Claim Missing Document
Check
Articles

Found 7 Documents
Search

PERBANDINGAN SISTEM AUTENTIKASI WPA2 EAP-PSK PADA JARINGAN WIRELESS DENGAN METODE PENETRATION TESTING MENGGUNAKAN FLUXION TOOLS Stefanus Eko Prasetyo; Try Windranata
Rabit : Jurnal Teknologi dan Sistem Informasi Univrab Vol 7 No 1 (2022): Januari
Publisher : LPPM Universitas Abdurrab

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36341/rabit.v7i1.2206

Abstract

Wireless Network is a collection of electronic devices that connect to each other using air devices or frequencies as a data traffic flow. Today, there are many users who use WPA2-PSK or WPA2-EAP as a wireless network security system that aims to prevent people from accessing it without permission. This research uses a wireless penetration testing technique that uses fluxion tools by comparing and analyzing the WPA2 authentication security system with EAP-PSK on a wireless network which aims to determine the vulnerability of a network security system. To carry out penetration testing, the author refers to the "Wireless Network Penetration Testing Methodology." Which consists of intelligence gathering, vulnerability analysis, threat modeling, password cracking, and reporting. From this study, it will be concluded that WPA2-PSK is less safe to use because it can be seen in the penetration testing that WPA2-PSK was successfully hacked in an unhide SSID state, while WPA2-EAP was successful in making Web Interfaces but failed to obtain information such as usernames and passwords. If the WPA2-PSK SSID is in a hide state, it will fail the hack, so that both security systems have their own advantages and disadvantages depending on the user's needs.
ANALISIS KEAMANAN WEBSITE UNIVERSITAS INTERNASIONAL BATAM MENGGUNAKAN METODE ISSAF Stefanus Eko Prasetyo; Nurul Hassanah
JURNAL ILMIAH INFORMATIKA Vol 9 No 02 (2021): Jurnal Ilmiah Informatika (JIF)
Publisher : Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v9i02.3758

Abstract

With the support of various types of media for delivering information, technological developments change over time. To facilitate access to information, one of them can use the media website. With the development of website technology, more and more parties are using it as a supporting medium for information transmission, including educational institutions in Indonesia. However, many administrators do not understand the security of the website created but pay more attention to the appearance and function of the website. As a result, there were cases of hacker attacks on websites that resulted in data leaks and changes in website appearance. Therefore, it is important to realize the importance of website security to prevent leakage of important data. Because there have been cases of hacker attacks that have occurred several times, the researchers conducted a security analysis of the main website of the Universitas Internasional Batam Institute using the ISSAF method.
Penyusunan Sertifikasi ISO 27001 Di PT. Pundi Mas Berjaya Haeruddin, Haeruddin; Stefanus Eko Prasetyo; Ari Wahyuni Kaharuddin
Jurnal Pengabdian Masyarakat Indonesia (JPMI) Vol. 1 No. 6 (2024): Agustus
Publisher : Publikasi Inspirasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62017/jpmi.v1i6.2052

Abstract

Persiapan untuk sertifikasi ISO 27001 di PT Pundi Mas Berjaya merupakan proses yang melibatkan pemahaman mendalam tentang persyaratan standar, penyusunan SOP yang terstruktur, penilaian risiko yang cermat, kolaborasi antar departemen, dan dokumentasi yang teliti. Hasil dari persiapan ini menunjukkan komitmen perusahaan dalam meningkatkan keamanan informasi secara menyeluruh. Saran yang diambil adalah untuk terus berkomitmen pada peningkatan kontinu dalam manajemen keamanan informasi, sesuai dengan prinsip-prinsip ISO 27001. Dengan demikian, persiapan ini bukan hanya memenuhi persyaratan formal, tetapi juga membawa dampak positif dalam memperkuat keamanan informasi di PT Pundi Mas Berjaya.
Pembuatan Aplikasi Auto Generate Content Pada PT Digital Artisan Solusindo Stefanus Eko Prasetyo; Haeruddin; Elvis
Jurnal Pengabdian kepada Masyarakat TEKNO (JAM-TEKNO) Vol 6 No 1 (2025): Juni 2025
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/jamtekno.v6i1.6768

