Claim Missing Document
Check
Articles

Found 23 Documents
Search

Analisa Kinerja Protokol iSCSI Melalui Jaringan Virtual Sabiq, Ahmad; Yazid, Setiadi
JTET (Jurnal Teknik Elektro Terapan) Vol 1, No 3 (2012)
Publisher : Teknik Elektro - Politeknik Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Internet Small Computer System Interface (iSCSI) merupakan protokol yang berjalan di lapisan transport pada jaringan TCP/IP yang bekerja untuk mengirimkan perintah-perintah SCSI agar memungkinkan suatu komputer dapat mengakses block-level dari media penyimpanan pada komputer yang berbeda. Selain digunakan pada jaringan LAN, MAN ataupun MAN, iSCSI juga dapat digunakan pada jaringan virtual yang menghubungkan mesin virtual dan mesin yang secara fisik memang ada atau nyata. Pada penelitian ini, dilakukan pengujian terhadap kinerja dari iSCSI pada jaringan virtual yang menghubungkan mesin virtual dan mesin nyata agar mendapatkan nilai throughput dan kecapatan baca/tulis untuk kemudian dianalisa lebih lanjut.
A Sense-based Registration Process for TDMA in IEEE 802.11 Network Rizal Fathoni Aji; Heru Suhartanto; Setiadi Yazid
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 1: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (368.744 KB) | DOI: 10.11591/ijece.v8i1.pp355-359

Abstract

TDMA implementation offer better fairness and throughput in IEEE 802.11. To implement TDMA, new registration process is needed, because current registration mechanism can disrupt TDMA process. This paper proposes a sense-based TDMA registration process using service slot and random timer. Simulation result shows, by using our mechanism, we can reduce the number of unused timeslot, and for 10 new nodes, each node only need 7 ms to complete the registration process.
ARP Cache Poisoning sebagai Teknik Alternatif untuk Membatasi Penggunaan Bandwidth berbasis Waktu Ahmad Almaarif; Setiadi Yazid
JRSI (Jurnal Rekayasa Sistem dan Industri) Vol 5 No 02 (2018): Jurnal Rekayasa Sistem & Industri - Desember 2018
Publisher : School of Industrial and System Engineering, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/jrsi.v5i02.367

Abstract

Kepadatan trafik data pada jaringan menyebabkan timbulnya kemacetan atau congestion pada lalu lintas trafik data. Jika terjadi di jaringan internet publik, kondisi ini akan mengganggu kenyamanan pengguna. Seringkali kepadatan ini disebabkan oleh pengguna yang melakukan pengunduhan data dalam jumlah besar. Solusi yang sering digunakan untuk mengurangi kepadatan trafik ini adalah dengan memperbesar bandwidth atau menggunakan metode seperti traffic policing serta queue management. Permasalahannya, solusi ini sulit diterapkan untuk organisasi skala kecil seperti sekolah atau pemerintahan desa yang tidak memiliki sumber dana yang besar untuk teknologi ini. Penelitian ini bertujuan untuk memodifikasi perangkat lunak sumber terbuka bernama Tuxcut untuk dimanfaatkan sebagai teknik pembatasan bandwidth dengan biaya murah. Dari hasil penelitian, didapatkan bahwa penerapan modifikasi perangkat lunak ini dapat digunakan untuk membatasi penggunaan bandwidth.
DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM Ahmad Sanmorino; Setiadi Yazid
Jurnal Ilmu Komputer dan Informasi Vol 6, No 2 (2013): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (803.802 KB) | DOI: 10.21609/jiki.v6i2.224

Abstract

In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism). From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.
PENGUJIAN KERENTANAN WEBSITE WORDPRESS DENGAN MENGGUNAKAN PENETRATION TESTING UNTUK MENGHASILKAN WEBSITE YANG AMAN Rifqi Azis; Setiadi Yazid
Jurnal RESTIKOM : Riset Teknik Informatika dan Komputer Vol 3 No 3 (2021): Desember
Publisher : Program Studi Teknik Informatika Universitas Nusa Putra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52005/restikom.v3i3.87

