Claim Missing Document
Check
Articles

DEAD FORENSIC ANALYSIS OF QUTEBROWSER AND LIBREWOLF BROWSERS USING THE NIST 800-86 METHOD Fajar Al Rasyid; Bita Parga Zen
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.5.688

Abstract

A browser is software used to access web pages to obtain clear and readable information. Information resources are identified by a Uniform Resource Identifier (URI) and can be web pages, images, videos, or other content. When a browser user engages in online activities, they usually leave traces on the device such as history, cookies, cache files, and even emails and passwords. Such traces can usually help users access a website or input something, such as emails and passwords. The purpose of this research is to obtain digital evidence in the form of a cache on the hard disk in the Librewolf and Qutebrowser browsers. In this study, researchers used the National Institute of Standards and Technology (NIST) 800-86 method which consists of four stages, namely collection, examination, analysis, and reporting. which focuses on the Qutebrowser and LibreWolf browsers. The results obtained from this study were found to be 21 caches, 2 Sessions, 6 Cookies, 8 Network Persistent State, 9 QuotaManager, 11 IndexedDB, 24 LevelDB, 48 Cache Storage, 14 Favicons, 3 History, 6 Database, 3 StartupCache, 4 Alternate Services, 6 Content-Pref, Notification amounted to 1, Permission amounted to 7, Service Worker amounted to 6, SiteSecuristyServiceState amounted to 7, Webappstore amounted to 8, Sessionstore-Backups amounted to 5, Storage amounted to 47 NIST 800-86 method can be properly used in the acquisition of digital evidence and the most crucial data obtained in the Librewolf browser on the telegram and whatsapp sites.
The intelligent decision model for determine the best path of transportation on smart city using random forest algorithm and bayesian optimization (RF-BO) Ahmad Fali Oklilas; Milda Kamilia; Abdurahman abdurahman; Bita Parga Zen; Ari Widodo
JURNAL INFOTEL Vol 15 No 4 (2023): November 2023
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v15i4.1036

Abstract

This study investigates various approaches and algorithms in the context of object detection and best path determination for managing vehicular traffic in an urban environment, particularly in Palembang city. This research is a step towards the development of smart city concept. In the object detection analysis, we applied the YOLOv3 method on video footage to identify vehicles, resulting in mAP accuracy rates between 72.72% to 79.35% for both motorcycle and car categories. The total detection accuracy of the model reached 76.03%. Next, we adopted the Random Forest algorithm to classify traffic conditions into three classes: smooth, moderate, and congested. After optimizing the algorithm with Bayesian Optimization, the model accuracy increased from 89% to 92%, while the classification accuracy increased from 91.66% to 92.36%. Results from the application of the A* Heuristic Search algorithm revealed that lane 5 (from SMK PGRI 1 Palembang to Bom Baru Jl Perintis Kemerdekaan Arah Charitas (STMIK MBC)) was selected most frequently in 9 out of 12time trials. The selection of this route was based on an evaluation of traffic levels that tended to be "smooth" and the shortest travel distance compared to other alternative routes. The decision in choosing the optimal path also considers the road width factor, where wider roads have the potential to reduce traffic density and the risk of congestion.
Implementasi Website Teknologi Tepat Guna Sebagai Motor Penggerak Pemberdayaan Komunitas dan Inovasi Sosial Dasril Aldo; Affriza Brilyan Relo Pambudi Agus P; Bita Parga Zen; Gilang Suleman; Feri Yasin
Jurnal Pengabdian Sosial Vol. 1 No. 8 (2024): Juni
Publisher : PT. Amirul Bangun Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59837/dbm4wt69

