This Author published in this journals
All Journal Jurnal Infra
Agustinus Noertjahyana
Program Studi Teknik Informatika

Published : 52 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Vulnerability Testing pada Sistem Administrasi Rumah Sakit X David Harjowinoto; Agustinus Noertjahyana; Justinus Andjarwirawan
Jurnal Infra Vol 4, No 1 (2016)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development and growth of Hospital X is getting bigger and bigger, and has information system in running their operational activities. Hospital X itself has a server to support its activities, especially the administration system which contains data about their patients. With the availability of the network at the Hospital X, either through Wi-Fi or an Ethernet cable, therefore it should be noted the bonds between networks and servers. Furthermore it is an important need nowadays to help minimize and anticipate the hacking crimes of the existing servers. One of the things that can be done is to monitor the administration and conduct vulnerability testing.Based on the background of the problem, it is necessary to evaluate server and network security using the vulnerability / penetration testing. In addition, this study also uses the guidelines of the CEH (Certified Ethical Hacker), Acunetix, and CISSP (Certified Information Systems Security Professional) modules. The testing of this thesis aims to find weaknesses in the administration system at Hospital X. Some problems were discovered after testing, which each of the weaknesses has different handling or treatment, physical security server weak, and unused opened ports that should not be open.The solution offered to solve these problems, are: the use of Acunetix and CISSP as a standard network security as the solution to anticipate weaknesses, to perform maintenance on a regular basis for the hardware, software, and network, to filter the existing port, to increase the level of security of the server, and to test security regularly and periodically, either through consultation with the related field experts or using a guide (like Acunetix, CEH, and CISSP).
Vulnerability Mapping pada Jaringan Komputer di Universitas X Devi Christiani Angir; Agustinus Noertjahyana; Justinus Andjarwirawan
Jurnal Infra Vol 3, No 2 (2015)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

X University is now growing increasingly large and has a wide variety of information systems to run its operations. One of the most important servers in X University is www.xyz.ac.id. That URL is one of the URLs that are frequented by the public outside to get to know closer about X University in general. Security of web server is usually a matter of an administrator. Sometimes, security issues or server application system and the importance of securing web server neglected only realized after the disaster. Without a good security application systems, the application of technology would be very dangerous as good as any institution or organization itself. Therefore, it takes a server security evaluation and conduct vulnerability mapping to be wary of the security server.Based on the background of the problem, it is necessary to evaluate by using penetration testing. In addition, this study also uses the guidelines of the module CEH (Certified Ethical Hacker) and the official web Acunetix. Testing of this thesis is aimed to find the weaknesses of existing servers. Some problems were found after testing, among others: the weaknesses found pretty much where any weaknesses have different handling, ports should not be open even open, and less important public IP should not be open.The solution provided to overcome these problems include: the use of Acunetix standards can be maintained and continued, testing will be done more than one time, to upgrade web server to a newer version periodically, to filter the existing port, increasing the level of web security server, periodic maintenance, and security testing regularly and periodically, either by consulting the relevant field or using a guide (like Acunetix, CEH, OWASP).
Analisa Pemakaian IPv6 di Indonesia Daniel Satriautama; Justinus Andjarwirawan; Agustinus Noertjahyana
Jurnal Infra Vol 3, No 2 (2015)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of the Internet has been growing rapidly. Almost all mobile devices using the internet as a means of communication. The Internet addressing which is still widely used is based Internet Protocol version 4 (IPv4). Since version 4 has almost run out of addresses it is time to change to Internet Protocol version 6 (IPv6). Also in 2015 Internet Protocol version 6 (IPv6) began to be held globally, thus making each country must prepare to implement these changes.This analysis aims to show information about Internet Protocol version 6 (IPv6) in Indonesia ranging from information Domain Name Server (DNS), Mail Server, Web site-based addressing and the use of version 6 in Indonesia. This analysis also provides an update in the form of graphs. This analysis also compares results obtained with data from internet. This research also shows charts about development of version 6 addressing from the year 2010 up to March 2015.Based on test results, the results of this analysis is shown in the form of a website which is divided into 3 parts, i.e. Domain Name Server (DNS), Mail Server, Web site. The features of this Website are a list of hosts that use version 6, analysis graphs to a company this list, charts the development of IPv6 chart, automatic ping when the website is opened. Tthere is a website for admins to make it easier to perform the update when needed
Implementasi Sistem Active Directory Untuk Kemudahan Administrasi Laboratorium – Laboratorium Program Studi Teknik Informatika Universitas Kristen Petra Vincentius Aditya Nugraha; Agustinus Noertjahyana; Ibnu Gunawan
Jurnal Infra Vol 2, No 2 (2014)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (826.539 KB)

