Claim Missing Document
Check
Articles

Found 5 Documents
Search
Journal : Jurnal Informatika Terpadu

Analisis dan Implementasi Interkoneksi Jaringan Komputer berbasis VPNL2TP IPSEC pada SMK TKJ di Depok Ali Imran; April Rustianto
Jurnal Informatika Terpadu Vol 7 No 1 (2021): Maret, 2021
Publisher : LPPM STT Terpadu Nurul Fikri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54914/jit.v7i1.332

Abstract

The world of education, especially in Vocational School Computer and Network Engineering (TKJ) schools at Depok, requires technology to support learning and teaching activities digitally or online. Currently, schools are connected via an internet connection, but there are problems related to data security when exchanging data between schools. In this research, IT infrastructure was built relating to the interconnection of computer networks in TKJ schools at Depok to connect schools with multilevel security. The method used observation, interviews, and literature to analyze the network needed and make a design to be implemented and tested from the results of the implemented design. The results of this study were successful in connecting SMK TKJ schools at Depok with Virtual Private Network (VPN) technology based on Layer 2 Tunneling Protocol (L2TP) and IP Security optimally, which has been tested. So, I concluded that the design and implementation of L2TP and IPSec VPNs could be worked well to connect between SMK TKJ at Depok.
Analisis Tingkat Efisiensi pada Konfigurasi Mikrotik Hotspot menggunakan Metode Zero Touch Provisioning Fariz Fariz; Henry Saptono; April Rustianto
Jurnal Informatika Terpadu Vol 7 No 2 (2021): September, 2021
Publisher : LPPM STT Terpadu Nurul Fikri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54914/jit.v7i2.333

Abstract

ZTP (Zero Touch Provisioning) is an innovation in the IT world, which changes configuring devices from manual to automatic. This innovation creates due to the increasing need for network devices. It is a challenge for network companies to manage it both in terms of time and cost. In the traditional method, Network device administration must log in to each network device one by one to perform configuration. This is, of course, inefficient. This is where the advantages of automation, network device configuration becomes more efficient, plus repetitive work such as configuration backups monitoring can do automatically. In this study, the authors will test the efficient use of the ZTP by comparing the configuration time manually and automation with ZTP. This research configures the IP address, creates a DHCP server, and creates a hotspot on MikroTik. To make it easier for network management, the author created a dashboard to find out which devices have been configured. The automation system itself makes using Python programming, which utilizes the Paramiko main library as a liaison between network devices and automation servers via the SSHv2 protocol.
Penerapan ISO 9001:2015 untuk Peningkatan Layanan Website BMKG.GO.ID dalam Mendukung Penyebaran Informasi Bencana Gempa Bumi Andriana Dwi Hastanto; April Rustianto
Jurnal Informatika Terpadu Vol 10 No 1 (2024): Maret, 2024
Publisher : LPPM STT Terpadu Nurul Fikri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54914/jit.v10i1.793

Abstract

ISO 9001:2015 is an international standard or guideline for Quality Management Systems (QMS). The application of QMS is not limited to a particular industry and can be adapted to the nature, type, and size of the organization. This research is an academic study of the implementation of ISO 9001:2015 for services provided by the website www.bmkg.go.id. Especially to support the dissemination of earthquake information. The variable of this research is the perception of user satisfaction which was collected through a survey by PUSJARKOM BMKG on March 15, 2022. It consists of four research questions or instruments, the answers to each question are in the form of a perceptual narrative which is then assigned a value or weight based on a Likert Scale. PUSJARKOM BMKG uses the Likert Scale modification technique by eliminating neutral alternatives so that the respondents' answers are clear. With as many as 753 respondents, it was successfully obtained for the service satisfaction value of 94.5%, the service suitability value of 98.4%, the service speed value of 95.4%, and the service trust value of 77.2%. The results of the questionnaire were tested for validity and reliability using statistics with the help of Python software. The validity for each of these instruments is valid, and the reliability of the research variables is declared reliable based on Cronbach's Alpha value of 0.652.
Penerapan ISO 9001:2015 untuk Peningkatan Layanan Website BMKG.GO.ID dalam Mendukung Penyebaran Informasi Bencana Gempa Bumi Dwi Hastanto, Andriana; Rustianto, April
Jurnal Informatika Terpadu Vol 10 No 1 (2024): Maret, 2024
Publisher : LPPM STT Terpadu Nurul Fikri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54914/jit.v10i1.793

Abstract

ISO 9001:2015 is an international standard or guideline for Quality Management Systems (QMS). The application of QMS is not limited to a particular industry and can be adapted to the nature, type, and size of the organization. This research is an academic study of the implementation of ISO 9001:2015 for services provided by the website www.bmkg.go.id. Especially to support the dissemination of earthquake information. The variable of this research is the perception of user satisfaction which was collected through a survey by PUSJARKOM BMKG on March 15, 2022. It consists of four research questions or instruments, the answers to each question are in the form of a perceptual narrative which is then assigned a value or weight based on a Likert Scale. PUSJARKOM BMKG uses the Likert Scale modification technique by eliminating neutral alternatives so that the respondents' answers are clear. With as many as 753 respondents, it was successfully obtained for the service satisfaction value of 94.5%, the service suitability value of 98.4%, the service speed value of 95.4%, and the service trust value of 77.2%. The results of the questionnaire were tested for validity and reliability using statistics with the help of Python software. The validity for each of these instruments is valid, and the reliability of the research variables is declared reliable based on Cronbach's Alpha value of 0.652.
Implementasi Wazuh SIEM untuk Manajemen Log Event di Pesantren Teknologi Informasi dan Komunikasi Jombang Saputra, Faruq Aziz; Dharmawan, Tubagus Rizky; Rustianto, April
Jurnal Informatika Terpadu Vol 10 No 2 (2024): September, 2024
Publisher : LPPM STT Terpadu Nurul Fikri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54914/jit.v10i2.1435

Abstract

Information Security is essential for organizations and companies in the current digital transformation era. As a technology-oriented education, Pesantren Teknologi Informasi dan Komunikasi (PeTIK) Jombang requires a reliable security system, considering the increasing security risks. This research proposes the implementation of Wazuh as a Security Information And Event Management (SIEM) integrated with Telegram Bot for real-time system security detection and analysis. Wazuh was chosen because it has advantages in log management, ease of use, and strong community support. This research describes the implementation process of Wazuh, incident log visualization, and integration with Telegram Bot as an alert system. It tests attacks such as Bruteforce, DoS Attack (SYN Flood), and SQL Injection, showing that Wazuh effectively detects and responds to potential threats. Log visualization provides benefits in terms of efficiency and effectiveness in handling security incidents. In addition, Wazuh's integration with Telegram can provide notifications via Telegram Bot in real-time. This research also involves performance testing by monitoring the CPU and memory of the Wazuh server, and results show that the CPU and memory are still within normal limits when an attack occurs.