manager and Dashboard for event analysis and visualization. The evaluation combines threat hunting and File Integrity Monitoring (FIM) using several test scenarios: OWASP ZAP scanning, XSS, SQL injection (login-form testing and automated sqlmap attacks), and SSH brute force using hydra. The results show that Wazuh successfully detects XSS via rule 31105 (level 6) and sqlmap-based SQL injection via rule 31106 (level 6) because the attack patterns are clearly recorded in the web access logs. SSH brute force is strongly detected by rule 5763 (level 10), indicating repeated failed login attempts. In addition, FIM records file changes such as added and modified files (e.g., rules 554/550); however, it may generate noise when monitoring dynamic directories. The SQL injection attempt through the login form does not produce a specific SQL injection alert, suggesting limitations in log visibility/format and the need for decoder/ruleset tuning. Overall, Wazuh is effective for log-based security monitoring, while detection quality depends on log completeness, rule configuration, and FIM scope.