Claim Missing Document
Check
Articles

APLIKASI MANAJEMEN INVENTARIS BERBASIS MOBILE PADA CV LAFEBY MENGGUNAKAN METODE AGILE Prasetyo, Stefanus Eko; Aripradono, Heru Wijayanto; Candra, Boby
JUSIM (Jurnal Sistem Informasi Musirawas) Vol 8 No 1 (2023): JUSIM (Jurnal Sistem Informasi Musirawas) JUNI
Publisher : LPPM UNIVERSITAS BINA INSAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32767/jusim.v8i1.2093

Abstract

The utilization of technology at this time increasingly encourages businesses or industries to build an efficient work ecosystem. Inventory management is one of the important keys in the company's ecosystem. Inventory management is a process of managing and monitoring raw or finished goods. CV Lafeby is a medium-sized business engaged in textiles. Currently CV Lafeby still uses a conventional system in managing its inventory management such as recording incoming products using paper or making paper notes. The use of conventional systems has many problems such as the absence of up to date product data and the use of paper notes is too risky to be damaged or lost. The impact of incomplete data on incoming goods and outgoing goods will affect CV Lafeby in the future. Therefore, CV Lafeby needs an inventory management system by utilizing technology, namely a mobile application and mysql database. The author uses the agile development method in developing mobile applications. Later, the backend of the mobile application will be built through hosting so that the data can be obtained up to date. Hopefully, the mobile application that the author will develop can solve the problems of the shortcomings caused by conventional systems in inventory management.
Rancangan Sistem Keamanan Jaringan dari serangan DDoS Menggunakan Metode Pengujian Penetrasi Mamuriyah, Nimatul; Prasetyo, Stefanus Eko; Sijabat, Abner Onesimus
Jurnal Teknologi Dan Sistem Informasi Bisnis Vol 6 No 1 (2024): Januari 2024
Publisher : Prodi Sistem Informasi Universitas Dharma Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jteksis.v6i1.1124

Abstract

With the growth of increasingly innovative technology, new media have been created to convey information, namely web applications. Current technology is needed to disseminate information widely and without borders. A web server being paralyzed can disrupt the client's process of accessing information. Web server paralysis can be caused by several attacks, one of which is Distributed Denial of Service (DDoS). The author uses Kali Linux as penetration testing software, using the GoldenEye tool as this tool can be used to test whether a site is vulnerable to DDoS attacks. Security design with Cloudflare involves implementing multiple layers of protection designed to mitigate security risks to applications and websites. In general, Cloudflare Web Application Firewall (WAF) is placed in front of the origin server to detect and block web-based attacks. Cloudflare's DDoS protection service is applied at a global layer, securing infrastructure from hacker attacks. Leveraging Cloudflare's infrastructure, this design provides an effective and efficient security solution against DDoS attacks, ensuring the availability and reliability of network services
Pemanfaatan Sistem Informasi Marketplace Go Market untuk UMKM di Kota Batam Bekerjasama dengan PT Pundi Mas Berjaya Prasetyo, Stefanus Eko; Basri, Germen
Jurnal Tiyasadarma Vol. 2 No. 1 (2024): Juli 2024 | Jurnal Tiyasadarma
Publisher : LPPM ITEBA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62375/jta.v2i1.344

