Claim Missing Document
Check
Articles

Found 27 Documents
Search

IMPLEMENTASI INTRUSION DETECTION SYSTEM SEBAGAI KEAMANAN WEB SERVER UNIVERSITAS DEHASEN BENGKULU Khairil Pseudocode; Toibah Umi Kalsum
Jurnal Pseudocode Vol 1, No 2 (2014)
Publisher : Universitas Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (706.075 KB) | DOI: 10.33369/pseudocode.1.2.155-169

Abstract

Abstrak: Firewall mampu menghadapi ancaman terhadap sistem keamanan web server. Namun firewall masih dapat dilewati oleh hacker dengan menyerang web server melalui celah keamanan yang terbuka pada firewall. Disaat firewall di eksploitasi oleh hacker maka Intrusion Detection System (IDS) berperan sebagai pemberi peringatan adanya ancaman. Penelitian dilaksanakan di UPT Puskom Universitas Dehasen Bengkulu diruangan server pada bulan Juni sampai dengan September 2014. Pelaksanaan penelitian ini dilakukan beberapa tahap. Tahap pertama adalah penginstalan software snort. Tahap kedua adalah konfigurasi snort s, konfigurasi rule snort dan konfigurasi output log file. Tahap ketiga adalah melakukan pengetesan fungsi IDS. Tahap keempat adalah pengujian dan analisa IDS. Hasil dari penelitian ini adalah aplikasi snort berfungsi sebagai network intrusion detection system dalam mendeteksi penyusup yang melakukan scanning port. Snort menampilkan peringatan ancaman secara real time dalam bentuk tanggal, waktu, ip address pengirim dan jenis ancamannya. Snort dalam merespon adanya ancaman membutuhkan waktu 2 menit. Snort juga menyimpan alert dalam bentuk log kedalam file alert.ids. File log ini sebagai analisa bagi administrator jaringan untuk meningkatkan keamanan terhadap web server Universitas Dehasen Bengkulu.Kata Kunci: Intrusion Detection System, Keamanan Sistem Informasi, Web Server
Analisis dan Implementasi Software Defined Networking (SDN) untuk Automasi Perangkat Jaringan Riski Amalia; Toibah Umi Kalsum; Riska Riska
Infotek: Jurnal Informatika dan Teknologi Vol 4, No 2 (2021): Infotek : Jurnal Informatika dan Teknologi
Publisher : Fakultas Teknik Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (705.266 KB) | DOI: 10.29408/jit.v4i2.3734

Abstract

This study aims to build a network automation infrastructure by implementing a Software Defined Networking (SDN)-based web application to facilitate network administrators in implementing a web-based controller system for network devices by optimizing the configuration, management and operation time of network devices. This research uses action research method. In the action research method, researchers can describe, interpret and explain a condition at the same time as carrying out interventions aimed at improvement or participation. The results of this study indicate that the design and implementation of a Software Defined Networking (SDN)-based web application for network device automation using the python programming language with the paramiko library and the django framework can be applied to network infrastructure, so that with the application of SDN on network device automation applications can perform controllers. centralized network devices, so that configurations of many routers can be optimally carried out on a single Software Defined Networking (SDN) based web application.
ANALISIS KINERJA SENSOR PADA ROBOT PENDETEKSI KOTORAN DEBU DAN AIR Hermawansa Hermawansa; Toibah Umi Kalsum
ILKOM Jurnal Ilmiah Vol 11, No 1 (2019)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v11i1.405.53-58

Abstract

Sensors are electronic components that have capabilities that are quite reliable and consist of many types, such as ultrasonic sensors, humidity sensors, and dust sensors. At present almost every electronic equipment is equipped with sensor components, such as the robot designed, equipped with humidity sensors and dust sensors. The purpose of this study is to determine the performance of the humidity sensor and dust sensor in detecting dirt and the sensor sends a signal to the microcontroller, Arduino Mega 2560. From the results of sensor performance research on Arduino-based floor dust and water dust detector robots the proximity sensor response time detects a barrier in a room worth 2 seconds, the dust sensor response time detects dust that is 2 minutes due to improper installation of dust sensors so that slow detecting dust. While the humidity sensor response time in detecting water is 3 seconds. For the performance of the robot on the humidity sensor clean the water on the floor as much as 1 ml for 10 to 17 seconds and to show the robot's performance on the humidity sensor to clean the water as much as 2 ml for 20 to 30 seconds.
The Implementation of Internet-Based Computer Network at SMP Negeri 21 Central Bengkulu Hary Satria Pratama; Toibah Umi Kalsum; Hendri Alamsyah
Jurnal Komputer, Informasi dan Teknologi (JKOMITEK) Vol. 1 No. 2 (2021): DESEMBER
Publisher : Penerbit ADM

