Claim Missing Document
Check
Articles

Found 2 Documents
Search

Apply the Search Engine Optimization (SEO) Method to determine Website Ranking on Search Engines Fifin Alfiana; Nimatul Khofifah; Tarisya Ramadhan; Nanda Septiani; Wahyuningsih Wahyuningsih; Nadia Nur Azizah; Nova Ramadhona
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 1 (2023): April
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i1.126

Abstract

In today's digital age, the internet has become an essential tool for various activities, including business promotion. One effective way to promote your business online is by creating a website that offers useful information to visitors. However, simply having a website is not enough; it is crucial to ensure that your website ranks high on search engine results pages (SERPs) in order to attract more visitors. One of the most effective methods to optimize a website for search engines is through search engine optimization (SEO) techniques. These techniques aim to improve a website's visibility on SERPs by using various tactics, such as keyword research, content optimization, and link building. However, it is important to note that SEO optimization is not a one-time task but rather an ongoing process. It requires constant attention and effort to maintain high search engine rankings and ensure the continued success of your online business. By optimizing your website, you can improve its visibility on search engines, attract more visitors, and ultimately drive business growth. It is important to remain vigilant in implementing SEO techniques to maintain high search engine rankings and ensure the continued success of your online business.
Enhancing Cybersecurity Information Sharing: A Secure and Decentralized Approach with Four-Node IPFS Zaleha Fauziah; Novi Putri Anggraini; Yulia Putri Ayu Sanjaya; Tarisya Ramadhan
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 2 (2023): October
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/ijcitsm.v3i2.139

Abstract

The act of sharing cybersecurity information plays a proactive and collaborative role in bolstering organizational security through the exchange of data using a centralized repository service. However, the real-world application of centralized services comes with certain risks. It leaves organizations vulnerable to distributed denial-of-service (DDoS) attacks, leading to system failures and creating a single point of failure. Additionally, it opens the door to man-in-the-middle (MITM) attacks, potentially altering or pilfering exchanged information. These threats undermine user confidence in the confidentiality, integrity, and availability of their data. This study presents a secure solution, the design of a Cybersecurity Information Sharing (CyberShare) system that employs a private interplanetary file system (IPFS) network as a decentralized information storage solution. Unlike centralized storage, which relies on a single node, the CyberShare system utilizes a four-node IPFS network interconnected with swarm keys for authentication. This design enables users to store and share information securely from sender to recipient, eliminating the need for reliance on a central server and reducing the server load. An analysis of the proposed CyberShare system demonstrates its capability to ensure the confidentiality, integrity, and availability of cybersecurity information. By enhancing information security, CyberShare systems empower organizations to securely share and utilize cybersecurity data.