p-Index From 2021 - 2026
7.837
P-Index
This Author published in this journals
All Journal Jurnal Paradigma Ekonomika TEKMAPRO Journal of Industrial Engineering and Management SITEKIN: Jurnal Sains, Teknologi dan Industri Sistemasi: Jurnal Sistem Informasi Policy & Governance Review Educatio INTECOMS: Journal of Information Technology and Computer Science Journal of Entrepreneurship, Management and Industry (JEMI) JURNAL TEKNOLOGI DAN OPEN SOURCE Almana : Jurnal Manajemen dan Bisnis JUSIM (Jurnal Sistem Informasi Musirawas) JURNAL TEKNOLOGI INFORMASI Jurnal Ilmiah Akuntansi Manajemen Jurnal Teknologi Informasi dan Multimedia Journal of Information Systems and Informatics Jurnal Ilmiah Betrik : Besemah Teknologi Informasi dan Komputer International Journal of Economics Development Research (IJEDR) Prosiding National Conference for Community Service Project Jurnal Industri Kreatif dan Kewirausahaan Jurnal E-Komtek JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH) Jurnal Manajemen Bisnis Eka Prasetya Economics and Digital Business Review Teknika Jurnal Akuntansi, Manajemen dan Ilmu Ekonomi (JASMIEN) Journal La Bisecoman International Journal of Global Accounting, Management, Education, and Entrepreneurship (IJGAME2) JEBDEKER: Jurnal Ekonomi, Manajemen, Akuntansi, Bisnis Digital, Ekonomi Kreatif, Entrepreneur Journal of Information System and Technology (JOINT) Jurnal Info Sains : Informatika dan Sains Conference on Management, Business, Innovation, Education and Social Sciences (CoMBInES) Conference on Business, Social Sciences and Technology (CoNeScINTech) Social Engagement: Jurnal Pengabdian Kepada Masyarakat Madani: Jurnal Pengabdian Masyarakat dan Kewirausahaan Jurnal Ilmiah Betrik : Besemah Teknologi Informasi dan Komputer
Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Jurnal E-Komtek

Evaluasi Autentikasi Dua Faktor (2FA) TOTP Pada Perguruan Tinggi Menggunakan Vulnerability Assessment dan CIA Triad Heru Wijayanto Aripradono; Haeruddin; Kurnia Cantra
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 8 No 2 (2024)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v8i2.2113

Abstract

Vulnerability exploitation in education websites often leads to data breaches, negatively impacting learning activities, notably higher education, which is highly susceptible to such attacks. This research evaluates the effectiveness of two-factor authentication in mitigating exploitability. To analyze issues further, vulnerability assessment tools, such as Burp Suite and ZAP, can explore website vulnerability and the CIA Triad framework (Confidentiality, Integrity, Availability). The analysis revealed three medium-level vulnerabilities and six low-level vulnerabilities; key topics such as CSRF (Cross-Site Request Forgery) and XSS (Cross-Site Scripting), compromise integrity, and MITM (Man-In-The-Middle) attacks threaten Confidentiality, these vulnerabilities indicate non-compliance with CIA Triad, mitigation strategy such are VPN (Virtual Private Network), and WAF (Web Application Firewall) were proposed. While two-factor authentication improves security, additional fixes and optimizations are required for its effective implementation in the education sector.
Ransomware Attack Analysis in Cybersecurity Stefanus Eko Prasetyo; Heru Wijayanto Aripradono; Ricardo
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 9 No 1 (2025)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v9i1.2279

Abstract

Ransomware attacks have emerged as a significant threat to computer security in the digital age. This research aims to analyze ransomware attacks within the context of cybersecurity, specifically focusing on the impact of such attacks on an organization's database infrastructure. The study involves simulating ransomware attacks using techniques commonly employed by attackers in real-world scenarios. It includes a comprehensive literature review, case observations of previous ransomware attacks, and system simulations to understand the nature of these attacks and their potential consequences. The research highlights the need for effective mitigation strategies to safeguard critical organizational infrastructure and provide insights into strengthening defenses against ransomware. The findings of this study are expected to contribute to the development of more effective and sustainable cybersecurity strategies to address the growing complexity of cyber threats and ensure the operational continuity of organizations.Keywords: Ransomware attacks, Cybersecurity, Database infrastructure
Co-Authors Abdul Wahab Alzi Alzi Andik Yulianto Ariadi, Cindy Arron Arron Avista Mindy Benhans, Devina Boby Candra Candra, Boby Christina Christina Christy Christy David David David Febrian Defryn Fratelry Willim Elisna Levia Elisna Levia Elvin, Elvin Erick Erick Ervin Setyawan Al Wen Jun Evander, Owen Febrianto Febrianto, Febrianto Felix Felix Felix Jethro Holly Galang, Yehezkiel Putra Gautama Wijaya Gracia, Nicole Haeruddin Haeruddin Haeruddin Haeruddin, . Hengki Hengki Hirawan, Jason Idayanti Nursyamsi Ikhlas, Junior Jemmy Jemmy Jerry Jardian Jery Tango Jong, Ricky Jucelyn, Devica Kelvianto Kelvin Kelvin Kevin Anderson Kevin Anderson Kisusyenni Kisusyenni Venessa Kisusyenni Venessa Kurnia Cantra Kurniawan, Jasen Lau, Vionny Leonardo, Kevin Lim, Daniel Melvin, Melvin Mettatama Gandha Puspita Michael Owen Mieko Huang Vincent Muhammad Ardiansyah Muhammad Ardiansyah Muhammad Dzaky Akbar Muhammad Rivaldy Hisham Natalia , Sherly Celia Ningsih, Vivian Febri Nursudiono Nursudiono Nursudiono, Nursudiono Peiwen , Sally Tan Prasetyo, Stefanus Eko Putra, Rezki Sari Raudlatul Khairiah Ricardo Ricardo Ricardo Rio Putra, Rio Ruben Pangeran Pangestu Silvina Silvina Silvina, Silvina Sofyanti, Sofyanti SULTAN, ZULKIFLI Te, Celine Tiffany, Evellyn Try Tina Tina Tjahyadi, Surya Tresnawan, Muhammad Ilham Ashiddiq Vanessa Felicia Leedora Vincent Vanessa Ting Vincent Vincent Vivian Vivian Vivian Vivian Viviany Viviany Wandi Wandi William Wilsen Lau Winata, Franklin Winson Kennedy Winson Ng Yap Rui Qi, Katherine Oktaviani