Claim Missing Document
Check
Articles

ANALISIS EFEKTIVITAS DAN EFISIENSI METODE ENCODING DAN DECODING ALGORITMA BASE64 Mochammad Syahrul Kurniawan; I Gede Ardi Sukaryadi Putra; I Made Agastya Maheswara; Reynaldus Yoseph Maria Neto Labamaking; I Made Edy Listartha; Gede Arna Jude Saskara
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 3 No. 1 (2023): Maret : Jurnal Informatika dan Tekonologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v3i1.897

Abstract

This study discusses the methods of encoding and decoding the base64 cryptographic algorithm. The term encoding means a process of converting plaintext into ciphertext. While decoding is a term that means the process of turning ciphertext back into plaintext. In general, classical cryptography has been abandoned because of its logic which can be easily solved, so now it has switched to modern cryptography which operates in bit-binary mode which is formed from ASCII code. The base64 algorithm is a form of modern cryptography which is included in the modern type of block cipher cryptography. This study aims to obtain a comparison between 3 types of tools in carrying out a cryptographic encode and decode process on the base64 algorithm. The 3 types of tools include the Base64 Python Program, Bash Base64 Kali Linux, and CyberChef which are online tools. This type of research method uses qualitative methods because it tends to use analysis in research. Where the results of the first comparison are used to make it easier to see the accuracy of the encoding and decoding processes and the results of the second comparison are used to compare in terms of time efficiency when encoding the three tools using 1,000 words which will continue to be added by 4,000 words, up to a total of 9,000 words . These words are taken using dummy text (lorem ipsum).
ANALISA EVALUASI KINERJA SOFTWARE PASSWORD ATTACKER PADA BERKAS FILE ZIP Irhan Hisyam Dwi Nugroho; Kadek Pebriawan; Ketut Gede Tegar Maranom Jati; I Gede Cipta Aphila Diptha; I Made Edy Listartha; Gede Arna Jude Saskara
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 3 No. 1 (2023): Maret : Jurnal Informatika dan Tekonologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v3i1.899

Abstract

As we know, in this era of rapid technological progress, we cannot avoid threats to cyber security, cyber security itself is an effort to protect computer systems and data from various threats. In Indonesia alone, as of September 13, 2022, there have been recorded as many as 12.74 million accounts that have experienced leaks, and this makes Indonesia the 3rd country with the most number of data leaks in the world. One solution that can be done to protect the data that is owned is to put it in an archive such as ZIP, ZIP functions to combine several rice into one and reduce the size. And to secure the data in a ZIP file, you can set a password. The password is a combination of letters, numbers and symbols, with this combination it will be difficult for hackers to carry out their actions.
PENGUKURAN EFEKTIVITAS SERANGAN SQL INJECTION PADA WEBSITE DENGAN MENGGUNAKAN TOOLS JSQL, HAVIJ, DAN THE MOLE Aprilia Monica Sari; Trihana Santhi; Dewa Ketut Alit Maha Putra; Muhamad Bintang Haekal; I Made Edy Listartha; Gede Arna Jude Saskara
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 3 No. 1 (2023): Maret : Jurnal Informatika dan Tekonologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v3i1.905

Abstract

Along with current technological developments, security for data information residing on websites is very vulnerable to crimes in the internet world such as attacks on security holes in the database layer or often known as SQL Injection. SQL Injection attack is a method to insert SQL commands as input through an application, namely Kali Linux, in order to gain access to the database. This attack can find out usernames, passwords, and other data that is in the database. So that the SQL Injection attack is one of the most popular attacks and is often used to take advantage of security holes in the system because of how easy it is to use it. This study aims to test the level of effectiveness of SQL Injection attacks using the tools in it against a website. Testing the effectiveness is done by doing a comparison between the three tools that are in SQL Injection. The results of the research on the effectiveness of the tools in SQL Injection are the accuracy of database search times and the accuracy of information from the database.
ANALISIS PERBANDINGAN VULNERABILITY SCANNING PADA WEBSITE DVWA MENGGUNAKAN OWASP NIKTO DAN BURPSUITE Ni Putu Ana Rainita; Anak Agung Istri Callysta Athalia; Made Diva Putera Ananta; I Ketut Pratista Tri Pramana; Gede Arna Jude Saskara; I Made Edy Listartha
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 3 No. 2 (2023): Juli : Jurnal Informatika dan Teknologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v3i2.908

