Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : International Journal Of Science, Technology

Reliability Analysis of Communication Network Service Quality For Internet of Vehicles (IoV) Nizirwan Anwar; Dewanto Rosian Adhy; Budi Tjahjono; Rudi Hermawan; Nur Widiyasono; Muhammad Abdullah Hadi
International Journal of Science, Technology & Management Vol. 2 No. 5 (2021): September 2021
Publisher : Publisher Cv. Inara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46729/ijstm.v2i5.310

Abstract

The development of the Internet of Vehicle (IoV) is overgrowing toward driving comfort, safety, and efficiency. Autopilot or a car without a driver is one implementation of IoT. To run the full function of IoV, a reliable communication network is needed because the risk will be substantial due to the low quality of network infrastructure services. In this research, we will analyze the quality of network infrastructure services. The analysis can be done through two approaches: direct measurement in the field using a GPS Tracker-based system and modeling using the mathematical function of transmit power of mobile communication transmitting devices. The test is carried out in a specific area with a sample of high traffic and low-density areas. This method was chosen to find the right pattern in measuring the quality of communication network services. The tests carried out produce dynamic data on service quality in certain areas. For areas of low density, the service quality tends to be below as well, and many areas without signal are found, while for areas with high density, the quality of service is found to be good, but network overload conditions often occur.
Investigation of Fake Insider Threats on Private Cloud Computing Services Dwi Kurnia Wibowo; Ahmad Luthfi; Nur Widiyasono
International Journal of Science, Technology & Management Vol. 3 No. 5 (2022): September 2022
Publisher : Publisher Cv. Inara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46729/ijstm.v3i5.613

Abstract

Cloud-based services are service system mechanisms used by companies or organizations in conducting computerized and integrated transactions in a computer network. A service system must of course be balanced with a level of security. This is used to anticipate cyber crimes that have the potential to occur. Cloud-based services themselves are usually offered by a Cloud Service Provider (CSP). CSPs are generally configured so that they are accessible on the public internet for their services. Companies that prioritize data security want a system that is safe from a series of cyber crimes. Private cloud computing scheme is a solution that can be implemented as an alternative. The problem that occurs is the possibility of MITC (Man in the Cloud) attacks that infiltrate and manipulate identities so that they are detected as fake insider threats on cloud systems. This thesis aims to carry out threat analysis with the Man in the Cloud attack technique on private cloud computing services based on a study of the ISO 27032 standard. Reports and documentation of the results of the analysis are expected to become recommendations for the cybersecurity investigation and management process related to threats to cloud services with private schemes cloud computing.