Claim Missing Document
Check
Articles

Found 13 Documents
Search

Analisa Serangan Vulnerabilities Terhadap Server Selama Periode WFH di Masa Pandemi Covid-19 Sebagai Prosedur Mitigasi Kotim Subandi; Victor Ilyas Sugara
Prosiding Semnastek PROSIDING SEMNASTEK 2021
Publisher : Universitas Muhammadiyah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Semenjak terjadi Pandemi covid-19 Perusahaan yang berak dibidang retail sempat mengalami keterpurukan dampak dari peraturan pemerintan seperti PSBB(Peraturan Sosial berskala Besar )sehingga seluru aktifitas dilakukan dari rumah atau Work From Home (WFH). Untuk menunjang kegiatan dari perusahaan/instansi yang mempunyai berbagai macam sistem informasi dalam menjalankan kegiatan usaha dan operasionalnya. Sever ini menjadi salah satu yang paling penting di Perusahaan Retail. Pembukaan beberapa akses dari jaringan umum (internet) menuju ke Local Area Network (LAN). Keamanan jaringan LAN yang diakses dari jaringan umum biasanya merupakan masalah dari seorang administrator. Seringkali masalah keamanan baik jaringan dan seluruh sistem aplikasi maupun web server terabaikan hanya untuk memenuhi kegiatan operational berjalan lancar pengamanan baru disadari setelah terjadi bencana. Tanpa adanya pengamanan jaringan dan sistem aplikasi yang baik, penerapan teknologi secangih apapun akan sangat membahayakan perusahaan ,institusi atau organisasi itu sendiri. Maka dibutuhkan Analisa keamanan seluruh aktifitas ke dalam LAN, server ,perangkat lain untuk mencegah terjadinya Mitigasi serta untuk lebih mewaspadai keamanan server dari serangan Vulnarebilities. Berdasarkan latar belakang permasalahan yang ada, maka dibutuhkan analisa dengan menggunakan metode penetration testing. Sebagai bahan pendukung penelitian ini juga menggunakan pedoman dari modul CEH (Certified Ethical Hacker) dan web resmi Acunetix. Pengujian penelitian ini adalah bertujuan untuk menemukan kelemahan server milik perusahaan/instasi yang ada. Permasalahan yang ditemukan setelah dilakukan pengujian, antara lain: kelemahan berhasil ditemukan cukup banyak dimana setiap kelemahan ini mempunyai penanganan yang berbeda, port yang seharusnya diblokir tapi dibuka secara bebas, dan IP public yang kurang penting sebaiknya ditutup aksesnya. Solusi yang disampaikan untuk mengangulangi permasalahan tersebut antara lain: Pemakaian standar Acunetix ini dapat dipertahankan dan dilanjutkan, pengujian jauh lebih baik bila dilakukan lebih dari 2 kali, melakukan upgrade SNMP yang lebih baru secara berkala, melakukan filter port yang rentan, meningkatkan tingkat keamanan server, migrasi antivirus yang berkualitas, upgrade sistem operasi yang sudah expired.
Weather Forcast Optimization Using Learning Vector Quantization Methods with Genetic Algorithms Siska Andriani; Kotim Subandi
Journal of Applied Sciences and Advanced Technology Vol 3, No 2 (2020): Journal of Applied Sciences and Advanced Technology
Publisher : Faculty of Engineering Universitas Muhammadiyah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24853/jasat.3.2.45-50

