Claim Missing Document
Check
Articles

Found 3 Documents
Search

MEMBANGUN SENTRA KELENGKENG NEW CRYSTAL BERBASIS TEKNOLOGI INFORMASI : STUDI KEDUNGWERU AYAH Yulianto, Yulianto; Sarjimin, Sarjimin; Wibisonya, Irawan
Jurnal Abdi Insani Vol 11 No 4 (2024): Jurnal Abdi Insani
Publisher : Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/abdiinsani.v11i4.2053

Abstract

Poverty is one of the problems faced by almost all regions in Indonesia. The concept of poverty relates to the estimated amount of income and the estimated amount of needs, especially needs related to basic needs or minimum basic needs so that a person can be said to live a decent life. This is often referred to as the concept of absolute poverty. Poverty is a person's inability to meet food needs. Based on data from the Central Java Province Village Information System, the population of Kedungweru village which falls into decile 1 to decile 4 is a number of 108 households classified as poor. The method of implementing this activity consists of providing socialization, discussion, training to the evaluation stage. It is hoped that several approaches at each stage will be able to increase the information and capabilities of partner farmer groups. The results of this activity include that partner farmer groups ultimately have knowledge related to management in managing longan farming, such as farming management, risk management and marketing management. Apart from that, future longan cultivation farming activities will have data recording related to the need for plant inputs and other supporting systems based on a system that is relatively easier and more efficient to manage in the future. In the end, this activity was able to make the partner group better at managing the longan cultivation business technically and also improve the economy of individual farmers and villages by increasing the longan seeds provided.
Digital Forensic Process via Parallel Data Acquisition Technic: Experimental Case Study Sarjimin, Sarjimin; Yudhana, Anton
International Journal of Artificial Intelligence Research Vol 6, No 1 (2022): June 2022
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (745.703 KB) | DOI: 10.29099/ijair.v6i1.354

Abstract

Digital Forensics (DF) is an essential tool for solving cases of crimes committed. Based on the type of action performed, DF is classified into static forensics and live forensics. The limitations of static forensics in this method are that data collection is carried out on permanent storage media, while processes in the running system are not obtained. On the other hand, live forensics provides an opportunity to perform data retrieval on the ongoing process. Generally, live forensics is used to acquire Volatile Memory (RAM) data but can be extended on mobile devices, internet/LAN networks, and cloud systems. Browsing in private mode leaves no traces and information about what the user has done during the browsing session. This feature is often used by criminals to hide the crimes committed or at least to slow down the forensic process. To overcome this problem, it is important to do forensics on RAM and Network Forensics to obtain evidence of these crimes. This study aims to conduct DF to obtain potential evidence in criminal cases of misuse of private browsing. The evidence is expected to be used as evidence in court. The parties involved in the crime can be prosecuted in court through such evidence. This research offers Digital Forensics Process Via Parallel Data Acquisition Technic. Parallel data acquisition is a method for retrieving data on a computer or other smart device when the computer or other smart device is on through two different data sources. The first source is RAM and the second is Network Traffic. A case study on a criminal case of misuse of private browsing with Digital Forensics Process Via Parallel Data Acquisition Technic was able to obtain evidence in the form of the website visited, URL, traffic timestamp performed, source address, destination address, transmission protocol, length (size of the packet transmitted), source last node mac address, destination last node mac address, source port, destination port, and detail information. The evidence is expected to be used to reconstruct a crime of misuse of private browsing.
Security Mitigation of the Open Journal System (OJS) Against Online Gambling Content Hijacking Using the ISSAF Framework Sarjimin, Sarjimin; Nugraheni, Anggit Gusti
International Journal of Artificial Intelligence Research Vol 9, No 2 (2025): December
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29099/ijair.v9i2.1546

Abstract

The urgency of this research is to identify the causes, develop mitigation methods, and enhance the security of OJS websites, as many are infiltrated or hijacked for online gambling or other harmful content. Securing OJS websites is never easy because attacks are increasingly diverse and innovative every day. OJS system security is essential to protect the information contained therein and protect the services provided by scientific journal publishers. The ISSAF framework, which uses a simulation approach similar to a real server, can serve as a basis for identifying OJS Website vulnerabilities in Webmin for a system administrator. The results of the identification in this study indicate that the leading cause of OJS web server attacks originates from outside the simulation environment, specifically the internet network via ports 80/443. Vulnerability Session Hijacking with Cookies receives a CVSS vulnerability score of 9.1. A vulnerability in the web server configuration folder structure, traceable by crawler tools, receives a CVSS vulnerability score of 5.3. Repeated login attempts to the OJS system are not banned, and blocking the Attacker's IP receives a CVSS vulnerability score of 6.5. A file with the .php extension was successfully uploaded; it may be a backdoor file with a CVSS vulnerability score of 5.3. Although the OJS PKP changed/forced the file to .txt, the malicious file could be exploited in the future by unauthorized users. The novelty of this research lies in a server simulation that mimics a real server and the ISSAF framework for assessing the security of the Webmin web-based system administration tool on OJS websites.