Abstract

Information technology from time to time is growing rapidly and has become part of human life in this modern era, with these developments, websites have an important role, however, existing developments also have an impact on the security of a website, testing web servers is very important. important thing to do, this test aims to test whether the web server is safe or not from the crimes of hackers. Appropriate methods and techniques are needed to see possible vulnerabilities in components, libraries and systems that underlie web applications used in anticipating this, OWASP, Nikto, and Burp Suite tools can be used to test website security vulnerabilities. Each tool has differences in terms of speed or duration, results, or scanned objects. The research objective of this article is how to analyze a comparison of tools in testing website security vulnerabilities. Therefore, the results of detection or analysis of website vulnerabilities are then compared based on scanned objects, duration, and results to then suggest tools that are effective and efficient in their use.
Co-Authors Ali Djamhuri Alit Alit Juniska Anak Agung Istri Callysta Athalia Aprilia Monica Sari Arijaya Kusuma, Kadek Angga Cahyadi, Kadek Wawan Decky Pratama Putra Dewa Ayu Deby Cintiya Dewa Ketut Alit Maha Putra Dewa Made Julijati Putra Dewangkara, Bagus Indra Dharma Putra, I Gede Wira Dharma Putra, I Putu Surya Diva Ananda Putra Driya, Putu Dhanu Dwi Cahyani, Desi Fransesko Indrajid G. Indrawan Gede Aditra Pradnyana Gede Agus Supriatmaja Gede Ananta Cahya Maheswara Gede Arna Jude Saskara Gede Bagus Parmadi Wijaya Gede Indrawan Gede Saindra Santyadiputra Gede Saindra Santyadiputra, Gede Saindra Gusti Ayu Mas Ekayanti Gusti Kade Surya Aditya Putra Herlambang, Varelly Arletta Tyora Putri I G. K. K. Putra I G. W. Pramartha I Gede Agus Krisna Perdana I Gede Ardi Sukaryadi Putra I Gede Bagastia Widi Atmaja I Gede Cipta Aphila Diptha I Gede Mahendra Darmawiguna I Gede Pasek Wedana I Gede Wahyu Parama Sucipta I Gusti Agung Ayu Ananda Dewi I Gusti Lanang Agung Raditya Putra I Ketut Pratista Tri Pramana I Ketut Resika Arthana I Km. Wahyu Yuda Arimika I Made Agastya Maheswara I Made Ardha Premana Mitha I Made Ardwi Pradnyana I Made Panji Prayoga I Md. Dendi Maysanjaya I Nyoman Namo Yoga Anantra I Nyoman Tri Anindia Putra I Putu Mas Yuda Pratama I W. S. Nirawana I Wayan Ari Pramana Putra Ida Ayu Mas Putri Mahalini Ida Bagus Kusuma Dewantara Ida Bagus Nyoman Pascima Ilham Ramdhani Irfanda, Achmad Irhan Hisyam Dwi Nugroho Jaya Deva K. F. Apriyana K. Y. E. Aryanto Kadek Dwika Darma Widyaputra Kadek Erik Diatmika Kadek Ferdy Andika Kadek Karisma Bramanda Kadek Pebriawan Kadek Sukma Jayanti Kadek Yota Ernanda Aryanto Ketut Gede Tegar Maranom Jati Komang Mahendra Komang Widhi Dharma Pratiwi Kusumadewi, Ni Made Ayu Mita Laurensius Patrick Made Diva Putera Ananta Made Wahyu Aditya Arta Mahadiv Wikrama, Kadek Sudewo Maharani, Made Donita Mahardika, Ngurah Manik Maheswara, Gede Ananta Cahya Medes Mendrofa, Linda Zal Mita Dewi, Ni Luh Listiana Putri Mochammad Syahrul Kurniawan Muhamad Bintang Haekal Ngurah Manik Mahardika Ni Ketut Rika Suryani Ni Luh Listiana Putri Mita Dewi Ni Made Gita Ayu Padmasari Ni Putu Ana Rainita Ni Putu Diah Ratih Rakasiwi Pande Putu Januraga Prameswara, Putu Buddhi Pratama, Gede Ade Putra, Decky Pratama Putra, Dewa Made Julijati Putra, Diva Ananda Putra, I Wayan Ari Pramana Putri Charly Putri, Kadek Rosila Putri, Vany Adelia Putu Adhitya kusuma Putu Candra Ariani Putu Damar Jagat Pratama Putu Setiari, Gusti Ayu Putu Surya Ardi Bhuana Putu Yoga Suartana Putu Yudia Pratiwi Rama Ngurah Putera Pinatih Rama Suryadi, Kadek Dika Ramdhani, Ilham Rangga Firdaus Reynaldus Yoseph Maria Neto Labamaking S. Rusditya Santi, Kadek Satwitri Sucipta, I Gede Wahyu Parama Sudiasta Putri, Nyoman Dinda Indira Sukariana Yasa, I Gede Agus Suputri, Komang Ayu Trihana Santhi Utama, I Made Putra Walhidayah, Irfan Wijaya, Kadek Gandi Taruna Windy Puspita Dewi, Luh Putu Wirayuda, Anak Agung Eka Yasa, I Gede Agus Sukariana Zulvan Avito Anwari