Abstract

Limbah Pustaka, sebuah inisiatif komunitas yang berfokus pada pengelolaan limbah dan edukasi lingkungan, menghadapi tantangan dalam memperluas dampaknya tanpa dukungan teknologi memadai. Program pengabdian masyarakat ini bertujuan untuk merevitalisasi Limbah Pustaka dengan mengimplementasikan website teknologi tepat guna sebagai motor penggerak pemberdayaan komunitas dan inovasi sosial. Metode pelaksanaan terdiri dari tiga tahap: pra-implementasi, implementasi, dan evaluasi. Pra-implementasi melibatkan survei yang menunjukkan bahwa 85% peserta belum pernah mengelola website, 90% tidak mampu mengedit video, dan 70% tidak bisa membuat poster digital. Tahap implementasi meliputi pelatihan intensif, di mana peserta diajarkan mengelola dan memperbarui konten website yang ada, mengedit video dasar, dan membuat poster digital. Hasil pelatihan menunjukkan peningkatan keterampilan peserta: 95% peserta berhasil mengelola website, 92% mampu mengedit video dasar, dan 85% dapat membuat poster digital berkualitas. Evaluasi akhir menunjukkan bahwa implementasi website meningkatkan visibilitas dan interaksi komunitas dengan publik sebesar 150%, serta meningkatkan partisipasi komunitas dalam kegiatan edukatif dan kreatif. Revitalisasi ini memperkuat kapasitas internal Limbah Pustaka dan memberikan model pemberdayaan komunitas berbasis teknologi yang dapat direplikasi di lokasi lain.
COMPARISON OF LOGISTIC REGRESSION, MULTINOMIALNB, SVM, AND K-NN METHODS ON SENTIMENT ANALYSIS OF GOJEK APP REVIEWS ON THE GOOGLE PLAY STORE Audenza Maulana; Inayah Khasnaputri Afifah; Asghafi Mubarrak; Kiagus Rachmat Fauzan; Ardhan Dwintara; Bita Parga Zen
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 6 (2023): JUTIF Volume 4, Number 6, Desember 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.6.863

Abstract

Today's community activities cannot be separated from the name of transportation because it makes it very easy for people's daily activities. With the existence of transportation, people can more quickly reach their destination. With the Gojek application on the Google Play Store, it will help people travel or deliver goods. To determine service quality, sentiment analysis can be used to classify reviews. The purpose of this study is to compare which method has the best accuracy, so that it can classify reviews into positive or negative sentiments. The methods tested in this study are Logistic Regression, MultinomialNB, SVM, and K-NN. Performance assessment methods include score accuracy, recall, and precision, classification reports, and confusion matrix to determine the appropriate method for classifying reviews into positive or negative categories. Of the four methods tested, the one with the highest performance is the Logistic Regression method. Accuracy, recall and precision scores of the Logistic Regression method were 82.45%, 82.49%, 82.45% and 82.43%, respectively. Classification report also shows good results. In the confusion matrix, there are 111 and 124 True positives and True negatives. There are only 22 and 28 False positive and False negative results respectively. The method that has the lowest score is K-NN, with score accuracy, recall, and precision respectively were 52.28%, 59.43%, 93, 52%, and 65.65%. Classification report shows quite bad results. In the connection matrix, it produces True positives and True negatives 130 and 19. There are only 127 and 9 False positive and False negative results respectively. The results of this study state that using the Logistic Regression method is suitable for use in classifying positive and negative reviews in the review dataset on the Gojek application on the Google Play Store.
ANALISIS AKSESIBILITAS WEBSITE BERITA ONLINE MENGGUNAKAN METODE FUZZY ANALYTICAL HIERARCHY PROCESS (FAHP) DAN SIMPLE ADDITIVE WEIGHTING (SAW) Mukarromah, Firma; Parga Zen, Bita; Hebrasianto Permadi, Dimas Fanny
Antivirus : Jurnal Ilmiah Teknik Informatika Vol 18 No 1 (2024): Mei 2024
Publisher : Universitas Islam Balitar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35457/antivirus.v18i1.3046