Abstract

Weather forecasting is one of the important factors in daily life, as it can affect the activities carried out by the community. The study was conducted to optimize weather forecasts using artificial neural network methods. The artificial neural network used is a learning vector quantization (LVQ) methods and genetics algorithms (GA). BMKG weather data was originally modeled using the LVQ method, then also created the LVQ Method Optimization weather forecast model using GA. Data attributes consist of numeric and categoric. Numeric attributes as input parameters are: temperature, evaporation, sunlight, humidity and rainvol. While the categorical attributes are ourput from weather forecasts include: Cloudly (C), Partly Cloudly (PC), Sunny (S), Rain (R) and Cloudly rain (CR). Sample data used is 1096 data. Both models were tested so that they obtained 72% accuracy results for weather forecast models using the LVQ method and 73% of the weather forecast accuracy results that were optimized using GA. The results have not achieved the most optimal results because it turns out that citeko region weather data is not suitable for use in both methods. Because the data has an imbalance in the amount of data per class.
Environmental Burden Computation in White Crystal Sugar Industry using the Life Cycle Assessment Methods Hermawan Hermawan; Yulian Syahputri; Kotim Subandi; Adriana Sari Aryani
Journal of Applied Sciences and Advanced Technology Vol 3, No 2 (2020): Journal of Applied Sciences and Advanced Technology
Publisher : Faculty of Engineering Universitas Muhammadiyah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24853/jasat.3.2.35-44

Abstract

Life Cycle Assessment (LCA) is used to assess environmental impacts that can potentially result from an industrial activity, from cradle to grave. LCA assessment in accordance with the principles of ISO 14040 is carried out starting from the stage of determining the scope, collecting data, preparing the Life Cycle Inventory (LCI), formulating the Life Cycle Impact Assessment (LCIA), interpretation and presentation. At the LCI stage, data from a sugar factory studied is collected from the results of material balance analysis, exhaust gas analysis, liquid waste analysis, and solid waste calculations for the 2019 period. Life Cycle Impact Assessment characterizes each LCI data towards potential environmental impacts that are make it possible. Characterization was carried out by grouping the impacts on Energy Depletion Potential (EDP), global warming (GWP), Eco toxicity aquatic (ETA), terrestrial Eco toxicity (ETT), Abiotic Depletion Potential (ADP), Photochemical Oxydant Formation (POF), Acidification Potential (ACP) , Human Toxicity Potential (HTP), Nutrification Potential (NTP), Ozone Depletion Potential (ODP). The fourth largest contribution to the environmental burden of sugar factories based on 2019 data is GWP 375,966.95 tons of CO2 equivalent, followed by ACP 89,183.03 tons equivalent to NOx, EDP worth 33,086.91 tons of fuel oil equivalent, and NTP of 14,598.66 tons equivalent to COD . In addition, it also needs attention, namely HTP 11,621.83 tonnes equivalent to phenol, ETA 11,163.18 tonnes equivalent to BOD5, and ETT 9,748.49 tonnes equivalent to ash.
Analysis and Implementation of Backup Line Network Using Branch Office VPN and Speedy Internet Broadband Kotim Subandi; Adriana Sari Aryani
Journal of Applied Sciences and Advanced Technology Vol 1, No 2 (2018): Journal of Applied Sciences and Advanced Technology
Publisher : Faculty of Engineering Universitas Muhammadiyah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (798.71 KB) | DOI: 10.24853/jasat.1.2.39-48

Abstract

The purpose of this research is to build computer network infrastructure that connects between head office and branch office (Site), so that all network connection performance can be upgraded to help and support the company's business objectives. In order for these needs can be met well and can overcome the problems of technology failure when communication and information exchange is underway, the technology will be used is a connection that can always be online with the aim that quality in service approaching 100% (service excellent). Network Infrastructure to be implemented is to use two lines of connection, the first is to use Telkom Metro Ethernet, and the second connection Branch Office VPN by using internet line broadband speedy from Telkom, if one of the connection down then the other connection as a backup, and if both connections are in stable and good condition, it can be ascertained both connections can serve conveying data simultaneously. Which is used to set the two connections in the topology holder built head office with Head Office(Site)is Cisco Router
Value Chain Analysis Indonesian Animal Husbandry Industry Kotim Subandi; Hermawan Hermawan; Adriana Sari Aryani
Journal of Applied Sciences and Advanced Technology Vol 2, No 1 (2019): Journal of Applied Sciences and Advanced Technology
Publisher : Faculty of Engineering Universitas Muhammadiyah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3778.56 KB) | DOI: 10.24853/jasat.2.1.21-28

