Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Jurnal E-Komtek

Phishing Website Detection Using the Decision Tree Algorithm Method Prasetyo, Stefanus Eko; Haeruddin , Haeruddin; ., Arron
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 8 No 2 (2024)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v8i2.2167

Abstract

Along with the increasing number of internet users and the rapid development of technology, cyber security threats are becoming more complex, including phishing threats that often cause major losses such as loss of individual or corporate privacy. This study aims to identify phishing websites effectively through the application of machine learning algorithms. The dataset used in this study comes from the UCI learning repository developed by the University of Huddersfield. The research methodology includes the stages of problem identification, Cart algorithm collection, validation, and model evaluation. With this method, the study found that the CART algorithm was able to achieve an accuracy level of 90.5% in detecting phishing sites. These results show cyber security, especially in protecting users from phishing threats, this study is expected to contribute to improving data protection and privacy of internet users, as well as encouraging the application of machine learning technology in a more adaptive cyber security system.
The Application of Smart Contracts in Cybersecurity for Threat Detection and Response Prasetyo, Stefanus Eko; Wijaya, Gautama; ., Kennedi
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 9 No 1 (2025)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v9i1.2285

Abstract

Cybersecurity is becoming an increasingly important issue in the digital era due to the rise in threats and attacks on information systems. One innovative technology with great potential to enhance cybersecurity is smart contracts. This article discusses the application of smart contracts in detecting and responding to cybersecurity threats. With their automatic, transparent, and immutable nature, smart contracts can be used to manage threat responses in real-time, improve attack detection efficiency, and minimize the risk of human error. This study also explores use cases such as secure data access management, blockchain-based anomaly detection, and incident response automation. Furthermore, implementation challenges such as scalability, interoperability, and smart contract code vulnerabilities are also addressed to provide a comprehensive overview. Through the integration of smart contracts into cybersecurity, this article concludes that this technology holds great potential to strengthen information systems' resilience against increasingly complex and dynamic threats.
Ransomware Attack Analysis in Cybersecurity Stefanus Eko Prasetyo; Heru Wijayanto Aripradono; Ricardo
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 9 No 1 (2025)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v9i1.2279

Abstract

Ransomware attacks have emerged as a significant threat to computer security in the digital age. This research aims to analyze ransomware attacks within the context of cybersecurity, specifically focusing on the impact of such attacks on an organization's database infrastructure. The study involves simulating ransomware attacks using techniques commonly employed by attackers in real-world scenarios. It includes a comprehensive literature review, case observations of previous ransomware attacks, and system simulations to understand the nature of these attacks and their potential consequences. The research highlights the need for effective mitigation strategies to safeguard critical organizational infrastructure and provide insights into strengthening defenses against ransomware. The findings of this study are expected to contribute to the development of more effective and sustainable cybersecurity strategies to address the growing complexity of cyber threats and ensure the operational continuity of organizations.Keywords: Ransomware attacks, Cybersecurity, Database infrastructure
Comparison of DES, AES, IDEA RC4 and Blowfish Aglorithms in Data Encryption and Decryption Stefanus Eko Prasetyo; Gautama Wijaya; Felix
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 9 No 1 (2025)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v9i1.2259

Abstract

The advancement of information technology has had a significant impact, one of which is as a medium for transmitting information from one place to another, making information access easier for many people. However, the ease of access to communication media also poses challenges for information security, as information becomes more vulnerable to being accessed, stolen, or manipulated by irresponsible parties. To protect the confidentiality of information, specific methods are needed, one of which is cryptography. In cryptography, there are various algorithms, including DES, AES, IDEA, Blowfish, Twofish, and RC4. This research aims to compare the performance of several cryptographic algorithms in the data encryption and decryption processes, focusing on processing speed and the size of the encrypted file. The results of the research show differences in processing time and file size of encrypted and decrypted data for each algorithm. Keywords: Aglorithms, Decryption, Encryption.