Abstract

Perkembangan teknologi informasi berbasis web berkembang semakin cepat, dan semakin banyak digunakan. 60,4 persen pengembang menggunakan perangkat lunak wordpresssebagai framework pengembangan website.Dengan semakin banyaknya pemanfaatan wordpress semakin banyak pula laporan insiden keamanan informasi berupa web defacementatau insiden keamanan informasi lainnyaberupapencurian informasi berupa username dan passwordmaupun data pribadi lainnya.Oleh karena itu perlu dilakukan pengujian untuk menemukan kerentanan dari website yang menggunakan wordpress sebagai frameworkpengembangannya.Pengujian yang dilakukan dengan cara penetration testing yang diawali denganmelakukan pengumpulan informasi berupa kerentanan-kerentanan yang terdapat di dalam websitetarget, selanjutnya melakukan eksploitasiyang memanfaatkan informasi CVE-2021-29447berupa kerentanan terhadap serangan XML external entity (XXE),serta dengan metode bruteforce attack.Setelah diketahui kerentanan yang dapat dieksploitasi, maka dapat dilakukan perbaikan-perbaikan untuk menghasilkan website yang aman dari serangan hacker.Salah satu strategi untuk meningkatkan keamanan websitedapat menggunakan strategi defense in depthyang berfokus kepada technical control diantaranya dengan melakukan pembatasan akses pada sistem informasi, memanfaatkan fitur tambahan pada wordpressseperti penggunaan captcha atau menggunakan fitur multi otentikasidengan menggunakan aplikasi authyuntuk menghindari upaya serangan bruteforce dan secara berkala melakukan pembaruan versi dari sistem informasi yang digunakanuntuk menghindari risiko eksploitasi dari CVE-2021-29447.Sehingga dapat menghasilkan website yang aman dari serangan siber berupa pencurian informasiatau web defacement.
DECEPTION BASED TECHNIQUES AGAINST RANSOMWARES: A SYSTEMATIC REVIEW Canny Siska Georgina; Farroh Sakinah; M. Ryan Fadholi; Setiadi Yazid; Wenni Syafitri
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 3 (2023): JUTIF Volume 4, Number 3, June 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.3.886

Abstract

Ransomware is the most prevalent emerging business risk nowadays. It seriously affects business continuity and operations. According to Deloitte Cyber Security Landscape 2022, up to 4000 ransomware attacks occur daily, while the average number of days an organization takes to identify a breach is 191. Sophisticated cyber-attacks such as ransomware typically must go through multiple consecutive phases (initial foothold, network propagation, and action on objectives) before accomplishing its final objective. This study analyzed decoy-based solutions as an approach (detection, prevention, or mitigation) to overcome ransomware. A systematic literature review was conducted, in which the result has shown that deception-based techniques have given effective and significant performance against ransomware with minimal resources. It is also identified that contrary to general belief, deception techniques mainly involved in passive approaches (i.e., prevention, detection) possess other active capabilities such as ransomware traceback and obstruction (thwarting), file decryption, and decryption key recovery. Based on the literature review, several evaluation methods are also analyzed to measure the effectiveness of these deception-based techniques during the implementation process.
Information and Communication Technology Recommendations for the Further Development of a Robust National e-Health Strategy for Epidemics and Pandemics Putu Wuri Handayani; Setiadi Yazid; Stéphane Bressan; Agung Firmansyah Sampe
Jurnal Sistem Informasi Vol. 16 No. 2 (2020): Jurnal Sistem Informasi (Journal of Information System)
Publisher : Faculty of Computer Science Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (385.172 KB) | DOI: 10.21609/jsi.v16i2.979

Abstract

This paper aims to provide recommendations for information and communication technology strategy that can support government actions to overcome epidemics and pandemics in Indonesia. The method used in this research is a qualitative approach by conducting a narrative review and discussion with four experts in the field of information and communication technology. The results of this study are recommendations related to people, process, technology, and data. The recommendations are inspired by the success of Internet in establishing public and private collaboration. This research is intended to assist the government in formulating information and communication technology policies to support government and health organization actions to overcome epidemics and pandemics.
Perancangan Tim Security Operation Center Di Perusahaan Sektor Finansial: Studi Kasus Dan Analisis van tony, farel; Setiadi Yazid
Cyber Security dan Forensik Digital Vol. 7 No. 2 (2024): Edisi November 2024
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.2.4895