Abstract

Teknologi saat ini berkembang cukup pesat, khususnya pada kasus penyebaran informasi melalui jaringan internet yang menjangkau masyarakat luas menggunakan website. Website news merupakan media penyampaian informasi berita memiliki peran penting dalam kehidupan sehari-hari, dengan demikian diperlukannya sebuah website yang mempunyai kualitas yang tinggi, akurasi dan cepat pada penyajiannya. Aksesibilitas adalah hal yang sangat mendasar untuk mengukur kualitas sebuah situs website khususnya website news sehingga dapat memberikan kemudahan kepada user pada saat mengaksesnya. Untuk menjawab permasalahan tersebut, diperlukan pengukuran guna mengamati prioritas dari semua kriteria dengan memanfaatkan konsep fuzzy yang bersifat subjektif. Fuzzy Analytical Hierarchy Process (FAHP) merupakan teknik yang digunakan untuk mendapatkan nilai bobot dari masing-masing kriteria. Dalam penelitian ini, empat situs web digunakan sebagai objek penelitian, antara lain Kompas.com, CNNIndonesia, Tempo.co dan Bisnis.com. Dari penelitian ini didapatkan sebuah hasil akhir yaitu website Bisnis yang menduduki ranking pertama dengan skor tertinggi 0,63 dan untuk ranking terakhir dengan memperoleh skor 0,11 diperoleh pada website Tempo.co. Permasalahan yang sering terjadi yang mempengaruhi aksesibilitas website adalah banyaknya elemen yang tidak diperbolehkan untuk digunakan pada posisi yang salah atau elemen yang digunakan kurang lengkap sehingga banyak tabel kosong yang menyalahi aturan WCAG 2.1.A 4.1.1 bagian 508(2017)A 4.1.1 dan sulit untuk digunakan oleh user.
Analisis Keamanan Jaringan Wireless menggunakan Metode Penetration Testing Execution Standard (PTES) Satria Galang Saputra; Parga Zen, Bita; Abdurahman
Jurnal Sistem Informasi Galuh Vol 1 No 2 (2023): Jurnal Sistem Informasi Galuh
Publisher : Fakultas Teknik Jurusan Sistem Informasi Universitas Galuh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25157/jsig.v1i2.3152

Abstract

Network security has become a very important aspect along with the increase in the number of internet users. The Kalisapu Village Office, is a public service area located in Slawi District, Tegal Regency which currently uses Wireless Local Area Network (WLAN) network technology as a means of internet access and for various purposes, both administrative and other services to meet community needs. which only uses one wireless access point to access the internet network. Wireless networks must have good security to avoid various threats of crime, therefore it is necessary to analyze network security using the Penetration Testing Execution Standard (PTES) method, which is a framework or guide used as a reference for implementing network penetration. From the results of testing five times using the Kali Linux operating system virtual machine with the type of MAC authentication bypassing attack, each arp spoofing has a successful status while encryption cracking has three failures and two successes. Based on the test results, it can be interpreted that the wireless network security system is quite safe, but it is necessary to make some improvements to the system configuration and network topology to strengthen the security system and minimize the threat of crime.
Analisis Forensik Pada Instagram dan Tik Tok Dalam Mendapatkan Bukti Digital Dengan Menggunakan Metode NIST 800-86 Ali Diko Putra, Muhammad; Wirawan Muhammad, Arif; Parga Zen, Bita; Yunita Kisworini, Rianti; Rohayati, Tuti
Jurnal Sistem Informasi Galuh Vol 2 No 1 (2024): Journal of Galuh Information Systems
Publisher : Fakultas Teknik Jurusan Sistem Informasi Universitas Galuh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25157/jsig.v2i1.3695

Abstract

Crime is currently increasing with the development of this smartphone, one of which is the crime of using social media. Instagram and Tik Tok are one of the most widely used social media applications in this era. The more users of this social media, it does not rule out the emergence of crimes against fellow users of this social media. Every activity carried out on social media, including criminal acts, leaves evidence or digital traces; whether deleted or not, all will be visible. Digital forensics is the study of how to obtain digital evidence obtained from digital devices. This study aims to determine the process of finding digital evidence on Instagram and Tik Tok social media applications that are accessed via smartphones using the National Institute of Standards and Technology (NIST) method. The stages in this digital forensic method include Collection, Examination, Analysis, and Reporting to obtain digital evidence on Instagram and TikTok using tools in the form of third-party software, namely MOBILedit Forensic Express, Autopsy, and FTK Imager tools. With the final result for the Instagram application tools, MOBILedit Forensic Express is able to acquire evidence with a percentage of 0.02%, for autopsy tools at 40%, and FTK Imager with a percentage of 57%. In the Tiktok application itself, MOBILedit Forensic Express gets a percentage of 27%, while an autopsy is 29%, and the last is the FTK Imager tool with a percentage of 71%. In this study, the FTK Imager tool is superior in the acquisition of evidence between the two tools.
Perancangan Sistem Informasi Sekolah Dasar Berbasis Website Menggunakan Metode Rapid Application Development Esya Ardhana, Farhan; Parga Zen, Bita
Jurnal Sistem Informasi Galuh Vol 2 No 1 (2024): Journal of Galuh Information Systems
Publisher : Fakultas Teknik Jurusan Sistem Informasi Universitas Galuh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25157/jsig.v2i1.3729

