Claim Missing Document
Check
Articles

Found 5 Documents
Search

Kontribusi Perempuan Penjual Kuliner Dalam Pengembangan Wisata Argo Wijil Febriana, Alma; Prabintari, Silvia Arnita; Diantama, Anggi; Novianto, Dian; Lestari, Rosalia Widhiastuti Sri
Journal of Society Bridge Vol. 2 No. 1 (2024): Society Bridge
Publisher : Badan Koordinasi Kegiatan Kesejahteraan Sosial

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59012/jsb.v2i1.27

Abstract

Berkembangnya wisata Pasar Argo Wijil ini didukung oleh usaha kuliner lokal yang dijalankan oleh perempuan. Peran perempuan dalam sektor ekonomi khususnya kuliner tradisional sangat dominan. Perempuan pedagang kuliner di Pasar Argo Wijil, sebagai sarana bagi perempuan untuk berjualan. Kuliner wisata ini mendorong citra kawasan ini sebagai salah satu tujuan wisata di Gunungkidul. Melalui penelitian ini mengkaji tentang kontribusi perempuan pedagang kuliner dalam pengembangan wisata Argo Wijil. Penelitian ini menyoroti peran penting perempuan dalam industri kuliner. Penelitian ini dilakukan bulan Agustus 2023 dengan mengumpulkan data dengan wawancara mendalam, observasi dan pengumpulan dokumen. Untuk mengecek data yang ada, peneliti menggunakan triangulasi data yakni membandingkan data-data yang telah dikumpulkan. Melalui wawancara mendalam dijelaskan bagaimana perempuan pedagang kuliner dapat mempromosikan kuliner lokal dan sejarah Argo Wijil melalui branding yang efektif. Kontribusi perempuan dalam menjaga kekayaan kuliner tradisional dan identitas budaya di daerah ini sangat signifikan.
Implementation of a Network Security System Using the Simple Port Knocking Method on a Mikrotik-Based Router Novianto, Dian; Tommy , Lukas; Japriadi, Yohanes Setiawan
Jurnal Komputer, Informasi dan Teknologi Vol. 1 No. 2 (2021): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v1i2.375

Abstract

One of the problems in remote access to the system is the act of hacking to illegally gain access rights to a system. Therefore the need for an additional mechanism in user authentication in addition to the username and password parameters. The port knocking method is an option that can be implemented in this problem. Port knocking is a security system that functions to open or close access to certain ports by using a firewall on network devices by sending certain packets or connections. The connection used can be in the form of TCP, UDP, or ICMP protocols. The network system development method used in this research is the PPDIOO method developed by CISCO, where the cycle sequence includes: . prepare (preparation), Plan (planning), Design (Design), Implement (Implementation), Operate (Operation) and Optimize (Optimization). The result of implementing the Port Knocking method on a system on a computer network is that the system will refuse if the login activity on the system does not or sends additional parameters incorrectly, besides that the network admin can find out the activity on the network system if someone from outside fails when accessing the system through the port. so that actions can be taken according to system security requirements.
Mitigasi Serangan DNS Cache Poisoning Pada Local Area Network Berbasis Routerboard Mikrotik Novianto, Dian; Tommy, Lukas; Japriadi, Yohanes Setiawan; Sujono
Jurnal Ilmiah Informatika Global Vol. 15 No. 3: Desember 2024
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v15i3.4816