Abstract

At least until 2017, a very low production capacity coupled with livestock methods that are still traditional causes almost all major livestock commodities in Indonesia to close their deficits through imports. Meat, milk, eggs, and even the skin, all of them still cannot be fulfilled entirely from the country.As much as 83% of raw material for the dairy industry is imported. Leather processing industry, importing raw materials for cow leather by 3 million pieces and 13.5 million pieces (sheep and goat skin). Specifically for beef, it was noted that 2016 was the highest volume of beef imports reaching 132.74 thousand tons. As for eggs in general, the pattern of development of export volume is lower than the rate of imports per year. Data on chicken meat imports and their values during the 2012-2016 period showed quite high values compared to export volumes. Knowledge of industry value chains is needed to explore the gap in the dependence of imported raw materials.The value chain analysis carried out in the livestock base industry chain shows a map of the relationship between a number of livestock industry bases in Indonesia so as to facilitate the breakdown of dependence on raw materials. Analysis carried out on the main chain (livestock base) and joint chain (supporting base). Five farm-based industry value chains have been assembled, namely: 1) beef-cattle base industry; 2) industrial livestock-poultry meat base; 3) dairy-based livestock industry; 4) leather-based industry base; and 5) egg-based livestock industry. Core industries or prime movers namely: a) RPH on beef chains, b) industrial pasteurization in the milk chain; c) tanning industry on leather chains; d) food freezing industry on chicken meat chains; and e) egg packing house on the egg chain. The existence of the core industry greatly determines the position of the raw materials of the downstream industry.
Analisis Serangan Vulnerabilities Terhadap Server Selama Work from Home saat Pandemi Covid-19 sebagai Prosedur Mitigasi Kotim Subandi; Victor Ilyas Sugara
Jurnal Asiimetrik: Jurnal Ilmiah Rekayasa & Inovasi Volume 4 Nomor 2 Tahun 2022
Publisher : Fakultas Teknik Universitas Pancasila

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35814/asiimetrik.v4i1.3127

Abstract

Since the COVID-19 Pandemic occurred, companies engaged in the retail sector have experienced a decline in the impact of government regulations such as PSBB (Large-Scale Social Restrictions) so that all activities were carried out from home or Work from Home (WFH). to assist companies or agencies with various types of information systems in carrying out their business activities and operations This server is one of the most important in the retail company. The opening of several accesses from the public network (internet) to the local area network (LAN) The security of a LAN network that is accessed from a public network is usually an administrator's problem. Often, the security problems of both the network and the entire application system, as well as the web server, are neglected just to ensure that operational activities run smoothly, and security is only realised after a disaster occurs. Without a good network security and application system, the application of any sophisticated technology will be very dangerous for the company, institution, or organisation itself. So, it takes a security analysis of all activities on the LAN, servers, and other devices to prevent mitigation and to be more aware of server security vulnerabilities. Based on the context of the existing issues, a penetration testing analysis is required. As supporting material, this research also uses guidelines from the CEH (Certified Ethical Hacker) module and the official Acunetix website. The test of this research is aimed at finding the weaknesses of the existing company/institution servers. Among others, quite a lot of weaknesses were found, where each of these weaknesses has a different handling, ports that should be blocked but are opened freely, and access to public IPs that are less important should be closed. The solutions proposed to overcome these problems include: the use of this Acunetix standard can be maintained and continued; testing is much better if carried out more than two times; periodically upgrading SNMP (Simple Network Management Protocol) vulnerable; increasing the level of server security; migration of quality antivirus; and upgrade of expired operating systems.
Weather Forecast using Learning Vector Quantization Methods Siska Andriani; Kotim Subandi
Procedia of Social Sciences and Humanities Vol. 1 (2021): Proceedings of the 2nd International Conference On Intelectuals Global Responsibility
Publisher : Universitas Muhammadiyah Sidoarjo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21070/pssh.v1i.22