Abstract

The Ministry of Education, Culture, Research and Technology of the Republic of Indonesia (Kemendikbudristek) of the Republic of Indonesia has encouraged and provided guidance to schools in Indonesia to have websites as part of efforts to increase the transparency and accessibility of educational information. However, the rules regarding the obligation for each school to have a website are different in each region or province, so it is important to check the guidelines issued by the local education office. This research aims to build a school information system website at SD Negeri 1 Pasir Kidul. The school does not yet have a website as directed by the Ministry of Education and Culture. The absence of a website at the school causes the dissemination of information to the community to be hampered, the school's promotion to the community is not good, so an information system website is needed for the school. The school information system website was developed using the Rapid Application Development (RAD) approach. The RAD method was chosen because it is very efficient compared to other methods which require longer research time. Through the RAD method, you can speed up the process of developing an information system website and ensure that the resulting system meets the school's needs. The result of this research is an information system in the form of a website which aims to disseminate information about SD Negeri 1 Pasir Kidul by displaying school information, school galleries, activities at the school, as well as New Student Admissions (PPDB). The website that has been built is tested using the Black Box Testing method. The results of Black Box Testing prove that the SD Negri 1 Website is running according to needs.
Penerapan Sistem Manajemen Keamanan Informasi ISO 27001 pada Perpusnas RI dalam mendukung Keamanan Tata Kelola Teknologi Informasi Fattah Ys, Moh. Abdul; Parga Zen, Bita; Wasitarini, Dewi Endah
Cyber Security dan Forensik Digital Vol. 6 No. 2 (2023): Edisi Bulan November tahun 2023
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2023.6.2.4190

Abstract

Perpustakaan Nasional RI (Perpusnas) merupakan sebuah institusi yang menyimpan dan mengelola informasi dan pengetahuan nasional, harus memastikan bahwa teknologi informasi yang digunakan dalam operasinya aman dan terlindungi dari serangan siber dan ancaman lainnya. Saat ini manajemen risiko tata kelola teknologi informasi (TI) pada Perpusnas belum diterapkan seperti Standar ISO 27001 tujuan dari penelitian ini adalah menyusun dampak risiko yang ada di Perpustakaan Nasional RI menggunakan standar ISO 27001. Penelitian ini mengadopsi pendekatan kualitatif dan data diperoleh melalui wawancara dengan Ketua Tim Audit Perpusnas yang terlibat dalam manajemen TI. Hasil dari penelitian adalah menemukan beberapa risiko yang masih belum terbaiki. Yang saya temukan diantara adalah atap ruangan yang rusak tidak diperbaiki, beberapa aset yang tidak teridentifikasi, pegawai yang merangkap tugas, dan kekurangannya pegawai. peneliti berharap dengan adanya penelitian ini pihak perpusnas segera diperbaiki untuk pelayanan yang lebih bagus kembali. Kata kunci: ISMS, ISO 27001, Perpustakaan Nasional RI  --------------------------------------------------- The National Library of Indonesia (Perpusnas) is an institution that stores and manages national information and knowledge, must ensure that the information technology used in its operations is safe and protected from cyber attacks and other threats. Currently, information technology (IT) governance risk management at the National Library has not been implemented according to the ISO 27001 standard. The purpose of this research is to compile the impact of risks that exist in the National Library of Indonesia using the ISO 27001 standard. This study adopted a qualitative approach and the data was obtained through interviews with the chairman. National Library of Indonesia Audit Team involved in IT management. The result of the research is to find some risks that are still not resolved. Researcher find that among them was the damaged roof of the room that was not repaired, several unidentified assets, employees who had multiple tasks, and a shortage of employees With this research, ideally, the National Library of Indonesia will immediately improve it for better service again. Keywords: ISMS, ISO 27001, RI National Library
Applications for Detecting Plant Diseases Based on Artificial Intelligence Zen, Bita Parga; Iqsyahiro Kresna A; Diandra Chika Fransisca
Sinkron : jurnal dan penelitian teknik informatika Vol. 6 No. 4 (2022): Article Research: Volume 6 Number 4, October 2022
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v7i4.11833