Abstract

The utilization of marketplace platforms is becoming increasingly popular and effective in the era of digitalization, helping SMEs to enhance their marketing focus and product sales. Marketplaces provide opportunities for business actors to expand their market reach and increase sales. The design and development of the marketplace information system named Go Market aims to assist PT Pundi Mas Berjaya in providing software solutions for the SME market. The development method for the Go Market application involves stages of Planning, Analysis, Design, Implementation, and Testing. The implementation schedule runs from January to May. The creation of the Marketplace, system implementation, and system testing are conducted in collaboration with PT Pundi Mas Berjaya. The results include the development of the Go Market application using the Laravel framework, which can be used to expand the SME market. The implementation of the marketplace system involves user-side and admin features, along with system testing to ensure optimal performance. The application's backend operates well, providing an efficient solution for data processing, with hopes for continuous development in the future. The output takes the form of an application that will be utilized by PT Pundi Mas Berjaya in enhancing users' understanding and skills in leveraging technology for SMEs. This project successfully developed the Go Market application with a well-functioning backend. All functionalities can assist users in processing sales data more efficiently.
Simulasi Rancangan Smart Home System Menggunakan Cisco Packet Tracer Prasetyo, Stefanus Eko; Dendi, Dendi
Jurnal Digital: Telnologi Informasi Vol 6, No 2 (2023): Jurnal Digital Teknologi informasi
Publisher : Universitas Muhammadiyah Palembang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32502/digital.v6i2.5396

Abstract

Perkembangan teknologi pada masa sekarang sangat cepat sehingga mendorong manusia untuk menggunakan teknologi yang ada saat ini, salah satunya yaitu teknologi smart home yang dapat menghubungkan manusia dengan perangkat serta perangkat dengan perangkat. Penerapan smart home juga terhubung dengan teknologi internet of things (IoT) dimana penggunaan dapat mengakses seluruh perangkat yang terhubung melalui jaringan internet untuk mempermudah manusia dalam mengontrol dan memantau peralatan elektronik yang terhubung ke jaringan smart home. Penerapan smart home dan IoT juga membantu dalam rangka penerapan hemat energi serta menjaga keamanan sekitar rumah. Penulis berhasil melakukan simulasi yang dilakukan di aplikasi Cisco packet tracer menggunakan metode Network Development Life Cycle (NDLC), dimana hasil dari simulasi rancangan bisa di kontrol penuh dari jaringan internal maupun ekternal sehingga membantu pengguna mengakses jaringan smart home secara berkala tanpa terkendala waktu dan lokasi dengan syarat smartphone atau komputer terhubung dengan jaringan internet.
Implementasi Multi-Factor Authentication Pada Aplikasi Berbasis Website dan Pengembangan Company Profile PT Raflesia Berjaya Properti Haeruddin, Haeruddin; Eko Prasetyo, Stefanus; Mindy, Avista
Jurnal Pengabdian Masyarakat Indonesia (JPMI) Vol. 1 No. 6 (2024): Agustus
Publisher : Publikasi Inspirasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62017/jpmi.v1i6.2051

Abstract

PT Raflesia Berjaya Properti (PT RBP), sebuah pengembang properti di Batam, menghadapi tantangan kritis dalam keamanan data dan branding perusahaan. Untuk mengatasi hal ini, Program Pengabdian Kepada Masyarakat (PKM) dilaksanakan dengan dua tujuan utama yaitu meningkatkan keamanan sistem informasi dan pembuatan website profil perusahaan untuk mengingkatkan branding. Fokus keamanan melibatkan penerapan Multi-Factor Authentication (MFA) menggunakan Auth0 untuk mencegah akses tidak sah dan melindungi data sensitif. Peningkatan branding melalui pembuatan website profil perusahaan yang profesional untuk meningkatkan visibilitas PT RBP secara global dan meningkatkan kepercayaan. Pengembangan website dan MFA ini menggunakan metodologi Network Development Life Cycle (NDLC), yang meliputi tahap analisis, desain, implementasi, dan pengujian. Implementasi MFA berhasil mengurangi risiko akses tidak sah, dan website profil perusahaan yang baru meningkatkan kehadiran PT RBP di pasar global. Meskipun terdapat beberapa tantangan adaptasi bagi pengguna MFA dan kemungkinan penyesuaian fitur website, PKM ini secara signifikan meningkatkan keamanan data dan branding PT RBP untuk memastikan keberlanjutan operasional dan daya saing pasar yang lebih baik.
Penyusunan Sertifikasi ISO 27001 Di PT. Pundi Mas Berjaya Haeruddin, Haeruddin; Stefanus Eko Prasetyo; Ari Wahyuni Kaharuddin
Jurnal Pengabdian Masyarakat Indonesia (JPMI) Vol. 1 No. 6 (2024): Agustus
Publisher : Publikasi Inspirasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62017/jpmi.v1i6.2052

