Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : INFORMAL: Informatics Journal

ANALISIS KUALITAS SINYAL WIFI PADA UNIVERSITAS MUSLIM INDONESIA Erick Irawadi Alwi
INFORMAL: Informatics Journal Vol 4 No 1 (2019): INFORMAL - Informatics Journal
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v4i1.10153

Abstract

Indonesian Muslim universities utilize WiFi networks as a facility to support the implementation of student and academic lecture activities within the scope of Indonesian Muslim universities. However, with the number of Indonesian Muslim University students around 17,000 people, internet access to the internet network has become slow. In addition, there are several faculties on several floors that do not get wifi signals or get weak signals so students cannot enjoy the internet network. Because it is necessary to measure the signal quality on wireless devices (AP) in each faculty in the scope of UMI with action research methods and analyze the signal quality so that it is known what factors can cause the wifi signal to sometimes be weak or not even get a signal at all
Analisis Keamanan Sistem Informasi Akademik (SIAKAD) Universitas XYZ Menggunakan Metode Vulnerability Assessment Erick Irawadi Alwi; Lutfi Budi Ilmawan
INFORMAL: Informatics Journal Vol 6 No 3 (2021): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v6i3.27053

Abstract

The use of academic information systems (siakad) has become mandatory for universities in providing user convenience in online academic administrative activities. However, sometimes college siakad has security holes that irresponsible people can take advantage of by hacking. This study aims to identify security vulnerabilities at XYZ Siakad University. The method used in this study is a vulnerability assessment method. A university syakad will conduct an initial vulnerability assessment by doing footprinting to get information related to XYZ syakad after that a vulnerability scan is carried out using vulnerability assessment tools to identify vulnerabilities and the level of risk found. Based on the vulnerability of the XYZ university's vulnerabilities, it is quite good, with a high risk level of 1, a medium risk level of 6 and a low risk level of 14. Researchers provide recommendations for improvements related to the findings of security holes in XYZ university Siakad from XSS (Cross Site Scripting) attacks, Clickjacking, Brute Force, Cross-site Request Forgery (CSRF) and Sniffing.
Analisis Keamanan Website Menggunakan Teknik Footprinting dan Vulnerability Scanning erick irawadi alwi; Herdianti Herdianti; Fitriyani Umar
INFORMAL: Informatics Journal Vol 5 No 2 (2020): INFORMAL - Informatics Journal
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v5i2.18941

Abstract

Website security is an effort to protect websites from hacker attacks connected through a network. Website security needs to be a concern in the midst of many cases of website hacking from irresponsible people, including websites at Indonesian tertiary institutions that provide information and services to the public, students, and alumni of tertiary institutions. Higher education institution websites that can be accessed widely online can create vulnerabilities against threats from hacker attacks. To minimize this vulnerability, it is necessary to test the website of the higher education institution to assess and evaluate the security system of the university's website. The research method used in this study is the Ethical Hacking method which focuses on footprinting techniques and vulnerability scanning by only testing passive attacks. The results of this study have found information related to the target website (the website of an educational institution in one of the cities in Indonesia) and several vulnerability alerts after testing vulnerability scanning with high to low risk levels so that researchers recommend improving vulnerability to minimize security holes exploited by hackers .
Penerapan dan Analisis Network Security Snort Menggunakan Intrusion Detection System pada Serangan UDP Flood Karina Fitriwulandari Ilham Ilham; Erick Irawadi Alwi; Farniwati Fattah
INFORMAL: Informatics Journal Vol 8 No 1 (2023): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v8i1.34003

Abstract

The web server is one type of server that was most frequently attacked because the web server is the most vital means for storing databases. The most frequently used attack is Denial of Service (DoS). DoS is an attack technique against a system by consuming data resources from a server so that the server cannot be accessed again. Therefore, this study aims to design a network security system by implementing an Intrusion Detection System (IDS) using the Snort application as a detection system in the event of a DoS attack on the web server. by implementing Snort on a web server will help network administrators to ensure that the web server is protected from various threats. The results of this study indicates that the Snort rule that has been created has been successfully detecting attacks that have been tested through the LOIC tools.