Claim Missing Document
Check
Articles

Found 10 Documents
Search

Kontribusi Perempuan Penjual Kuliner Dalam Pengembangan Wisata Argo Wijil Febriana, Alma; Prabintari, Silvia Arnita; Diantama, Anggi; Novianto, Dian; Lestari, Rosalia Widhiastuti Sri
Journal of Society Bridge Vol. 2 No. 1 (2024): Society Bridge
Publisher : Badan Koordinasi Kegiatan Kesejahteraan Sosial

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59012/jsb.v2i1.27

Abstract

Berkembangnya wisata Pasar Argo Wijil ini didukung oleh usaha kuliner lokal yang dijalankan oleh perempuan. Peran perempuan dalam sektor ekonomi khususnya kuliner tradisional sangat dominan. Perempuan pedagang kuliner di Pasar Argo Wijil, sebagai sarana bagi perempuan untuk berjualan. Kuliner wisata ini mendorong citra kawasan ini sebagai salah satu tujuan wisata di Gunungkidul. Melalui penelitian ini mengkaji tentang kontribusi perempuan pedagang kuliner dalam pengembangan wisata Argo Wijil. Penelitian ini menyoroti peran penting perempuan dalam industri kuliner. Penelitian ini dilakukan bulan Agustus 2023 dengan mengumpulkan data dengan wawancara mendalam, observasi dan pengumpulan dokumen. Untuk mengecek data yang ada, peneliti menggunakan triangulasi data yakni membandingkan data-data yang telah dikumpulkan. Melalui wawancara mendalam dijelaskan bagaimana perempuan pedagang kuliner dapat mempromosikan kuliner lokal dan sejarah Argo Wijil melalui branding yang efektif. Kontribusi perempuan dalam menjaga kekayaan kuliner tradisional dan identitas budaya di daerah ini sangat signifikan.
Implementation of a Network Security System Using the Simple Port Knocking Method on a Mikrotik-Based Router Novianto, Dian; Tommy , Lukas; Japriadi, Yohanes Setiawan
Jurnal Komputer, Informasi dan Teknologi Vol. 1 No. 2 (2021): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v1i2.375

Abstract

One of the problems in remote access to the system is the act of hacking to illegally gain access rights to a system. Therefore the need for an additional mechanism in user authentication in addition to the username and password parameters. The port knocking method is an option that can be implemented in this problem. Port knocking is a security system that functions to open or close access to certain ports by using a firewall on network devices by sending certain packets or connections. The connection used can be in the form of TCP, UDP, or ICMP protocols. The network system development method used in this research is the PPDIOO method developed by CISCO, where the cycle sequence includes: . prepare (preparation), Plan (planning), Design (Design), Implement (Implementation), Operate (Operation) and Optimize (Optimization). The result of implementing the Port Knocking method on a system on a computer network is that the system will refuse if the login activity on the system does not or sends additional parameters incorrectly, besides that the network admin can find out the activity on the network system if someone from outside fails when accessing the system through the port. so that actions can be taken according to system security requirements.
Mitigasi Serangan DNS Cache Poisoning Pada Local Area Network Berbasis Routerboard Mikrotik Novianto, Dian; Tommy, Lukas; Japriadi, Yohanes Setiawan; Sujono
Jurnal Ilmiah Informatika Global Vol. 15 No. 3: Desember 2024
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v15i3.4816

