Claim Missing Document
Check
Articles

Found 26 Documents
Search

Pemanfaatan Digital Marketing Bagi Universitas Islam Al-Azhar (Unizar) Jatmiko, Danang Priyo; Purnomo, Hendri; Wibisana, Bayu
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 1 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i1.6

Abstract

Digitalization an important role as a marketing media and transmission of academic/non-academic information. Therefore, analysis related to optimizing the use of digital marketing for Unizar. The hope, using digital marketing to expand the range of Unizar promotions to remote areas. Al-Azhar Islamic University (UNIZAR) is one of the oldest and well-known campus on Lombok Island, starting to develop digital systems in various aspects that support campus activities. UNIZAR realizes that digital marketing can reach all people wherever they are without any geographical or time boundaries. The digital system that UNIZAR has begun to use includes in the academic field using the Academic System called SIAKAD UNIZAR, as well as in utilizing social media as a means of massive promotion and publication. Even though Unizar has used digitization, its utilization is considered not optimal. This is of particular concern, because digitization plays an important role as a marketing medium or delivery of academic and non-academic information. Therefore, it is necessary to carry out an analysis related to optimizing the use of digital marketing for Unizar.. Digital marketing to promote Unizar using social media such as Facebook, Instagram and YouTube. The use of Instagram, and Youtube are social media with the most users, so it's more efficient to promote Unizar. And now time to change to use digital marketing in order to increase the number of prospective new students Unizar
Data Security Analysis Using Virtual Ridgeback in Network Forensics Firmansyah, Firmansyah; Pratama, Yusuf Hendra; Wibisana, Bayu
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i2.8

Abstract

Recorded two hospitals in Jakarta were hit by cyberattacks which caused patient data in hospital computer networks to be inaccessible. Symantec is an American company that manufactures data security software, according to Symantec's report entitled Internet Security Threat Report Volume 24 which was released in February 2019 then, in 2018, as much as 2.23%, cyberattacks in the global arena occur in Indonesia, increasing from the previous year, namely 1.67%. Meanwhile, the figure also places Indonesia in fifth place as the country that has the most cyber threats in 2018. It can operate on physical networks or on virtual networks. The only requirement is that the Ridgeback installation has access to the layer 2 network layer. Ridgeback Network Defence makes resistance to intruders using interactive defences and causes intruders to spend unnecessary resources. Interactive Defence is an advanced disguise and fraud capability designed to ensnare intruders in several ways, namely by managing billions of feeds in the network that can trigger intruder responses, affect intruder behavior so that they are easier to detect, and block access to protected network services without revealing that service has been blocked. This research is expected to create a control center by adopting a Software Defined Network (SDN) so that it can capture intruders and get data about the attack, which can be used as evidence in the process of investigating network forensics quickly and precisely.
Implementation of Live Forensic Virtual Router for Network Traffic Comparison Firmansyah, Firmansyah; Wibisana, Bayu; Purnomo, Hendri
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i2.9

Abstract

An entrepreneur or a service provider in the internet network world, will certainly find clients with different characters. Clients who are not technology blind, especially routers, sometimes want full access to the router, or some clients who ask to add a router to be able to directly access the router in full. Virtual Router allows clients to process their own network, as if the client has a router. Network forensics has the ability to reconstruct events using a system that stores all data traffic activities on the network, so that investigations can be carried out by looking back at events that have occurred and analyzing events that occurred in the past. Wireshark can review data packages in real time. This means that the wireshark application will monitor all incoming and outgoing data packets through a predefined interface and the next will display the results of the data package
Building Virtual Local Area Network (VLAN) for Self-Attendance Using Manageable Switch at Institut Sains & Teknologi Akprind Yogyakarta Firmansyah, Firmansyah; Wibisana, Bayu; Purnomo, Hendri; Pratama, Yusuf Hendra
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i2.31

Abstract

Building a manageable network to support the implementation of Virtual Local Area Network (VLAN) in independent attendance for students and lecturers, which can avoid individuals entrusting attendance, is part of today's technological developments, so that it is hoped to produce an individual who is independent, intelligent and supported. with a high level of technological mastery. The AKPRIND Yogyakarta Institute of Science & Technology has implemented this technology on the main server, but the VLAN implementation is specifically designed for Presence Mandiri in the west and east buildings on campus 1. Each building is designed to have 2 broadcast domains and use 2 switches to be able to produce communications. data between buildings that have the same broadcast domain. The switch on the Presence Mandiri VLAN network at the AKPRIND Yogyakarta Institute of Science & Technology has 2 VLAN IDs with the configuration used being VLAN Trunking (VTP). The IP addressing provided is DHCP from each switch, which can divide the network on each available port. This VLAN configuration is all done using a network simulation tool, namely Cisco Packet Tracert 6.1.0 in ICMP testing, with the protocol used is Internet Protocol version 4 or IPv4
Simulasi Routing Dynmic dan Virtual LAN untuk meningkatkan pemelajaran jaringan menggunakan Sisco Paket Tracer sugara, robby; Muhammad, Ismail; Bayu, Wibisana
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 2 No. 1 (2024): Multimedia Integration and computer networks in the Development of Modern Infor
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v2i1.35

