Firmansyah Ibrahim
Universitas Islam Negeri Alauddin Makassar

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search

Secured and Auditable Cryptography for Electronic Voting Zulkarnaim Masyhur; Firmansyah Ibrahim; Asep Indra Syahyadi
Jurnal INSYPRO (Information System and Processing) Vol 5 No 2 (2020)
Publisher : Prodi Sistem Informasi UIN Alauddin

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (339.636 KB) | DOI: 10.24252/insypro.v5i2.17797

Abstract

Dengan adanya Electronic Voting (e-voting) diharapkan dapat menggantikan sistem pemungutan suara konvensional yang telah ada sebelumnya. Pada sistem e-voting ini menggunakan konsep Pret a Voter yang menggunakan skema paper ballot e-voting. Skema ini menggunakan Public Key Infrastructure (PKI). Skema yang diusulkan menggunakan paper ballot e-voting dengan pertimbangan telah popular di kalangan masyarakat, tetapi didukung oleh protokol enkripsi yang kuat untuk menjamin vote secrecy dan anonymity dari pemilih. Aspek verifiability dari suatu system e-voting juga merupakan hal fundamental. Sistem e-voting menggunakan system protocol mixnets dengan kompleksitas security cukup baik. 
Sistem Informasi Pengenalan Tanaman Menggunakan QR Code Scanner Firmansyah Ibrahim; Zulkarnaim Masyhur; Khaerunsituncu Khaerunsituncu
Journal Software, Hardware and Information Technology Vol 1 No 1 (2021)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v1i1.4

Abstract

There are many different kinds of plants that can be found anywhere, but we don't know precisely what types and uses they are, so it's good for us to understand these plants. The purpose of this research is to make it easier to find out about plants by designing and building an information system about plant qualifications using QR Code technology combined with the Website application. This type of research used in this research is a qualitative method. Qualitative methods are research methods that are descriptive and tend to use analysis. Process and meaning (subject perspective) are emphasized more in qualitative methods. While the data collection methods used were observation, interviews and literature study. The application planning method used is a waterfall. In contrast, the testing technique used by the author is Black Box testing. The results of this research are in the form of a web-based plant recognition information system to make it easier for administrators to provide information and make it easier for visitors to get plant information. Based on the test results, it can be concluded that this system is running according to the common objectives.
Rancang Bangun Sistem Informasi Pemasaran pada CV Anugrah Sejati Prima Berbasis Website Menggunakan Framework Scrum Dwi Haryani; Firmansyah Ibrahim; Zulkarnaim Mahsyur
Journal Software, Hardware and Information Technology Vol 2 No 1 (2022)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v2i1.20

Abstract

CV Anugerah Sejati Prima is a business entity engaged in the sale of goods/tools, selling various kinds of civil engineering laboratory equipment. In providing services to visitors, CV Anugerah Sejati Prima has provided information about the specifications of the offered goods, but as an effort to obtain this information, visitors or potential buyers must come directly to the office or ask for information about the goods or services by telephone. The methodology used in making this system uses the agile method by applying the scrum framework. This application made by using PHP as the programming language by implementing the laravel framework. And by applying blackbox testing and accessibility testing as a system testing method. The result of this information system is that users or potential buyers can get price information and specifications by accessing the website, it can increase visibility and marketing of the CV. The presence of the website can also be used as evidence if CV Anugerah Sejati Prima exists and is trusted. By directing to the website, visitors or potential buyers will find complete information about the company, from the products being sold, the location, to the vision and mission, along with the company's history.
Internet of Things (IoT): Security, Threats and Countermeasures Zulkarnaim Masyhur; Firmansyah Ibrahim; Didit Hermawan
Journal Software, Hardware and Information Technology Vol 2 No 2 (2022)
Publisher : Jurusan Sistem Informasi Universitas Islam Negeri Alauddin Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24252/shift.v2i2.31

Abstract

Internet of Things (IoT) is a technology that is very popular lately and is starting to get busy in Indonesia, marked by various cellphone manufacturers building an IoT ecosystem. IoT can help connect objects such as sensors, vehicles, hospital instruments, household appliances and others. However, connecting these smart devices to the internet network causes various data security problems because internet technology and communication protocols have not been specifically designed to support IoT devices. The leakage of data security through the commercialization of IoT devices, causes privacy problems, threats of cyber-attacks, and organized crime. This paper aims to educate about how data security attacks in IoT and how to overcome them. To achieve this goal, we first discuss various well-known IoT reference models and define security in the context of IoT. Second, identify and classify various IoT attacks and threats. Third, described methods of countermeasures against IoT attacks. In the end, it provides some tips on securing IoT devices.