Abstract

Domain Name System (DNS) enables users to access websites via domain names, offering convenient navigation. However, criminals can exploit this convenience to redirect connections from user devices to fake servers for a variety of purposes. A form of attack known as DNS cache poisoning exploits vulnerabilities in the Domain Name System (DNS) to redirect connections from a legitimate website address to an illegitimate one. As a consequence of the fact that users of networked systems are typically unaware that they are accessing an illegitimate site, this attack can have a particularly damaging impact. Such incidents can give rise to several issues, including the theft of data, the distribution of malware, and other security threats. To address this issue, this study employs a firewall in conjunction with DoH (DNS over HTTPS) and the utilization of registered certificates. The Domain Name System over HTTPS (DoH) protocol encrypts DNS requests and responses, preventing third parties (such as attackers who manipulate DNS) from reading or modifying DNS requests. The data employed in this study is derived from a review of existing literature. Furthermore, this study employs the PPDIOO model (Preparation, Planning, Design, Implementation, Operation, and Optimization) for the development of the network. Furthermore, the Mikrotik RB951ui-2Hnd routerboard is employed in this study. The outcome is the implementation of a multifaceted security strategy that effectively mitigates DNS cache poisoning attacks by 100%, while simultaneously reducing CPU usage to 11.5%. This approach enhances the security and reliability of user search activities on the internet.
SHARK SPECIES COMPOSITION AND DISTRIBUTION OF FISHING GROUND BASED ON FISHING GEAR IN CILACAP OCEAN FISHERY PORT Novianto, Dian; Widiarto, Santoso Budi; Muslim, Anhar; Aji, Miftah Wahyu Purnomo; Prakoso, Kukuh
Saintek Perikanan : Indonesian Journal of Fisheries Science and Technology Vol 20, No 4 (2024): SAINTEK PERIKANAN
Publisher : Fakultas Perikanan dan Ilmu Kelautan, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/ijfst.20.4.197-206

Abstract

This study focuses on shark species composition, fishing techniques, and geographical distribution in the South Java Waters of Cilacap Ocean Fishing Port (COFP) during 2023. From the data collected, 18 shark species from 8 families were landed, with Alopias superciliosus as the dominant species (29%), followed by Carcharhinus falciformis (25%), and Alopias pelagicus (18%). Shark fishing was conducted with various gears such as tuna longline, drift longline, longline, drift gillnet, and bottom gillnet, with drift longline being the most effective gear with the largest contribution to the catch. Most of the sharks caught were categorized as endangered (EN) and vulnerable (VU) based on the IUCN conservation list, and listed in Appendix II of CITES. The results show that the geographic distribution of shark fishing grounds covers a wide area from the coast to the Indian Ocean, with high concentrations in the waters around Kebumen to the south of Yogyakarta. Fishing activities often overlap between fishing gears, increasing the risk of overfishing. Length distributions and maturity rates of sharks also indicate that many mating-ready adults are being caught, threatening slow population regeneration. To ensure the sustainability of shark populations and maintain the balance of marine ecosystems, a holistic and data-driven management strategy is needed. This includes strengthening regulations, raising public awareness through conservation education, and developing collaborative approaches involving fishers, government, and conservation organizations. Consistent law enforcement is also key in minimizing violations and ensuring the sustainability of shark fisheries in Indonesia.
IMPLEMENTASI VIRTUAL PRIVATE NETWORK MENGGUNAKAN SSTP UNTUK KEAMANAN AKSES KE NETWORK ATTACHED STORAGE SERVER Novianto, Dian; Japriadi, Yohanes Setiawan; Tommy, Lukas; Sujono, Sujono
JUSIM (Jurnal Sistem Informasi Musirawas) Vol 10 No 1 (2025): JUSIM : Jurnal Sistem Informasi Musi Rawas JUNI
Publisher : LPPM UNIVERSITAS BINA INSAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32767/jusim.v10i1.2644

Abstract

Ensuring the integrity of access to Network Attached Storage (NAS) Servers constitutes a significant concern in the context of implementing centralized storage within an organization's business processes. Data leakage problems can arise in the absence of adequate Server access security measures. One solution that can be applied to this problem is the use of a Virtual Private Network (VPN) with the Secure Socket Tunneling Protocol (SSTP) protocol. The SSTP (Secure Sockets Layer/Transport Layer Security) protocol utilizes encryption techniques based on SSL/TLS, thereby enhancing the security of data transmitted over public networks. The system development method employed in this study is PPDIOO, which comprises the preparation, planning, design, implementation, operation, and optimization stages. The present study utilizes TrueNas Core as the software to operate the NAS Server, and MikroTik Routerboard RB951-2HND as the router that will function as a VPN Server. The experimental results demonstrate that SSTP is capable of establishing a secure and encrypted connection, as well as enhancing access control to the NAS. The implementation of SSTP VPN by organizations ensures that only authenticated users can access the NAS, thereby reducing the risk of data leakage and cyberattacks.
MITIGASI DHCP STARVATION ATTACK PADA ROUTERBOARD MIKROTIK DAN PENGARUHNYA TERHADAP PERFORMANSI Novianto, Dian; Japriadi, Yohanes Setiawan; Tommy, Lukas; Sujono
Jurnal Ilmiah Informatika Global Vol. 15 No. 2: Agustus 2024
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v15i2.3930