Abstract

Penelitian ini membahas penggunaan simulasi Routing dinamis dan virtial LAN (VLAN) dalam konteks pengembangan pemahaman jaringan computer, menggunakan perangkat lunak Sisco Paket Trecer. Routing dinamis adalah teknik dimana Router secara otomatis memperbarui tabel Routingnya berdasarkan informasi yang diterima dari Router tetangganya, yang bertujuan untuk memilih jalur terbaik untuk mengirim paket data dalam jaringan computer. Sementara itu, VLAN merupakan metode untuk mempratisi jaringan lokal (LAN) besar menjadi beberapa segmen logis, meskipun fisiknya hanya hanya terdiri dari satu LAN. Metode yang digunakan dalam penelitian ini terdiri dari  langkah-langkah Cisco Paket untuk membangun dan mengkonfigurasi topologi jaringan menggunakan Trecer. Langkah-langkah ini meliputi pemilihan struktur jaringan, konfigurasi Routing dynamis untuk memungkinkan komunikasi otomatis antar Router, serta pengaturan VLAN untuk mengelompokkan perangkat sesuai dengan kebutuhan jaringan. Setelah konfigurasi sesuai,  jaringan yang telah dirancang diuji untuk memastikan bahwa simulasi sesuai dengan tujuan penggunaan yang diinginkan. Hasil dari penelitian ini menunjukkan bahwa penggunaan Cisco Paket Trecer sebagai alat simulasi sangat bermanfaat dalam pemelajaran dan pelatihan jaringan computer.simulasi memungkinkan penggunaan untuk merancang dan mengimplementasikan jaringan yang kompleks dengan mudah, sambal memahami prinsip-prinsip dasar dari alat-alat jaringan Cisco. Penggunaan alat ini juga membantu dalam memecahkan maslah konektivitas jaringan dengan menyediakan informasi tentang status koneksi computer dalam jaringan. Kesimpulan dari penelitian ini menekankan pentingnya pemahaman yang mendalam tentang Routing dinamis dan VLAN                                                                  dalam konteks dalam pengembangan jaringan komputer. Cisco Paket Trecer telah terbukti efektif sebagai alat pemelajaran yang memfasilitasi pengembangan keterampilan teknis dalam konfigurasi dan manajemen jaringan. Oleh karena itu, penelitian ini merekomendasikan penggunaan Sisco Paket Trecer sebagai salah satu pendekatan yang efektif dalam meningkatkan pemahaman dan keterampilan praktis dalam bidang jaringan komputer. 
The Role of Blockchain in Digital Content Copyright Kurniawan, Alfin; Elya, Elya; Wibisana, Bayu
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 3 No. 01 (2025): The Role of Digital Technology in Enhancing Education, Security, and Business
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v3i1.24

Abstract

The rapid advancement of digital technology has significantly transformed content distribution and consumption patterns while simultaneously increasing the vulnerability to digital copyright infringement. This article explores the application of blockchain technology as a strategic solution for protecting digital content copyright, particularly in the Indonesian context. Utilizing a literature review method, the study investigates key blockchain features transparency, decentralization, immutability, and smart contract automation that enhance the integrity and security of intellectual property rights management. Blockchain enables the permanent and tamper-proof recording of content ownership and creation timestamps, while also facilitating automated royalty distribution without third-party intervention. These capabilities make blockchain an efficient mechanism for copyright verification and real-time rights tracking. However, blockchain adoption in Indonesia still faces significant challenges, including limited digital literacy among creative industry actors, inadequate technological infrastructure, and the absence of clear legal frameworks supporting its implementation in the field of intellectual property rights. The study also highlights initial initiatives across various sectors, such as education, music, and digital art, where blockchain has been employed to secure content through NFTs and decentralized copyright registration platforms. Findings emphasize the need for multi-sector collaboration, the establishment of supportive regulations, and technological education to ensure the successful implementation of blockchain-based copyright systems. Overall, blockchain has the potential to serve as a transformative pillar in developing a fairer, more transparent, and sustainable copyright protection ecosystem in the digital era.