Abstract

The presence of computer laboratory is really helpful in terms of supporting the learning process in the college scope. But the user of the computer itself tend to irresponsibly making change(s) the computer’s configuration. The configuration made by the laboratory’s assistant itself can sometimes be wrong, making the fix to the configuration itself has to be made on each of the computer.The use of Active Directory can be spread easily via server. The limitations of a user group applied based on its own functions. The users itself get their personal space for storing their data in the server, in which if one user uses another computer in the lab, he / she still can access his / her data. Administration also centered on the server thatfacilitate lab’s assistants on helping their task. The re-installation of the computer’s operating system is made easy by using the remote install hosted by server.The result from the usage of Active Directory system is that it will help the administration tasks done by the lab’s assistants, especially on the limitations that should be applied to the groups of users. Personal storage space in the server also helps the students on the availability of their data, regardless where or which computer they are using.
Pemodelan Arsitektur Teknologi pada Perusahaan Palet PT.X menggunakan Enterprise Architecture Planning Fanny Febriani Santoso; Adi Wibowo; Agustinus Noertjahyana
Jurnal Infra Vol 4, No 1 (2016)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

PT. X is a company engaged in the pallet industry, such as the production of wooden pallets, plastic pallets distribution, ISPM#15 services, and the services of container checkers. Until now, not all business processes are being supported by information systems because there are many business processes being done manually and the existing information systems are not yet integrated. Existing information systems in the company only supports finance and accounting process. Based on this condition, this thesis will analyze and construct enterprise architecture design for PT. X using Enterprise Architecture Planning method. The first stage will be done with business modeling and analysis of business strategy company. After that, the next step is to see the condition of the company's information technology at the moment, the existing problems within the company, and information technology needs in the future. Then from these, the results will be constructed by making design data architecture, application architecture, and technology architecture. Data architecture generates multiple subsystems at the company, such as sub-system of sales, sub-system of purchase, sub-system of production, sub-system of ISPM # 15, sub-system of container checker, sub-system of IT, sub-system HRD, and sub-system of finance and accounting. Application architecture consists of several main and supporting applications, all application are web-based. The main application consists of sales information systems, purchase information systems, production information systems, ISPM#15 information systems, container checker information systems, IT information systems, HRD information systems, and financial and accounting information systems. Technology architecture uses a client/server architecture pattern with data services Service Oriented Architecture (SOA).
Simulasi dan Pembelajaran Routing Protocol dengan Metode EIGRP IPv4 untuk Mahasiswa Berbasis Web Febrianto Halim Hadinoto; Agustinus Noertjahyana; Kristo Radion Purba
Jurnal Infra Vol 6, No 1 (2018)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Students of Informatics need to understand about the parts of the Internet network and within their own Internet network with certain routing protocol methods so that the data packets sent become more clear and the routing protocol can find the lightest route in sending the data packets to the destination address. Routing Protocol itself is a process to determine the fastest path and advantageous location towards the intended search. One of the routing protocols currently used is the EIGRP (Enhanched Interior Gateway Routing Protocol) method not all students understand about this material. With this problem the authors create a website that concerns the EIGRP Routing Protocol.This website serves to help understand the students about Routing Protocol, especially EIGRP. The website has materials, quizzes, and simulators aimed at helping students to deepen how the EIGRP Routing Protocol works.Results resulting from this Website are students can better understand about EIGRP Routing Protocol by implementing simulator on Website. Simulator can check IP, subnet, and AS EIGRP well. Access to search the database on Admin can be in various formats is CSV, Excel, and PDF.
Studi Literatur Perubahan Antara CISSP 10 Domain dengan 8 Domain Michael Perkasa; Agustinus Noertjahyana; Silvia Rostianingsih
Jurnal Infra Vol 4, No 2 (2016)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Degree is one that is being achieved by most people in their work, in order to influence the potential possessed by an employee or the employee. So with the development of technology, people increasingly need a degree or certification in order to hone and enhance its capabilities.With the changes under discussion on the differences of the 10 CISSP domains domain into 8 domains in each domain has the characteristics of each and their respective utility functions. CISSP 8 domain is a new domain that have updated their respective functions and become more efficient because fewer but more focused functions.Therefore, domain 8 is more favored than 10 domain due to factors such support.
Pembuatan Website pada Perusahaan "Sky High Tour & Travel Agency" Machael Cahyadi; Agustinus Noertjahyana; Silvia Rostianingsih
Jurnal Infra Vol 4, No 1 (2016)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (958.979 KB)