Abstract

Tujuan penelitian ini untuk mengetahui perancangan tim security operation center di perusahaan sektor finansial. Keamanan informasi merupakan aspek penting dalam operasional perusahaan sektor finansial yang menangani data sensitif dan pengelolaan risiko global. Tim Security Operations Center (SOC) memainkan peran kunci dalam mendeteksi, menanggapi, dan mencegah serangan siber yang dapat mengganggu stabilitas keuangan. Penelitian ini mengadopsi pendekatan kualitatif deskriptif Penelitian ini bertujuan untuk mengembangkan model perancangan Tim SOC yang efektif di perusahaan sektor finansial. Studi kasus pada perusahaan XYZ menunjukkan bahwa faktor-faktor seperti pengalaman dan kepemimpinan, komunikasi dan kerja sama, teknologi dan alat kritis, serta dukungan manajemen sangat mempengaruhi kesuksesan operasional SOC. Pengelolaan SOC dalam konteks industri cryptocurrency yang memiliki risiko dan dinamika berbeda dari sektor lainnya.  Hasil penelitian menunjukkan bahwa pemahaman mendalam tentang ancaman spesifik dan adaptasi terhadap regulasi yang ketat diperlukan untuk meningkatkan kinerja SOC. Dengan demikian, penelitian ini memberikan panduan untuk optimalisasi dan peningkatan efektivitas Tim SOC dalam menghadapi tantangan keamanan di lingkungan bisnis finansial. Kata kunci: keamanan informasi, tim security operation center (SOC), sektor finansial, kinerja operasional, stabilitas keuangan ------------------------------- Abstract The purpose of this study was to determine the design of the security operation center team in financial sector companies. Information security is an important aspect of the operations of financial sector companies that handle sensitive data and manage global risks. Security Operations Center (SOC) teams play a key role in detecting, responding to, and preventing cyberattacks that can disrupt financial stability. This research adopts a descriptive qualitative approach This research aims to develop an effective SOC Team design model in financial sector companies. The case study of XYZ company shows that factors such as experience and leadership, communication and cooperation, critical technologies and tools, and management support greatly influence the operational success of the SOC. SOC management in the context of the cryptocurrency industry, which has different risks and dynamics from other sectors.  The results show that an in-depth understanding of specific threats and adaptation to strict regulations are required to improve SOC performance. Thus, this research provides guidance for optimizing and improving the effectiveness of the SOC Team in facing security challenges in the financial business environment. Keywords: information security, security operations center (SOC) team, financial sector, operational performance, financial stability
Faktor Keamanan Informasi dan Strategi Implementasi dalam Meningkatkan Adopsi E-Government di Sektor Publik Negara Berkembang: Tinjauan Literatur Febrianty, Devi; Hilman, Muhammad; Yazid, Setiadi
The Indonesian Journal of Computer Science Vol. 13 No. 6 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i6.4531

Abstract

The development of e-government is increasingly prioritized in developing countries as part of digital transformation efforts to improve the quality of public services. However, challenges such as low adoption rates, public trust issues, and weak information security persist. This research aims to comprehensively identify information security factors influencing e-government adoption in developing countries and propose implementation strategies. The approach used is a combination of systematic literature review and snowballing technique. We categorized security factors using the Technology, Organization, and Environment (TOE) framework to aid analysis and strategy formulation. Findings show that non-technical factors, particularly organizational and environmental aspects (41% each), dominate over technical factors (18%). These results highlight the importance of strengthening security policies, risk management, and data protection regulations by the government, as well as efforts to improve public perception of information security. This research provides theoretical contributions through a TOE-based framework and practical strategies to increase e-government adoption.
The Conceptual Design e-Wallet for Rupiah Digital Zulmy, Mohamad Faisal; Kurniawati, Monica Vivi; Yazid, Setiadi
Jurnal Ilmu Komputer dan Informasi Vol. 18 No. 1 (2025): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Informatio
Publisher : Faculty of Computer Science - Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21609/jiki.v18i1.1309

Abstract

This research study the advancement of Central Bank Digital Currencies (CBDCs) spurred by fi-nancial technology progress. It focuses on Rupiah Digital, Indonesia's CBDC initiative led by the Bank of Indonesia (BI). The study explores the technical aspects of Wholesale and Retail Digital Rupiah, proposes an e-wallet system for seamless digital transactions in related to blockchain technology, specifically Permissioned Distributed Ledger Technology (DLT). The objective of this research to provide recommendations to BI regarding appropriate e-wallet conceptual design based on study literature review (LR) methods and qualitative research method by conducting interviews throughs forum group discussion (FGD) and e-mail with leading economic (banks), legal (BI and Government), and technical experts (banks, academic expert on this field, BI and Government) to get reviews and input regarding the e-wallet conceptual design that was proposed. As result, we recommended the architecture for Rupiah Digital using Hyperledger Fabric blockchain with two-tiered distribution and user layer backed by digital token using ID on mobile apps to enhance the security of the system. The FGD with experts and executor result in approval on those conceptual design to be part of the option on development of CBDC in Indonesia.