Abstract

Weather forecasting is one of the important factors in daily life, as it can affect the activities carried out by the community. The study was conducted to optimize weather forecasts using artificial neural network methods. The artificial neural network used is a learning vector quantization (LVQ) method, in which artificial neural networks based on previous research are suitable for prediction. The research is modeling weather forecast optimization using the LVQ method. Models with the best accuracy can be used in terms of weather forecasts. Based on the results of the training that has been done in this study produces the best accuracy on the LVQ method which is to produce 72%.
PENINGKATAN KEAMANAN PADA SIMPLE NETWORK TIME PROTOCOL(SNTP) UNTUK MENDITEKSI CYBER CRIME DI DALAM AKTIFITAS JARINGAN Kotim Subandi; Victor Ilyas Sugara; Adriana Sari Aryani
Prosiding Semnastek PROSIDING SEMNASTEK 2022
Publisher : Universitas Muhammadiyah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Di era sekarang ini teknologi informasi dan komputasi telah berkembang pesat sehingga kejahatan dunia maya meningkat secara drastis karena pandemi, penjahat dunia maya kini juga menargetkan orang, bukan hanya sistem. Modus kejahatan di dunia maya saat ini sangat beragam. Cara yang digunakan oleh penyerang  semakin beragam dan kompleks. Dengan mengimplementasi antivirus client server bertujuan melakukan scan di setiap client yang sudah terhubung jaringan local secara real time maupun terpusat juga mengupdate secara terpusat pula, serta mendeteksi jenis serangan yang sering terdapat system jaringan serta medeteksi jenis serangan yang sering terdapat system jaringan dan meberikan proteksi seluruh komputer client dari segala serangan (malware, virus, worm, Trojan) yang terdapat pada jaringan.Sebagai upaya meningkatan keamanan  dijaringan perusahaan dan mermerikan kenyaman disaat melaukan aktivitas  komunikasi di jaringan Internet, peneliti melakukan migrasi software sophos  ke trend Micro. Hasil log dari scanning antivirus dengan menggunakan Trend Micro, Risk Level High, action yang harus dilakukan segera Blocked
Desain Canva Sebagai Media Promosi Usaha Mikro dan Media Informasi di Desa Bantarsari Gustian Rama Putra; Arie Qurania; Yusma Yanti; Puspa Citra; Syarif Hidayatullah; Hermawan Hermawan; Victor Ilyas Sugara; Asep Saepulrohman; Agung Prajuhana Putra; Kotim Subandi; Adriana Sari Aryani; I Wayan Sriyasa
Journal of Engineering and Information Technology for Community Service Vol 1, No 3 (2023): Volume 1, Issue 3, January 2023
Publisher : Universitas Teknokrat Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33365/jeit-cs.v1i3.210

Abstract

Digital information media in this era has very good potential, especially in developing micro-businesses to introduce their products, besides that information media is also needed to provide education and information to socialize, this is very necessary for the government in the district to develop village results and information that can be conveyed clearly to the community. Community service carried out by the Computer Science Study Program of Pakuan University aims to provide training to village office staff and junior and senior high school students in Bantarsari Village to be able to apply Canva as a medium for promoting micro-business and related information media, socialization, disaster prevention, appeals and other notifications in Bantarsari Village
Peningkatan Keamanan pada Simple Network Time Protocol (SNTP) untuk Mendeteksi Cybercrime di dalam Aktivitas Jaringan Kotim Subandi; Victor Ilyas Sugara; Adriana Sari Aryani
Jurnal Asiimetrik: Jurnal Ilmiah Rekayasa dan Inovasi Volume 5 Nomor 1 Tahun 2023
Publisher : Fakultas Teknik Universitas Pancasila

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35814/asiimetrik.v5i1.4113

Abstract

Today's cybercrime methods are extremely diverse. The methods employed by attackers are becoming more diverse and intricate. Malicious software, commonly referred to as malware, is utilized in these various attacks. Malware threats and their propagation can be accomplished in several different ways. Good governance facilitates prevention via migration, assisting the security team and network infrastructure IT. This paper discusses efforts to enhance the security of the Simple Network Time Protocol (SNTP) to detect cybercrime on the network. Based on the results of the conducted experiments, we determined that by updating the Simple Network Time Protocol, implementing the client-server antivirus, and scanning every client connected to the local network or centrally, we could detect the types of attacks that frequently occur on the network system, thereby protecting all client computers from malware, viruses, worms, and Trojan horses. Based on the antivirus migration data, the employed research method can find information on cybercrimes that involve malware that enters the network and is successfully cleaned or quarantined before being automatically blocked.