Abstract

Agriculture is an activity to manage biological natural resources with the help of technology and labor. The presence of diseases in plants that suddenly inhibit plant growth is alarming to farmers. So, farmers cannot determine what conditions these plants suffer. This study will discuss the implementation of Artificial Intelligence-based plant disease detection software. At this stage, deep learning models are created using cameras matched with objects. The application development is to detect diseases in plants. The fourth step is testing. This application includes the implementation of Convolutional Neural Network and Recurrent Neural Network, which provides Artificial Intelligence architecture to diagnose plant diseases, and offer solutions to those plants from the results of research with tomato plant sample tests obtained four categories of disease Early Blight disease with a prediction of 100%, Bacterial Spots 90%, Healthy 100%, Late Blight 100% a system that can recommend health care related to crops based on images so that it can help farmers identify types of plant diseases. This application can help farmers to reduce crop failure for farmers caused by plant diseases to improve the quality of agricultural and plantation products
Co-Authors Abdurahman Abdurahman Affriza Brilyan Relo Pambudi Agus Putra Afifah Afifah Agatha Dinarah Sri Rumestri Agung Al Rasyid Ahmad Fali Oklilas Aiza Yudha Pratama Alfa Hardiyansyah Ali Diko Putra, Muhammad Andriawan Firmansyah Anggi Zafia Anita Zanjabiila Aprilia Intan Prasetya Ardhan Dwintara Ari Widodo Arif Wirawan Muhammad Asghafi Mubarrak Audenza Maulana Aulia Desy Nur Utomo Bunga Laelatul Muna Claudio Felle, Roland Dadan Mulyana Danang Wicaksana Dasril Aldo Diandra Chika Fransisca Dimas Fanny Hebrasianto Permadi Dina Yuliana Ditya Putri Anggraeni Emmareta Fauziah Eryan Ahmad Firdaus Esya Ardhana, Farhan Fajar Al Rasyid Famila Dwi Winati Fattah Ys, Moh. Abdul Feri Yasin Fikra Titan Syifa Finaliamartha, Dian Fitri Nurindahsari Fitri Wahyuningrum Gilang Suleman GITA FADILA FITRIANA Halim Alfidzar Halim Alfidzar Harahap, Muhammad Aldho Febrian Henri Tantyoko Inayah Khasnaputri Afifah Indriyanto, Slamet Iqsyahiro Kresna A Irwan Susanto Iwan Nofi Yono Putro J. Manurung, Barnes Jose, Abednego Kiagus Rachmat Fauzan Lintang Cahya Mulyadani Mahadhika Wipradharma Maulana, Haisyam Mega Pranata Meliana Dewi Rachmawati Michelli, Laureta Mauren MIFTAHOL ARIFIN, MIFTAHOL Mike, Amran Milda Kamilia Muhamad Azrino Gustalika Muhammad Afrizal Amrustian Muhammad Eka Purbaya Muhammad Nur Fikri Mukarromah, Firma Mu’adin, Dika Alim Nanda Aprillia, Monita Nasywatus Sholichah, Nisa Nindya Prameswara Sayoga Nurul Puspa Hapsari Nurwegiono, Muhammad Prayitna, Graciella Purwoko, Nais Edi Rauna, Yayi Sufia Regi Apriandi Rianti Yunita Kisworini, Rianti Yunita Rifki Adhitama, Rifki Sa'adah, Aminatus Satria Banureksa, Kezya Satria Galang Saputra Shaquille, TB. Ahmad Fadhlan Silalahi, Mario Rudy Siti Roqayah Trihastuti Yuniati Tuti Rohayati Umayasyah, Hesny Usman, Muhammad Lulu Latif Utami, Annisaa Utami, Melinda Wahyu Christanto, Febrian Wasitarini, Dewi Endah Yohani Setiya Rafika Nur Yosita Dwiani Suryaningtiyas Yoso Adi Setyoko Yudi Permana, Nana Yunita Kisworini, Rianti Zulfina Wiria Ananda