Claim Missing Document
Check
Articles

Found 3 Documents
Search

IMAGE ENCRYPTION USING COMBINATION OF CHAOTIC SYSTEM Sari, Festy Winda; Ibrahim, Ummi Aisha
JOURNAL OF APPLIED MULTIMEDIA AND NETWORKING Vol 8 No 1 (2024): Journal of Applied Multimedia and Networking
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jamn.v8i1.7940

Abstract

These days, image encryption relies on chaos-based theory. Encrypting and decrypting images using random sequences is becoming increasingly popular. Accordingly, this study proposes a method of image encryption based on the Logistic Map and Lorenz System. The encryption and decryption process involves permutation and substitution steps. A permutation is performed using the Logistic Map, which is used for leading randomness of pixels through confusion, while the diffusion process is finished using the Lorenz System. Afterwards, the substitution is performed by bitwise-XORing the value. Throughout the permutation process, the value of the original image's red, green, and blue (RGB) channels will be swapped amongst each and then sent to the next stage, i.e., diffusion. The diffusion process involves changing the values of pixels of the original image. The disturbance in plain images will increase when pixel and bit levels are changed, usually called cypher images. A study will evaluate the effectiveness of chaos-based security and the time cost of key processes. Furthermore, we will investigate the relationship between contiguous pixels.
An Audit Tata Kelola Teknologi Informasi di PT. SMOE Indonesia Menggunakan Framework COBIT 2019 Mouf, Depri Al; Sari, Festy Winda
JOURNAL OF APPLIED MULTIMEDIA AND NETWORKING Vol 8 No 2 (2024): Journal of Applied Multimedia and Networking
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jamn.v8i2.9067

Abstract

Information technology governance is an important part of the Company. Every Company that has implemented information technology in its activities must have good IT governance so that the company's business goals can be achieved with optimal utilization of information technology. This study examines the implementation of information technology governance at PT. SMOE Indonesia with the aim of improving information security. In this context, the information technology governance audit uses the COBIT 2019 framework. The audit was conducted to determine the domains and processes that exist at PT. SMOE Indonesia, the domains and processes used are APO13 and DSS05. The audit was conducted to determine the level of capability of each IT process running at PT. SMOE Indonesia
Penetrasi Testing Aplikasi Website Udacoding Kushardianto, Nur Cahyono; Sari, Festy Winda; Haikal, Antoni; Idris, Muhammad
Jurnal Pengabdian kepada Masyarakat Politeknik Negeri Batam Vol. 5 No. 2 (2023): Jurnal Pengabdian kepada Masyarakat Politeknik Negeri Batam
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/abdimaspolibatam.v5i2.7235

Abstract

Abstract"” The rapid advancement of technology, particularly the internet, has propelled humanity into a modern world where digitalization is essential. Consequently, system security has become paramount in the utilization of information systems, including websites and desktop/mobile applications. According to the National Cyber and Crypto Agency (BSSN), Indonesia remains the top target for cyberattacks. Penetration testing is a lawful practice employed to identify vulnerabilities within a system and enhance its overall security. This penetration testing exercise was conducted on the website Udacoding, following a four-phase approach: planning, information gathering, attack simulation, and reporting. The findings and proposed solutions will be comprehensively documented in a final report.