Abstract

Persiapan untuk sertifikasi ISO 27001 di PT Pundi Mas Berjaya merupakan proses yang melibatkan pemahaman mendalam tentang persyaratan standar, penyusunan SOP yang terstruktur, penilaian risiko yang cermat, kolaborasi antar departemen, dan dokumentasi yang teliti. Hasil dari persiapan ini menunjukkan komitmen perusahaan dalam meningkatkan keamanan informasi secara menyeluruh. Saran yang diambil adalah untuk terus berkomitmen pada peningkatan kontinu dalam manajemen keamanan informasi, sesuai dengan prinsip-prinsip ISO 27001. Dengan demikian, persiapan ini bukan hanya memenuhi persyaratan formal, tetapi juga membawa dampak positif dalam memperkuat keamanan informasi di PT Pundi Mas Berjaya.
Optimalisasi Keamanan Jaringan Di Era Digital menggunakan metode Zero Trust Haeruddin, Haeruddin; Prasetyo, Stefanus Eko; Kaharuddin, Ari Wahyuni
Journal of Information System and Technology (JOINT) Vol. 5 No. 3 (2024): Journal of Information System and Technology (JOINT)
Publisher : Program Sarjana Sistem Informasi, Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/joint.v5i3.9986

Abstract

In the digital era, computer networks serve as a crucial foundation for various aspects of life, including business and education. Network security, encompassing data confidentiality, integrity, and availability, is a critical factor in protecting against cyber threats. Universitas Internasional Batam (UIB) faces challenges such as intrusion and hacking, necessitating additional security measures. To address these challenges, the implementation of Zero Trust Network Access (ZTNA) supported by Virtual Private Network (VPN) and Multi-Factor Authentication (MFA) has become a highly relevant strategy. ZTNA ensures that every request for network access is evaluated individually, without assuming trust in any entity, thereby enhancing the necessary security layers. This study employs the Network Development Life Cycle (NDLC) method to design and develop a ZTNA network at UIB using the ZeroTier platform. The process includes network and security requirements analysis, ZTNA architecture design, implementation across various devices, and MFA integration with Google Authenticator. Monitoring and Quality of Service (QoS) testing using iPerf were also conducted to ensure the system's effectiveness. The research findings demonstrate that ZeroTier effectively facilitates direct communication with high-quality service, while the enhanced security provided by MFA makes it a reliable and secure solution for the exchange of sensitive data in the dynamic and complex environment of the university.
Phishing Website Detection Using the Decision Tree Algorithm Method Prasetyo, Stefanus Eko; Haeruddin , Haeruddin; ., Arron
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 8 No 2 (2024)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v8i2.2167

Abstract

Along with the increasing number of internet users and the rapid development of technology, cyber security threats are becoming more complex, including phishing threats that often cause major losses such as loss of individual or corporate privacy. This study aims to identify phishing websites effectively through the application of machine learning algorithms. The dataset used in this study comes from the UCI learning repository developed by the University of Huddersfield. The research methodology includes the stages of problem identification, Cart algorithm collection, validation, and model evaluation. With this method, the study found that the CART algorithm was able to achieve an accuracy level of 90.5% in detecting phishing sites. These results show cyber security, especially in protecting users from phishing threats, this study is expected to contribute to improving data protection and privacy of internet users, as well as encouraging the application of machine learning technology in a more adaptive cyber security system.
IMPLEMENTASI ZERO TRUST NETWORK UNTUK MENINGKATKAN KEAMANAN JARINGAN MENGGUNAKAN FERRUMGATE DENGAN METODE NDLC Haeruddin, Haeruddin; Favian, Felix; Prasetyo, Stefanus Eko
Infotech: Journal of Technology Information Vol 10, No 2 (2024): NOVEMBER
Publisher : ISTEK WIDURI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37365/jti.v10i2.324

