Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : JOIV : International Journal on Informatics Visualization

Network Security Assessment Using Internal Network Penetration Testing Methodology Deni Satria; Alde Alanda; Aldo Erianda; Deddy Prayama
JOIV : International Journal on Informatics Visualization Vol 2, No 4-2 (2018): Cyber Security and Information Assurance
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2300.569 KB) | DOI: 10.30630/joiv.2.4-2.190

Abstract

The development of information technology is a new challenge for computer network security systems and the information contained in it, the level of awareness of the importance of network security systems is still very low. according to a survey conducted by Symantec, the desire to renew an existing security system within a year within a company has the result that only 13% of respondents consider changes to the security system to be important from a total of 3,300 companies worldwide as respondents. This lack of awareness results in the emergence of security holes that can be used by crackers to enter and disrupt the stability of the system. Every year cyber attacks increase significantly, so that every year there is a need to improve the security of the existing system. Based on that, a method is needed to periodically assess system and network security by using penetrarion testing methods to obtain any vulnerabilities that exist on the network and on a system so as to increase security and minimize theft or loss of important data. Testing is carried out by using internal network penetration testing method which tests using 5 types of attacks. From the results of the tests, each system has a security risk of 20-80%. From the results of these tests it can be concluded that each system has a security vulnerability that can be attacked.
A Comparative Study of Image Retrieval Algorithm in Medical Imaging Abdullah, Yang Muhammad Putra; Bakar, Suraya Abu; Hj Wan Yussof, Wan Nural Jawahir; Hamzah, Raseeda; Hamid, Rahayu A; Satria, Deni
JOIV : International Journal on Informatics Visualization Vol 8, No 3-2 (2024): IT for Global Goals: Building a Sustainable Tomorrow
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3-2.3447

Abstract

In recent times, digital environments have become more complex, and the need for secure, efficient, and reliable identification systems is growing in demand. Consequently, image retrieval has emerged as a critical area focusing on artificial intelligence and machine learning applications. Medical image retrieval has become increasingly crucial in today's healthcare field, as it involves accurate diagnostics, treatment planning, and advanced medical research. As the quantity of medical imaging data grows rapidly, the ability to efficiently and accurately retrieve relevant images from extensive datasets becomes critical. Advanced retrieval systems, such as content-based image retrieval, are imperative for managing complex data, ensuring that healthcare professionals can access the most relevant information to improve patient outcomes and advance medical knowledge. This paper compares three algorithms: Scale Invariant Feature Transform, Speeded Robust Features, and Convolutional Neural Networks in the context of two medical image datasets, ImageCLEF and Unifesp. The findings highlight the trade-offs between precision and recall for each algorithm, providing invaluable insights into selecting the most suitable algorithm for specific tasks. The study evaluates the algorithms based on precision and recall, two critical performance metrics in image retrieval.
A Web-based Group Decision Support System for Retail Product Sales a Case Study on Padang, Indonesia Azmi, Meri; Satria, Deni; Mulya, Farhan Rinsky; Sonatha, Yance; Putra, Dwi Sudarno
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1331

Abstract

The industrial sector's growth has led to an increase in the number of industrial products available in the market. However, this has made it more challenging for retail merchants to choose which items to sell due to the overwhelming number of options. The seller must carefully consider various factors such as the type, quality, and probability of selling the goods to turn a profit. This research proposes a group decision support system to assist retail sellers in selecting the products to sell. The system is designed to process various information on comparing retail products against specific criteria, enabling sellers to make quick and accurate decisions. To achieve optimal results, this study combines three methods in the decision-making calculation process: Fuzzy Logic, EDAS, and Borda methods. The Fuzzy Logic method is used to assign a value to an unclear criterion, followed by the EDAS method ranking process, and ending with the combination of the decision-making results using the Borda method. The group decision support system is web-based and has been proven to provide effective solutions for retail business actors to increase sales and reduce losses. By using this system, retail sellers can make informed decisions about their products, enabling them to optimize their profits and reduce their risks. In conclusion, the increase in the number of industrial products has created challenges for retail merchants, but this research proposes a solution in the form of a group decision support system. Combining Fuzzy Logic, EDAS, and Borda methods results in an effective decision-making process that allows retail sellers to make informed decisions and achieve their business goals.
Web Application Penetration Testing Using SQL Injection Attack Alanda, Alde; Satria, Deni; Ardhana, M.Isthofa; Dahlan, Andi Ahmad; Mooduto, Hanriyawan Adnan
JOIV : International Journal on Informatics Visualization Vol 5, No 3 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.3.470

Abstract

A web application is a very important requirement in the information and digitalization era. With the increasing use of the internet and the growing number of web applications, every web application requires an adequate security level to store information safely and avoid cyber attacks. Web applications go through rapid development phases with short turnaround times, challenging to eliminate vulnerabilities. The vulnerability on the web application can be analyzed using the penetration testing method. This research uses penetration testing with the black-box method to test web application security based on the list of most attacks on the Open Web Application Security Project (OWASP), namely SQL Injection. SQL injection allows attackers to obtain unrestricted access to the databases and potentially collecting sensitive information from databases. This research randomly tested several websites such as government, schools, and other commercial websites with several techniques of SQL injection attack. Testing was carried out on ten websites randomly by looking for gaps to test security using the SQL injection attack. The results of testing conducted 80% of the websites tested have a weakness against SQL injection attacks. Based on this research, SQL injection is still the most prevalent threat for web applications. Further research can explain detailed information about SQL injection with specific techniques and how to prevent this attack.