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2221.127 KB) | DOI: 10.53697/jkomitek.v1i2.220

Abstract

This study aims to design and build a computer network connection at SMP Negeri 21 Central Bengkulu. This study used an experimental research method. In this study, was carried out the performance of a proxy running on the system. From the results of the analysis, conclusions will be obtained regarding the benefits and more detailed functions of Mikrotik and SMB servers in the data or file sharing function. The results of this study show that the internet network has been running in accordance with what the writer hopes and can access the internet, clients from this server can also access the internet. As well as sending files using SMB server that has been determined by the writer. The SMB server can be used to send files that are placed on the Mikrotik router, so that the files can be accessed by connected to clients. Therefore in this study the writer only built LAN network using Mikrotik and sharing data with SMB Servers only.
An Analysis and Implementation of Local Area Network (LAN) As Data Communication Media In Computer-Based Test at SMPN 19 of Central Bengkulu Herdiansyah Herdiansyah; Toibah Umi Kalsum; Rizka Rizka
Jurnal Komputer, Informasi dan Teknologi (JKOMITEK) Vol. 1 No. 2 (2021): DESEMBER
Publisher : Penerbit ADM

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2122.934 KB) | DOI: 10.53697/jkomitek.v1i2.221

Abstract

This study aims to build a LAN network infrastructure at SMPN 19 Bengkulu Tengah, implement a computer-based exam system using Moodle, optimize the use of computers at SMPN 19 Bengkulu Tengah, and implement a teaching and learning process by utilizing information technology. This research uses action research research methods. In the action research method, the researcher describes, interprets and explains a condition at the same time by conducting an intervention with the aim of improvement or participation. The results of this study indicate that the use of a computer-based test application on a LAN network that has been implemented at SMPN 19 Bengkulu is running well according to the results of service quality testing with a delay parameter of 6.47 ms, jitter of 1.64 ms, and packet loss of 0.998% and The server used in this study also has a fairly good performance which can be seen from the CPU usage by 20%, memory usage by 88%, and network usage of 1 kbps.
Application of the Community Satisfaction Survey (SKM) to the Services of the Bengkulu Province General Bureau, Public Relations and Protocol Using the Servqual Method Robin Darmanto; Toibah Umi Kalsum; Yode Arliando
Jurnal Komputer, Informasi dan Teknologi (JKOMITEK) Vol. 1 No. 2 (2021): DESEMBER
Publisher : Penerbit ADM

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2024.098 KB) | DOI: 10.53697/jkomitek.v1i2.296

Abstract

In an effort to improve service quality, a service satisfaction survey system will be developed by displaying and analyzing data in the form of a questionnaire. Where in this development a computational survey method is implemented, namely the Servqual method which can provide convenience in collecting and analyzing survey questionnaire data. The application of the Community Satisfaction Survey (SKM) to the Services of the Bengkulu Province General Bureau, Public Relations and Protocol was made using the Visual Basic .Net programming language and SQL Server database. This application has applied a method, namely the Servqual Method, where the results of the community satisfaction assessment will be reprocessed to determine the level of community satisfaction with the services provided. The assessment process is divided based on the sections/units in the Bengkulu Province General Bureau, Public Relations and Protocol. The resulting output is in the form of a graph, where if the servqual value is the highest, it can be said that these attributes need to be evaluated for improvement / or in the future to improve the quality of services at the Bengkulu Province General Bureau, Public Relations and Protocol. Based on the tests that have been carried out, it can be concluded that the functionality of the Public Satisfaction Survey (SKM) Application for the Services of the Bengkulu Province General Bureau, Public Relations and Protocol has been running as expected.
Implementation of Artificial Neural Networks with Learning Vector Quantization (LVQ) Algorithm for Detecting Fingerprint Characteristics Yessi Mardiana; Toibah Umi Kalsum
Jurnal Komputer, Informasi dan Teknologi (JKOMITEK) Vol. 1 No. 2 (2021): DESEMBER
Publisher : Penerbit ADM

