Claim Missing Document
Check
Articles

Found 22 Documents
Search

Analisis Keamanan Jaringan Pada Jaringan Wireless Dari Serangan Man In The Middle Attack DNS Spoofing Teguh Pangestu; Risko Liza
JITEKH Vol 10 No 2 (2022): September 2022
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jitekh.v10i2.571

Abstract

Currently the use of wireless technology (wireless) is widely used in institutions, companies, schools and so on. Wireless is very useful because it can facilitate human interaction activities in sending data and so on. However, the existence of wireless is not completely safe in carrying out human interaction activities in sending data and so on, one of which is the illegal man in the middle attack DNS spoofing activity. With these illegal activities, a security system is needed which is expected to prevent illegal man in the middle attack DNS spoofing activities. The results of the attack are obtained based on 7 tests by calculating the quality of service (QOS), namely packet loss with the results of attack 1 model 1 with packet loss 0.154%, attack 2 model 1 with packet loss 0.234%, attack 3 model 1 with packet loss 0.291%, attack 1 model 2 with packet loss 0.173%, attack 2 model 2 with packet loss 0.128%, attack 3 model 2 with packet loss 0.028%, attack 4 model 2 with packet loss 0.231%, which means this attack can run well. And the results by utilizing a firewall security system can only prevent it by cutting off communication interactions between the attacker and the victim and the victim and the attacker.
Aplikasi untuk Menghitung Estimasi Biaya Pembuatan Pagar Besi dengan Cepat Sayuti Rahman; Suriati Suriati; Risko Liza; Arnes Sembiring; Muhammad Zen
Prioritas: Jurnal Pengabdian Kepada Masyarakat Vol 4 No 02 (2022): EDISI SEPTEMBER 2022
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/prioritas.v4i02.603

Abstract

Kurangnya lowongan pekerjaan memberi dampak negatif bagi masyarakat Indonesia. Seorang dengan keahlian dan pendidikan rendah akan tersisih dari persaingan untuk mendapatkan pekerjaan yang layak. Tidak sedikit dari mereka mengambil jalan pintas untuk memenuhi kebutuhan hidup. Hal ini mengakibatkan terjadinya pencurian, begal dan sejenisnya. Dampak negatif ini sangat mempengaruhi kehidupan masyarakat dengan berkurangnya rasa aman, terutama di rumah. Demi menjaga keamanan linkungan, masyarakat bahu membahu mengadakan perangkat keamanan seperti satpam dan CCTV. Namun itu belum cukup untuk menghilangkan rasa tidak aman di masyarakat. Banyak masyarakat menambah pagar pada rumah mereka agar merasa lebih aman, sekaligus memberi keindahan. Kebutuhan masyarakat dan pengusaha untuk menghitung estimasi biaya pembuatan pagar sangat dibutuhkan. Oleh karena itu, kami bekerjasama dengan pengusaha untuk membuat form hitung cepat biaya pembutan pagar menggunakan MS Excel. Berdasarkan model dan aplikasi yang dibuat, masyarakat dan pengusaha dapat menghitung estimasi harga dengan cepat dan tepat. Aplikasi ini juga mudah digunakan dan bisa dibuka pada perangkat smart phone.
Rancang Bangun Aplikasi Penjualan Material Bangunan Menggunakan Metode Least Squares Berbasis Android Rizki Ramadhan; Rachmat Aulia; Risko Liza
Hello World Jurnal Ilmu Komputer Vol. 1 No. 3 (2022): Edisi Oktober
Publisher : Ilmu Bersama Center