Abstract

PT Digital Artisan Solusindo faces challenges in efficiently producing relevant, SEO-friendly digital content due to time and resource constraints. This community service project aimed to design and build a prototype application for auto-generating content to address this issue. The application integrates two key technologies: Google Trends, used to identify real-time popular topics, and the Gemini AI Large Language Model (LLM), which automatically generates articles based on these trends. The development process followed the Software Development Life Cycle (SDLC) methodology, encompassing requirements analysis through interviews, system design using flowcharts and use case diagrams, implementation with PHP and the Laravel framework featuring the Laravel Horizon queue manager, and functional testing. The result is a functional prototype deployed on Amazon Web Services (AWS) cloud infrastructure. It can automatically fetch trends, process them into prompts, generate content via Gemini AI, and store it in a database. This prototype provides a successful solution for automating content creation at PT Digital Artisan Solusindo, saving time and resources, and holds the potential to be developed into a new, innovative service product
Ransomware Attack Analysis in Cybersecurity Stefanus Eko Prasetyo; Heru Wijayanto Aripradono; Ricardo
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 9 No 1 (2025)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v9i1.2279

Abstract

Ransomware attacks have emerged as a significant threat to computer security in the digital age. This research aims to analyze ransomware attacks within the context of cybersecurity, specifically focusing on the impact of such attacks on an organization's database infrastructure. The study involves simulating ransomware attacks using techniques commonly employed by attackers in real-world scenarios. It includes a comprehensive literature review, case observations of previous ransomware attacks, and system simulations to understand the nature of these attacks and their potential consequences. The research highlights the need for effective mitigation strategies to safeguard critical organizational infrastructure and provide insights into strengthening defenses against ransomware. The findings of this study are expected to contribute to the development of more effective and sustainable cybersecurity strategies to address the growing complexity of cyber threats and ensure the operational continuity of organizations.Keywords: Ransomware attacks, Cybersecurity, Database infrastructure
Ketersediaan Tinggi Website menggunakan Penskalaan Otomatis dan Penyeimbang Beban AWS Haeruddin, Haeruddin; Andik Yulianto; Stefanus Eko Prasetyo; Gautama Wijaya; Dominggo Givarel
Telcomatics Vol. 10 No. 1 (2025): In Press
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/telcomatics.v10i1.10951

Abstract

The rapid development of information technology requires digital service systems to have high performance and optimal availability. One of the main challenges in managing web-based services is the system's ability to deal with an unpredictable surge in the number of users. If not anticipated, this can cause a decrease in performance and even detrimental downtime. This study aims to analyze and implement the concept of auto scaling and load balancing in an effort to improve the performance and availability of web-based services. Auto scaling functions to automatically adjust the number of server resources according to workload needs, while load balancing plays a role in distributing network traffic evenly to several servers. The research method used is an experiment, by implementing and testing service performance before and after the implementation of auto scaling and load balancing. The test results show that the combination of the two technologies is able to increase the speed of service response, reduce server load, and maintain optimal service availability. This research is expected to be a reference in the development of reliable and efficient cloud-based systems.
Comparison of DES, AES, IDEA RC4 and Blowfish Aglorithms in Data Encryption and Decryption Stefanus Eko Prasetyo; Gautama Wijaya; Felix
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 9 No 1 (2025)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v9i1.2259

Abstract

The advancement of information technology has had a significant impact, one of which is as a medium for transmitting information from one place to another, making information access easier for many people. However, the ease of access to communication media also poses challenges for information security, as information becomes more vulnerable to being accessed, stolen, or manipulated by irresponsible parties. To protect the confidentiality of information, specific methods are needed, one of which is cryptography. In cryptography, there are various algorithms, including DES, AES, IDEA, Blowfish, Twofish, and RC4. This research aims to compare the performance of several cryptographic algorithms in the data encryption and decryption processes, focusing on processing speed and the size of the encrypted file. The results of the research show differences in processing time and file size of encrypted and decrypted data for each algorithm. Keywords: Aglorithms, Decryption, Encryption.