Abstract

Domain Name System (DNS) enables users to access websites via domain names, offering convenient navigation. However, criminals can exploit this convenience to redirect connections from user devices to fake servers for a variety of purposes. A form of attack known as DNS cache poisoning exploits vulnerabilities in the Domain Name System (DNS) to redirect connections from a legitimate website address to an illegitimate one. As a consequence of the fact that users of networked systems are typically unaware that they are accessing an illegitimate site, this attack can have a particularly damaging impact. Such incidents can give rise to several issues, including the theft of data, the distribution of malware, and other security threats. To address this issue, this study employs a firewall in conjunction with DoH (DNS over HTTPS) and the utilization of registered certificates. The Domain Name System over HTTPS (DoH) protocol encrypts DNS requests and responses, preventing third parties (such as attackers who manipulate DNS) from reading or modifying DNS requests. The data employed in this study is derived from a review of existing literature. Furthermore, this study employs the PPDIOO model (Preparation, Planning, Design, Implementation, Operation, and Optimization) for the development of the network. Furthermore, the Mikrotik RB951ui-2Hnd routerboard is employed in this study. The outcome is the implementation of a multifaceted security strategy that effectively mitigates DNS cache poisoning attacks by 100%, while simultaneously reducing CPU usage to 11.5%. This approach enhances the security and reliability of user search activities on the internet.
SHARK SPECIES COMPOSITION AND DISTRIBUTION OF FISHING GROUND BASED ON FISHING GEAR IN CILACAP OCEAN FISHERY PORT Novianto, Dian; Widiarto, Santoso Budi; Muslim, Anhar; Aji, Miftah Wahyu Purnomo; Prakoso, Kukuh
Saintek Perikanan : Indonesian Journal of Fisheries Science and Technology Vol 20, No 4 (2024): SAINTEK PERIKANAN
Publisher : Fakultas Perikanan dan Ilmu Kelautan, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/ijfst.20.4.197-206

Abstract

This study focuses on shark species composition, fishing techniques, and geographical distribution in the South Java Waters of Cilacap Ocean Fishing Port (COFP) during 2023. From the data collected, 18 shark species from 8 families were landed, with Alopias superciliosus as the dominant species (29%), followed by Carcharhinus falciformis (25%), and Alopias pelagicus (18%). Shark fishing was conducted with various gears such as tuna longline, drift longline, longline, drift gillnet, and bottom gillnet, with drift longline being the most effective gear with the largest contribution to the catch. Most of the sharks caught were categorized as endangered (EN) and vulnerable (VU) based on the IUCN conservation list, and listed in Appendix II of CITES. The results show that the geographic distribution of shark fishing grounds covers a wide area from the coast to the Indian Ocean, with high concentrations in the waters around Kebumen to the south of Yogyakarta. Fishing activities often overlap between fishing gears, increasing the risk of overfishing. Length distributions and maturity rates of sharks also indicate that many mating-ready adults are being caught, threatening slow population regeneration. To ensure the sustainability of shark populations and maintain the balance of marine ecosystems, a holistic and data-driven management strategy is needed. This includes strengthening regulations, raising public awareness through conservation education, and developing collaborative approaches involving fishers, government, and conservation organizations. Consistent law enforcement is also key in minimizing violations and ensuring the sustainability of shark fisheries in Indonesia.
IMPLEMENTASI VIRTUAL PRIVATE NETWORK MENGGUNAKAN SSTP UNTUK KEAMANAN AKSES KE NETWORK ATTACHED STORAGE SERVER Novianto, Dian; Japriadi, Yohanes Setiawan; Tommy, Lukas; Sujono, Sujono
JUSIM (Jurnal Sistem Informasi Musirawas) Vol 10 No 1 (2025): JUSIM : Jurnal Sistem Informasi Musi Rawas JUNI
Publisher : LPPM UNIVERSITAS BINA INSAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32767/jusim.v10i1.2644

Abstract

Ensuring the integrity of access to Network Attached Storage (NAS) Servers constitutes a significant concern in the context of implementing centralized storage within an organization's business processes. Data leakage problems can arise in the absence of adequate Server access security measures. One solution that can be applied to this problem is the use of a Virtual Private Network (VPN) with the Secure Socket Tunneling Protocol (SSTP) protocol. The SSTP (Secure Sockets Layer/Transport Layer Security) protocol utilizes encryption techniques based on SSL/TLS, thereby enhancing the security of data transmitted over public networks. The system development method employed in this study is PPDIOO, which comprises the preparation, planning, design, implementation, operation, and optimization stages. The present study utilizes TrueNas Core as the software to operate the NAS Server, and MikroTik Routerboard RB951-2HND as the router that will function as a VPN Server. The experimental results demonstrate that SSTP is capable of establishing a secure and encrypted connection, as well as enhancing access control to the NAS. The implementation of SSTP VPN by organizations ensures that only authenticated users can access the NAS, thereby reducing the risk of data leakage and cyberattacks.