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56211/helloworld.v1i3.126

Abstract

Perusahan tersebut adalah suatu perusahaan yang bergerak dibidang penjualan material bangunan. Transaksi yang terdapat dalam perusahaan tersebut cukup banyak, sehingga menimbulkan permasalahan tidak singkronnya informasi yang berkaitan dengan stok bahan material. Misalnya terjadinya kekurangan stok bahan material saat proses transaksi penjualan. Hal ini dikarenakan tidak ada sistem untuk membantu perencanaan menyediakan stok material bangunan pada bulan dan tahun berikutnya. Maka dari itu peneliti ingin membangun aplikasi yang dapat menyelesaika masalah pada perusahaan tersebut dengan merancang program yang digunakan untuk memprediksi (meramalkan) terkait penyediaan stok dibulan berikutnya menggunakan metode least squares. Metode least squares adalah salah satu metode pendekatan yang paling penting dalam dunia ke teknikan untuk regresi ataupun pembentukan persamaan dari titik-titik data diskretnya. Keuntungan menggunakan metode least squares dapat melakukan peramalan penjualan di masa mendatang dengan menggunakan data yang ada di masa lampau. Selanjutnya metode ini diharapkan berjalan dengan baik sehingga dapat membantu perusahaan dalam menyediakan stok material dengan tepat tanpa kendala.
Analisis Performa Owncloud Dan Pydio Pada Aplikasi Layanan Cloud Storage Vinsensius Elman Mendrofa; Tommy; Risko Liza
SNASTIKOM Vol. 1 No. 01 (2022): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2022
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (403.969 KB)

Abstract

The comparison analysis of owncloud and pydio performance refers to testing the performance of open sourcecloud storage service applications by identifying the use of resource consumption and technical use of the networkbetween the two cloud services as a benchmark for users and can be used as a basis for selecting cloud storageapplications that meet the criteria for save data. Performance comparison testing is done by uploading a file to acloud service, then resource usage will be monitored using netdata, and for technical network usage it will bemonitored using wireshark. For the results of testing the performance of owncloud and pydio services, in terms ofresource usage and consumption, owncloud is lighter than pydio. On the technical use of the network both havethe same level of criteria. However, for the user interface, pydio has an attractive appearance and is easy to use.
Model Simulasi Smarthome Berbasis Internet of Things dan Cloud Computing Menggunakan Cisco Packet Tracer Tariq Aziz; tengku moh diansyah; Risko Liza
SNASTIKOM Vol. 1 No. 01 (2022): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2022
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (549.669 KB)

Abstract

The development of technology at this time is very high where what we can see and take advantage of is growingrapidly along with the times to meet human needs. One of them is the increasing need for safe and comfortablehome technology. The application of technology in the house can be found in the smarthome concept.Smarthome is a home concept that uses a variety of IoT devices available for use at home to make it smart. Suchdevices include motion detectors, lawn sprinklers, smart doors, and many other IoT devices. Nowadays,simulation has become important in many ways, especially in various studies and studies carried out using thesimulation method as a way to solve problems. Cisco Packet Tracer 7.3 is an application that can help insimulating IoT devices. The results obtained from the smarthome simulation are the concept of house doorsecurity, air conditioning control and automatic fire extinguishing which can run well but the heating elementfor the increase in room temperature is slow.
Simulasi Pengamanan Virtual Server Menggunakan Dionaea Honeypot Dan Tunneling Sebagai Proses Pengamanan Komunikasi Data Nauval Alfarizi; Tengku Mohd Diansyah; Risko Liza
SNASTIKOM Vol. 1 No. 01 (2022): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2022
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (469.632 KB)

Abstract

Cybercrime is carried out to obtain information, where the information obtained is used as a source of data in carrying out an attack. Attacks generally lead to various scopes ranging from physical servers to virtual servers. This research was conducted by the author to be able to carry out the implementation process based on qualitative development of existing technology, namely the design of a virtual server system using Dionaea honeypot and PPTP tunneling in carrying out a form of security for data communication that can cover vulnerabilities to a device on a virtual server. The results of the research that the author conducted showed that there was a difference in each attack test. When an attack attempt is carried out into each port that is not configured on the main service on the virtual server, the results of the attack are that it can detect intruders and vice versa
Rancang Bangun Topologi Mesh Menggunakan Routing OSPF Pada Kantor Pekerjaan Umum Dan Tata Ruang Kota Gunung Sitoli Dedy Rahmat Zalukhu; Suriati Suriati; Risko Liza
Algoritma: Jurnal Ilmu Komputer dan Informatika Vol 6, No 2 (2022): November 2022
Publisher : Universitas Islam Negeri Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30829/algoritma.v6i2.13632