Abstract

As people become more dependent on information technology, the need for Internet availability increases. Various types of devices are connected to the network, increasing the convenience of using information technology. However, this convenience can often be disrupted by attacks on the network infrastructure, one of which is a DHCP Starvation attack. The Dynamic Host Configuration Protocol (DHCP) is a client-server-based protocol used to automatically assign or obtain IP addresses for client computers or other network devices. Mitigating DHCP Starvation attacks is one form of protection for users. The impact of this attack is that the attacker can become one of the hosts on the network and perform a man-in-the-middle attack, so the impact of information leakage can occur. In addition, it is necessary to know the impact on router resources when a DHCP Starvation attack occurs, so that network managers can calculate how much resources are needed. The author uses a Filtering method based on Mac address es, ARP, and alerts on the Mikrotik router. In addition, the PPDIOO method is also used to develop this system, which consists of preparation, planning, design, Implementation, operation, and optimization. The test results showed that the application of this Filtering method proved to be very effective in preventing DHCP Starvation attacks, and the router board resources were not significantly affected when this Filtering method was applied.
PENGEMBANGAN KEMAMPUAN MAHASISWA WILAYAH BANGKA BELITUNG DALAM MEMBUAT WEBSITE DENGAN WORDPRESS Tommy, Lukas; Novianto, Dian; Japriadi, Yohanes Setiawan; Sujono; Wijaya, Benny; Brotosaputro, Goenawan
Jurnal Pengabdian Masyarakat Berbasis Teknologi Vol 6 No 02 (2025): Volume 6, Nomor 2, Oktober 2025
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Kemampuan membuat website sangat dibutuhkan di industri teknologi untuk profesi front-end, back-end, ataupun full-stack developer. Kemampuan membuat website sebagian mahasiswa Fakultas Teknologi Informasi Bangka Belitung masih kurang baik karena materi yang diajarkan di kelas biasanya hanya berfokus kepada konsep dasar tanpa praktik langsung dalam proyek nyata yang lebih kompleks. Tim Pengabdian kepada Masyarakat akan menyelenggarakan pelatihan membuat website yang memanfaatkan sistem manajemen konten WordPress sebagai alat dalam membuat dan mengelola website agar pengembang tidak perlu memulai dari nol dan memiliki kemampuan pemrograman yang mumpuni. Selain itu, diajarkan juga cara membuat plugin untuk operasi tambah, baca, ubah, dan hapus data serta cara meng-hosting project web di penyedia layanan domain dan hosting gratis. Hasil evaluasi menunjukkan bahwa pelaksanaan pelatihan telah berhasil meningkatkan kemampuan peserta dalam membuat situs web, dengan rata-rata peningkatan kemampuan sebesar 9,73%.
PENDAMPINGAN PENGGUNAAN E-VOTING UNTUK MEMILIH FUNGSIONARIS MAJELIS SINODE XXI GPIB Japriadi, Yohanes Setiawan; Helmud, Ellya; Tommy, Lukas; Novianto, Dian; Thian, Franli Chandra; Aprilia, Cindy
Jurnal Pengabdian Masyarakat Berbasis Teknologi Vol 3 No 1 (2022): Volume 3, Nomor 1, Mei 2022
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/abdimastek.v3i1.1379