Abstract

Sky High Tour & Travel Agency is a tour company and travel agency in the area of South Surabaya, which offers services in the field of Tourism. Sky High Tour & Travel Agency is planning to have a website that can be used as a user friendly, offers package tours & travel, leaving a message / note, and login to the customer so that it can make a reservation (reservation).This website is created by using the programming language PHP and MySQL as data storage / database. Website created based on company needs a way to find information and data through consultation / interview so that it can determine the scope of the company. The scope of the following: the reservation process, sales, login to the customer who registers as a member, leave a note / FAQ that has been provided and a website that is user friendly for customers.The test results of the application shows that these websites can automatically process administrative data directly related to the reservation and sales process. Reports generated applications reached 75% of respondents in accordance with company requirements. The level of accuracy of the information and data reached 100% of respondents. While the benefits of an application to get the 100% of respondents.
Analisa Risiko Kelangsungan Bisnis, Pengawasan dan Evaluasi Teknologi Informasi di PT ABC Raymond Adrian Hardha; Adi Wibowo; Agustinus Noertjahyana
Jurnal Infra Vol 3, No 2 (2015)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (325.966 KB)

Abstract

PT ABC is a company engaged in the production of reinforcedconcrete. In carrying out its business processes, the company isusing the server, network, software, hardware, PC software. Withthe disruption of one of these systems, the data processing will beannoyed at having to manually process data and perform theinput to the database after the system can run normally again.Looking at the situation and condition of PT ABC, did not rule outthe occurrence of risks such as damage to data integrity andcontinuity disruption of business processes.In this thesis conducted a risk analysis of the IT continuity andmonitoring of PT ABC. Risk analysis using the framework of ISO31000, for process analysis and its use COBIT 4.1 controlpractices, and use risk rating methodology (OWASP) forcalculating the value of risk. There are 7 risks found from analysis. One risk that has highseverity is the company did not have those who has responsibilityto monitor irregularities. Two medium risks are the company didnot have business continuity plan, and also a framework to buildthat plan. Four risks with low severity are the company did nothave an offsite backup, did not have a priority plan, no trainingfor employees to upgrade analysis skills, and never update ITcontinuity plan.
Implementasi Pembuatan Distro Linux Untuk Keperluan Laboratorium Informatika Daniel Stevan Sampuno; Agustinus Noertjahyana; Alexander Setiawan
Jurnal Infra Vol 7, No 1 (2019)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (755.462 KB)

Abstract

Sebagai mahasiswa jurusan informatika materi yang akan dipelajari oleh mahasiswa sebagian besar akan dilaksanakan di laboratorium untuk keperluan praktek atau uji coba. Untuk mengakomodasi hal tersebut pihak universitas harus menginstall berbagai macam software yang berhubungan dengan materi yang akan diajarkan kepada mahasiswa. Hal tersebut memakan cukup banyak waktu dan tidak praktis karena semua software yang akan digunakan harus di install secara manual satu per satu. Untuk mengatasi masalah inilah maka distro linux khusus untuk keperluan laboratorium informatika diperlukan.Program berupa distribusi linux yang sudah di isi dengan berbagai macam software dan yang diharapkan akan mampu menunjang proses belajar mengajar di laboratorium informatika.Dari pengerjaan skripsi yang telah dilakukan dapat ditarik kesimpulan bahwa Pembuatan distribusi linux secara khusus sangat membantu dalam membuat sebuah enviroment yang spesifik karena seluruh software yang diperlukan sudah berada didalam satu tempat dan penggunaan linux sebagai operating system utama akan sangat membantu menekan biaya operasi dari sebuah perusahaan atau lembaga karena linux bersifat open source.