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2322.482 KB) | DOI: 10.53697/jkomitek.v1i2.432

Abstract

The purpose of implementing Artificial Neural Networks (ANN) with the Learning Vector Quanzition (LVQ) algorithm is to be used as a fingerprint identifier. So with this application can determine who owns the fingerprint in accordance with the database that has. In identifying fingerprints, the Learning Vector Quanzition method is very good, because it can measure the value of a fingerprint image that has been taken either by using a camera or scanner. In identifying fingerprints, it is expected that the fingerprint image input into the database should be from a photo or scanner that has clear and bright results, because this will affect the fingerprint search in the futures.
Analysis and Application of Access Control List (ACL) Methods on Computer Networks Fadhil Azmi; Toibah Umi Kalsum; Hendri Alamsyah
Jurnal Komputer, Informasi dan Teknologi (JKOMITEK) Vol. 2 No. 1 (2022): JUNI
Publisher : Penerbit ADM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v2i1.642

Abstract

Advances in information technology are currently growing to meet the needs of humans who want to obtain information easily, quickly and precisely. Therefore, we must continue to pursue and improve the quality and quantity of information technology. The purpose of this study is to find out how to perform the analysis and application of the Access Control List (ACL) method in a computer network. Mikrotik RB750 router is good to use for network security both in terms of reliability and in terms of cost. The method of network security using a firewall and address list is good because it can perform network security and restrictions on addresses that can be accessed and cannot be accessed. With this computer network security, computer network users can get internet access and local network access that is stable and smooth.
PEMANFAATAN MEDIA SOSIAL DALAM MENINGKATKAN PENDAPATAN USAHA Achmad Teddy Subagya; Dahlan Suhardi; Wika Febriani; Toibah Umi Kalsum
Jurnal PADAMU NEGERI (Pengabdian pada Masyarakat Bidang Eksakta) Vol 1, No 1 (2020)
Publisher : Perkumpulan Dosen Muda (PDM) Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1954.326 KB) | DOI: 10.37638/padamunegeri.v1i1.114

Abstract

ABSTRAKPeran media social sangat penting dalam mewujudkan suatu kinerja yang lebih baik. Tanpa adanya media social sulit untuk mengembangkan usaha yang sedang direncanakan, dengan adanya media social sangat mudah untuk mengembangkannya. Diantara media social yang marak digunakan adalah Facebook. Sebelum menggunakan facebook, pengguna harus memiliki akun gmailter lebihdahulu. Dalam pengabdian ini akan dijelaskan tata cara pembuatan email dan facebook beserta penggunaannya. Kata Kunci :Gmail, Facebook
Sosialisasi Pentingnya Keamanan Digital di Era Revolusi Industri 4.0 di Desa Gajah Mati Bengkulu Tengah Toibah Umi Kalsum; Jhoanne Fredricka; Liza Yulianti; Indra Kanedi; Aji Sukmo
Jurnal Dehasen Untuk Negeri Vol 1 No 1 (2022): Januari
Publisher : Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (677.053 KB) | DOI: 10.37676/jdun.v1i1.1926

Abstract

This community service activity in the form of socializing the importance of digital security in the era of the industrial revolution 4.0 aims to help the residents of Gajah Mati village, Central Bengkulu, in getting information about technological advances and how to maintain digital security. The subjects in this service activity were the Head of Gajah Mati Village and his apparatus and all residents of Gajah Mati Village, Central Bengkulu. This socialization process is carried out by providing information about security and prevention in the face of technological advances and fraudulent fraud in cyberspace. The result of this community service activity is that it can help villagers know about technological advances, how to deal with various kinds of online fraud so that they can slightly reduce victims of cybercrime. The conclusion of this community service activity in Gajah Mati Village, Central Bengkulu, is that it can provide information about technological advances, use technology, one of which is the use of Android smartphones, and help the community in dealing with fraud - fraud in cyberspace so that citizens can think smart if face the problem of fraud - fraud in cyberspace because they have received information and how to overcome it through this socialization. So the victims of crimes in cyberspace are slightly reduced.