Abstract

GPIB setiap 5 tahun mengadakan persidangan sinode untuk memilih fungsionaris Majelis Sinode. Pemilihan fungsionaris Majelis Sinode XXI GPIB di tahun 2021 akan dilaksanakan secara daring dikarenakan pandemi Covid-19 dan efisiensi biaya. Sebelum pendampingan ini dilaksanakan, telah dikembangkan sebuah aplikasi e-voting untuk mendukung pelaksanaan pemilihan tersebut. Simulasi penggunaan dari aplikasi tersebut kemudian dilakukan kepada peserta dan panitia pemilihan sebelum pemilihan yang sebenarnya diadakan. Proses pendampingan yang dilakukan meliputi briefing penggunaan aplikasi kepada peserta dan panitia sebelum pemilihan dilakukan dan monitoring saat proses pemilihan berlangsung serta penghapusan data pemilihan setelah pemilihan selesai. Berdasarkan wawancara yang telah dilakukan, diketahui bahwa aplikasi e-voting dapat membuat proses pemilihan menjadi cepat dan meminimalkan biaya yang dikeluarkan serta aman dari resiko penyebaran virus Covid-19. Selain itu, pendampingan yang dilakukan membuat peserta dan panitia pemilihan menjadi lebih terampil dalam menggunakan fitur-fitur yang ada pada aplikasi e-voting sesuai dengan peran masing-masing.
PENINGKATAN KEAHLIAN SISWA DALAM MEMBUAT MEDIA PROMOSI CETAK PRODUK UMKM PADA SMK BAKTI PANGKALPINANG Japriadi, Yohanes Setiawan; Tommy, Lukas; Putra, Rendy Rian Chrisna; Novianto, Dian; Wijaya, Benny; Thian, Franli Chandra; Aprilia, Cindy
Jurnal Pengabdian Masyarakat Berbasis Teknologi Vol 3 No 2 (2022): Volume 3, Nomor 2, November 2022
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/abdimastek.v3i2.1525

Abstract

Pada akhir masa belajar siswa SMK umumnya dilaksanakan Uji Kompetensi Keahlian (UKK) dalam rangka mengukur pencapaian kompetensi dari siswa tersebut. Aspek keahlian yang dinilai pada UKK di SMK Bakti Pangkalpinang meliputi keterampilan siswa dalam membuat media promosi cetak produk UMKM. Tidak menutup kemungkinan terdapat beberapa siswa yang belum mampu mengoperasikan software graphic design secara baik. Untuk mengatasi masalah tersebut, akan dilakukan workshop untuk meningkatkan keterampilan siswa dalam menggunakan software graphic design satu minggu sebelum UKK. Berdasarkan hasil evaluasi, workshop yang telah dilaksanakan mampu meningkatkan keterampilan peserta dalam menggunakan software graphic design secara efektif, yaitu rata-rata sebesar 9,88%. Setelah mengikuti workshop, predikat kompetensi dari 34 peserta didominasi dengan kompeten sebanyak 52,94%, disusul sangat kompeten sebanyak 41,18%, dan cukup kompeten sebanyak 5,88%
KEGIATAN PELATIHAN PENGUATAN MATERI JARINGAN KOMPUTER UNTUK PERSIAPAN UJI KOMPETENSI SISWA SMK N 1 SUNGAILIAT Sujono, Sujono; Japriadi, Yohanes Setiawan; Novianto, Dian; Tommy, Lukas
Jurnal Pengabdian Masyarakat Berbasis Teknologi Vol 4 No 2 (2023): Volume 4, Nomor 2, Oktober 2023
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/abdimastek.v4i2.1988

Abstract

Pada SMK N 1 Sungailiat Bangka Belitung mempunyai beberapa program keahlian salah satunya adalah Teknik Komputer dan Jaringan. Tujuan dari program keahlian Teknik Komputer dan Jaringan adalah siswa diharapkan dapat menginstal perangkat komputer, sistem operasi, dan aplikasi yang dibutuhkan untuk instalasi jaringan Local Area Network maupun Wide Area Network. Untuk mengukur kemampuan siswa yang mengambil program keahlian ini yang telah mengikuti menyelesaikan proses pembelajaran diwajibkan mengikuti Uji Kompentensi Keahlian. Untuk menghadapi ujian tersebut, siswa perlu mendapatkan penguatan materi agar dapat menyelesaikan ujian dengan baik. Untuk pelatihan dilaksanakan selama 2 hari diruang Laboratorium Jaringan SMK N 1 Sungailiat dengan menggunakan metode ceramah, demo, dan praktek langsung. Sebelum pelaksanaan pelatihan dilakukan pre test untuk mengukur sampai sejauh mana kemampuan siswa dalam memahami instalasi software dan jaringan selama menempuh pelajaran disekolah. Hasil dari pelatihan ini menunjukan adanya kemajuan pengetahuan siswa dilihat dari hasil pre test siswa rata-rata 65,62 dan hasil dari post test meningkat menjadi rata-tata 87,32. Artinya kemampuan siswa meningkat rata-rata 34,94 persen.