Claim Missing Document
Check
Articles

Found 5 Documents
Search

SIMULASI PENENTUAN WAKTU MEMASAK BUAH KELAPA SAWIT MENGGUNAKAN LOGIKA FUZZY Sentosa Pohan
Jurnal Informatika Vol 3, No 1 (2015): INFORMATIKA
Publisher : Fakultas Sains & Teknologi, Universitas Labuhanbatu

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (288.954 KB) | DOI: 10.36987/informatika.v3i1.208

Abstract

PERANCANGAN SISTEM INVENTORY BARANG PADA UD. MINANG DEWI BERBASIS WEBSITE Fahrisal Fahrisal; Sentosa Pohan; Marnis Nasution
Jurnal Informatika Vol 6, No 2 (2018): INFORMATIKA
Publisher : Fakultas Sains & Teknologi, Universitas Labuhanbatu

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (640.162 KB) | DOI: 10.36987/informatika.v6i2.743

Abstract

PEMODELAN UML UNTUK MENENTUKAN KELULUSAN PENERIMAAN SISWA BARU BERBASIS WEB Sentosa Pohan
Jurnal Informatika Vol 3, No 2 (2015): INFORMATIKA
Publisher : Fakultas Sains & Teknologi, Universitas Labuhanbatu

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (446.211 KB) | DOI: 10.36987/informatika.v3i2.214

Abstract

Implementation of Password Validation using a Combination of Letters, Numbers and Symbols in the New Student Registration Application Sentosa Pohan; Putri Ramadani; Riszki Fadillah; Yusril Iza Mahendra Hasibuan; Baginda Restu Al Ghazali
International Journal of Health Engineering and Technology Vol. 3 No. 1 (2024): IJHET May 2024
Publisher : CV. AFDIFAL MAJU BERKAH

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55227/ijhet.v3i1.282

Abstract

This research aims to evaluate the implementation of password validation using a combination of letters, numbers and symbols in new student registration applications in increasing the level of application security. This research method involves implementing a password validation system with strict criteria, as well as testing password strength using brute force attacks. The test results show that passwords that meet the criteria take time 150 seconds to be broken using brute force, while passwords that only use letters only take time 10 seconds. Surveys of users show that 70% feel comfortable with this validation system, though 40% find it difficult to create a valid password. As much 85% users consider this system to improve application security. This research suggests that new student registration applications adopt a strict password validation system to increase the protection of users' personal data, while providing solutions for users to create more secure passwords.complex but easy to remember. The implementation of this system is expected to strengthen application security and increase user confidence in the protection of their personal data.
Program Sosialisasi Keamanan Email Akademik Mahasiswa Terhadap Ancaman Phishing Berbasis Social Engineering Sentosa Pohan; Hafizhah Mardivta2; Riswan Syahputra Damanik
Sevaka : Hasil Kegiatan Layanan Masyarakat Vol. 1 No. 4 (2023): November: Sevaka : Hasil Kegiatan Layanan Masyarakat
Publisher : STIKES Columbia Asia Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62027/sevaka.v1i4.528

Abstract

The rapid development of digital technology has brought significant benefits to the field of education, particularly through the use of academic email as an official medium of communication. However, this also creates potential security risks, especially phishing attacks based on social engineering. The low level of digital security literacy among students makes academic email accounts vulnerable to cybercrime. This study aims to implement an awareness program on academic email security, focusing on improving students’ understanding of phishing threats at SMA Islam Terpadu Rantau Prapat. The method used was an interactive workshop approach, which included theoretical sessions, demonstrations of phishing cases, simulations on identifying fake emails, and group discussions. Evaluation was carried out through pre-tests and post-tests to measure the participants’ ability to detect phishing. The results showed a significant improvement in students’ knowledge and skills, with the percentage of participants able to identify phishing increasing from 20% before the program to 82% after the program. These findings demonstrate that practice-based education is effective in building students’ digital literacy. The limitation of this study lies in the relatively small sample size and short-term evaluation. Future research is expected to expand the number of participants and integrate interactive technologies to ensure more sustainable impacts.