Abstract

As Cyber threats grow increasingly sophisticated, traditional network security measures are no longer adequate to safeguard critical data and resources. This study focuses on enhancing network security through the deployment of a Zero Trust Network utilizing the Ferrumgate platform. Employing the Network Development Life Cycle (NDLC) methodology, the research encompasses requirements analysis, the design of a segmented network, the implementation of Multi-Factor Authentication (MFA) using Google Authenticator, and User activity Monitoring. Findings reveal that Ferrumgate effectively restricts network access to verified Users and devices, significantly reducing risks posed by both internal and external threats. The adoption of MFA enhances security standards, while continuous Monitoring successfully detects and mitigates potential Cyberattacks. In summary, the NDLC-driven implementation of Ferrumgate demonstrated its effectiveness in bolstering network security, with a recommendation for regular evaluations and monitoring to ensure the system remains robust against emerging threats. ABSTRAKDalam menghadapi ancaman Cyber yang semakin kompleks, pendekatan keamanan jaringan tradisional tidak lagi cukup untuk melindungi data dan aset penting. Penelitian ini bertujuan untuk memperkuat keamanan jaringan melalui implementasi Zero Trust Network dengan menggunakan platform Ferrumgate. Pendekatan penelitian dilakukan menggunakan metodologi Network Development Life Cycle (NDLC), yang meliputi analisis kebutuhan, perancangan jaringan yang tersegmentasi, penerapan autentikasi Multi-Factor Authentication – MFA dengan Google Authenticator, serta pemantauan aktivitas pengguna. Hasil penelitian mengindikasikan bahwa Ferrumgate mampu memastikan hanya perangkat dan pengguna yang terverifikasi yang dapat mengakses jaringan, sehingga risiko ancaman internal dan eksternal dapat diminimalkan. Integrasi MFA memberikan peningkatan signifikan pada keamanan, sementara sistem pemantauan berkelanjutan efektif dalam mendeteksi serta mencegah potensi serangan Cyber. Kesimpulannya, penerapan Ferrumgate berbasis NDLC terbukti efektif dalam meningkatakan keamanan jaringan, dengan rekomendasi untuk melakukan evaluasi dan pemantauan berkala guna menjaga efektivitas sistem terhadap ancaman yang terus berkembang.
Analisis Quality of Service (QoS) Jaringan Wireless 2.4 GHz dan 5 GHz di Dalam Ruangan dengan Hambatan Kaca Stefanus Eko Prasetyo; Elvin Tan
Jurnal Ilmiah Teknologi Informasi Asia Vol 15 No 2 (2021): Volume 15 Nomor 2 (8)
Publisher : LP2M INSTITUT TEKNOLOGI DAN BISNIS ASIA MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32815/jitika.v15i2.609

Abstract

Jaringan wireless sudah menjadi kebutuhan bagi masyarakat sebagai pengguna smartphone, laptop, dan perangkat lainnya. Masing-masing perangkat yang dimiliki mempunyai wireless adapter yang mampu menerima frekuensi sinyal berbeda untuk terhubung ke jaringan wireless yang telah disediakan di tempat kerja, umum, dan tempat lainnya. Pada zaman sekarang ini banyak gedung atau ruangan tidak lagi dihalangi oleh beton maupun gypsum terutama di perkantoran masing-masing ruangan hanya dihalangi oleh kaca. Penelitian ini bertujuan untuk menganalisis frekuensi mana yang cocok untuk digunakan oleh user dalam ruangan berhambatan kaca. Penelitian ini dilakukan dengan menggunakan metode QoS dengan parameter throughput, delay, jitter, dan packet loss. Penelitian ini menghasilkan angka dari perhitungan masing-masing parameter QoS sebagai acuan untuk menentukan frekuensi yang cocok untuk digunakan dalam ruangan berhambatan kaca.