Claim Missing Document
Check
Articles

Found 2 Documents
Search

Analisis Kebutuhan Sistem Informasi Kepegawaian Menggunakan UML Sofyan Pariyasto; Yudha Christianto; Uli Rizki; Moch Mashuri; Zul Hisyam
Proceeding Seminar Nasional Sistem Informasi dan Teknologi Informasi 2018: Proceeding Seminar Nasional Sistem Informasi dan Teknologi Informasi (SENSITEK)
Publisher : STMIK Pontianak

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30700/pss.v1i1.228

Abstract

Analisis Kebutuhan memegang peranan penting dalam pembuatan sebusah sistem informasi, terutama dalam pembuatan sistem informasi manajemen Sumber Daya Manusia (SDM). Dengan adanaya annalisis kebutuhan ini nantinya diharapkan dapat meminimalisir terjadinya  kegagalan dalam pembuatan sistem informasi manajemen SDM. Dengan adalanya analisis kebutuhan ini juga diharapakan dapat menghindari faktor utama penyebab kegagalan, yaitu ketidakmampuan mengidentifikasi keinginan pengguna, serta ketidakmampuan mengeindentifikasi kebutuhan pengguna. Dalam pelaksanaannya identifikasi kebutuhan ini menggunakan pendekatan metode UML (Unifield Modeling Language), sehingga nantinya diharapkan akan lebih mudah dalam menganalisis kebutuhan dalam pembuatan sistem informasi manajemen.   Kata kunci: Analisis Kebutuhan, SDM, UML
Implementasi Network Intrusion Detection System (NIDS) Dalam Sistem Keamanan Open Cloud Computing Muqorobin Muqorobin; Zul Hisyam; Moch Mashuri; Hanafi Hanafi; Yudhi Setiyantara
Majalah Ilmiah Bahari Jogja Vol 17 No 2 (2019): Juli
Publisher : Sekolah Tinggi Maritim Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (310.076 KB) | DOI: 10.33489/mibj.v17i2.205

Abstract

Security is the most important part of computer network technology systems. Among the technologies that utilize networks are cloud computing. One cloud computing provider such as eucalyptus uses a firewall for system security. The use of a firewall on the system cannot monitor and analyze traffic that is inside the cloud server and does not give a warning when an attack occurs. The purpose of this study is that researchers will implement a network intrusion detection system (NIDS) in cloud computing and mirroring traffic on switches. Intrusion detection system (IDS) is a security technology that can analyze network traffic and detect traffic if an attack is indicated. NIDS are placed hosted differently from cloud computing servers. With the switch mirroring traffic method, traffic will be directed to NIDS so that NIDS can record all network traffic originating from outside the cloud server or traffic between virtual machines within the cloud server. The test results of attacks with 2 scenarios, namely attacks from outside and from within the cloud system, then NIDS is able to provide an alert response to traffic attacks.