Abstract

Internet technology is a technology that is currently widely used by humans to communicate and send various data over long distances quickly. In the process of sending data and communication on internet technology can not be separated from the path used, the shorter the path used, the faster the data sent, so communication will be easy. A computer network is a collection of a number of devices in the form of computers, hubs, switches, routers and other network devices that are connected to each other using certain communication media. The author designed the PUTR office in Gunungsitoli City to assist the process of work, especially on the network so that every job runs well without any disturbance. In designing this mesh topology the author uses OSPF routing where the results of the test can help in facilitating work that is directly connected to each other.Keywords: Cisco Packet Tracer, Mesh Topology, OSPF Routing
Pemanfaatan Sinyal Ekspansi Radius Berbasis Konektivitas Bluetooth Menggunakan Antenna Eksternal Pada Sistem Pengendalian Pencahayaan Rizky Williyandi; Risko Liza; Suriati Suriati
Algoritma: Jurnal Ilmu Komputer dan Informatika Vol 7, No 1 (2023): April 2023
Publisher : Universitas Islam Negeri Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30829/algoritma.v7i1.15366

Abstract

Control of the lighting system is a form of implementation of a home control system that is categorized into the form of IoT in the lamp category, this system provides convenience to homeowners, namely users to be able to control home lights using an Android smartphone. In designing the system, the author implements the switch on the lamp to be replaced by using a relay device which is controlled via a microcontroller device based on a Bluetooth connection so that it can be connected to an Android smartphone that has been configured in the lighting control program application using Bluetooth. The design is carried out using a qualitative-based development method. The results of this test provide data in the form of each type of antenna such as yagi, parabolic, and helix giving different connectivity test results in tests carried out in open spaces. Keywords: Android, Mikrokontoler, Relay, Bluetooth,Antena
Klasifikasi User Berdasarkan Trafik Http/Https Menggunakan Metode Naïve Bayes Eko Prayoga; T.M Diansyah; Risko Liza
Algoritma: Jurnal Ilmu Komputer dan Informatika Vol 7, No 1 (2023): April 2023
Publisher : Universitas Islam Negeri Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30829/algoritma.v7i1.15698

Abstract

Along with the times and accompanied by advances in information and communication technology, it is undeniable that at this time all activities use information technology. One of the activities is to use the internet. The research will conduct a classification based on internet usage data obtained through questionnaires using data mining techniques. The attributes that will be used in doing the classification are Name, Age, Gender, Last Education. The method used is the Naïve Bayes method, which is one of the classification techniques in data mining. Based on the research conducted, it was concluded that based on internet user data used as training data, the Naïve Bayes method succeeded in classifying 32 data from 50 data tested. So the Naïve Bayes method succeeded in predicting the magnitude of the percentage of accuracy by 64%. Keywords : Data Mining, Classification, Naïve Bayes
Pengenalan ChatGPT untuk Meningkatkan Pengetahuan Siswa-Siswi di SMK Negeri 1 Pantai Labu Sayuti Rahman; Arnes Sembiring; Rachmat Aulia; Haida Dafitri; Risko Liza
Prioritas: Jurnal Pengabdian Kepada Masyarakat Vol 5 No 01 (2023): EDISI MARET 2023
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/prioritas.v5i01.744

Abstract

Siswa SMK sering menghadapi tantangan dalam pembelajaran seperti akses informasi yang terbatas, kesulitan dalam memecahkan masalah, dan kurangnya sumber belajar yang relevan. Oleh karena itu perlu metode atau alat untuk memcahkan masalah ini,salah satunya adalah ChatGPT. ChatGPT dapat memenuhi kebutuhan siswa dengan menyediakan akses informasi yang lebih luas, membantu dalam pembelajaran mandiri, dan memberikan panduan serta penjelasan tambahan dalam memecahkan masalah. Penggunaan ChatGPT juga memungkinkan siswa mengakses sumber daya pembelajaran tambahan di luar jam pelajaran. Hasil pengabdian menunjukkan bahwa penggunaan ChatGPT memberikan manfaat yang signifikan bagi siswa dan guru, dengan kemampuan ChatGPT dalam menjawab pertanyaan, meringkas dokumen, menerjemahkan teks, dan memahami kode program. Respon siswa setelah pelatihan juga sangat positif terhadap penggunaan ChatGPT dalam pembelajaran. Sehingga, ChatGPT efektif dalam memenuhi kebutuhan pembelajaran siswa di SMK Negeri 1 Pantai Labu.