Claim Missing Document
Check
Articles

Found 24 Documents
Search

Optimization and Evaluation of Authentication System using Blockchain Technology Imam Riadi; Aulyah Zakilah Ifani; Ridho Surya Kusuma
Emerging Science Journal Vol 4 (2020): Special Issue "IoT, IoV, and Blockchain" (2020-2021)
Publisher : Ital Publication

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28991/esj-2021-SP1-015

Abstract

User data security innovation is a particular concern in protecting one's privacy rights, which is one of the serious violations when an attacker can bypass the user authentication so that it looks like something legitimate and becomes legal. Based on these issues, the research aims at optimizing and evaluating the blockchain-based authentication systems to minimize data leakage, manipulate the data, and modify the data. Blockchain is one of the innovations that can solve this problem. Data or transactions in the blockchain are saved in hash form to make it difficult for hackers to break into them. The Blockchain implementation uses the Solidity programming language to build smart contracts and other tools such as MetaMask, Ganache, and Truffle. The Network Forensics Development Life Cycle (NFLDC) is used as a framework with the following five stages: Initiation, Acquisition, Implementation, Operation, and Disposition. Based on the research conducted, the attack strategy against blockchain-based systems consists of several scenarios covering the Burp Suite, XSS, SQL Injection, and DoS. The results show that the percentage of authentication optimization reaches a value of 90.1%, and 8.9% is the percentage for evaluating systems such as the possibility of cyberattack. Based on these results, this research has achieved its goals and may assist in further research. Doi: 10.28991/esj-2021-SP1-015 Full Text: PDF
ANALISIS SISTEM INFORMASI WEB LSP UAD MENGGUNAKAN USER EXPERIENCE QUESTIONNAIRE (UEQ) Rusydi Umar; Aulyah Zakilah Ifani; Fathia Irbati Ammatulloh; Maya Anggriani
METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi Vol. 4 No. 2 (2020): METHOMIKA: Jurnal Manajemen Informatika & Komputersisasi Akuntansi
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1005.174 KB) | DOI: 10.46880/jmika.Vol4No2.pp173-178

Abstract

The progress of the world has been so fast that workers in various professions have increasingly needed recognition. University and Vocational School graduates need fields to test the ability of the profession they do. Ahmad Dahlan University (UAD) is one of the universities that has a professional testing institution called the UAD Professional Certification Institute (LSP). LSP UAD functions as an institution to test the professions required by prospective UAD graduates themselves. Until now, LSP UAD has ten schemes that can be tested on prospective study program graduates. To simplify the information related to the scheme, students can see on the LSP UAD website, information is also available for other LSPs and accessories. However, the UAD LSP web has not tested the satisfaction of web users such as student users. This paper was created to test user satisfaction or User Experience (UX) for users to improve information services on the web. Analysis on the UAD LSP web used the User Experience Questionnaire (UEQ) method to 15 students who had used the web as respondents. UEQ's assessment refers to six aspects, namely: efficiency, attractiveness, accuracy, clarity, novelty, and stimulation. The results of the analysis showed that the average respondent gave an impression with results above average in the aspects of clarity, accuracy, stimulation, and novelty. Meanwhile, attractiveness and efficiency get good scores.
Optimization of System Authentication Services using Blockchain Technology Imam Riadi; Herman Herman; Aulyah Zakilah Ifani
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 6, No. 4, November 2021
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v6i4.1325

Abstract

With the development of the era, one thing that must be considered for security is the Login System. In most cases, user login information is stored on the server. This gives access to sensitive informatio, many hackers easily break into data from users. Based on these problems, this research focuses on data security authentication in the form of usernames and passwords in the login system. Authentication using blockchain is used to reduce malicious access and increase security for the authentication process. One of the innovative technologies that can solve these problems is Blockchain Technology. Using blockchain technology, hackers will find it difficult to change and modify the same data on all computers at the same time because it takes a very long time to crack the encryption code on each block of data in the entire computer network. Data storage or transactions in the blockchain are stored in the form of hashes. This makes it difficult for hackers to break into it. Tests in this study using Wireshark tools and network miner. Based on the research conducted, the test was conducted as many as 5 times with two scenarios, namely authentication of the login system before using the blockchain and after using the blockchain. The results obtained. The, system built using blockchain can secure data. The test results obtained that data in the form of usernames and passwords were converted into hashes and with the immutable nature of the blockchain, data from users could not be changed or replaced by anyone.
Prototype Pengembangan Aplikasi Login menggunakan Teknologi Blockchain Imam Riadi; Herman Herman; Aulyah Zakilah Ifani
Journal of Applied Informatics and Computing Vol 5 No 1 (2021): July 2021
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v5i1.2411

Abstract

The internet is developing so fast, from the kinds of internet technolgy to something that is needed by every user. Information needs and an extensive network system give the easier to access. One of them is wireless, wireless is very helpful for internet users. However, the problem often arises in wireless securing network. Many attacks that make the username and password of the users get hacked. Based on these problems, this study focuses on securing when users login user a device. One of the innovative technologies that be able to solve these problems is Blockchain Technology. By using blockchain technology adversaries will find the difficulty to change and modify the same data on all computers at the same time because it will take the time so long to crack the encryption code on each block of sata on the entire computer network. This study used literature study as a data collection technique. Browsing method using the internet or other network media. This result of this research is the system prototype has been successfully built. The prototype for the development of this login system application has succeed in securing data such as of username and password using blockchain technology. User data is secured and converted into encryption block.
Optimasi Keamanan Web Server terhadap Serangan Broken Authentication Menggunakan Teknologi Blockchain Imam Riadi; Herman; Aulyah Zakilah Ifani
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 6 No. 3 (2021): September 2021
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (758.492 KB) | DOI: 10.14421/jiska.2021.6.3.139-148

Abstract

The aspect of the internet that needs to be considered a security is the login system. The login system usually uses a username and password as an authentication method because it is easy to implement. However, data in the form of usernames and passwords are very vulnerable to theft, so it is necessary to increase the security of the login system. The purpose of this research is to investigate the security of the system. Whether the system is good at protecting user data or not, minimizing execution errors from the system and minimizing risk errors on the system so that the login system can be used safely. This research is conducted to test the system security with Burp Suite on the login system that has been built. Testing the security of this system by experimenting with POST data which is secured using blockchain technology makes the data sent in the form of hash blocks safer and more confidential so that the system is safer than before. Blockchain technology has successfully secured usernames and passwords from broken authentication attacks. By using the Burp Suite testing system, login is more specific in conducting security testing.
Development of Web-Based Project Tender Documents Application Using Extreme Programming Methods Mustari Lamada; Aminuddin Bakry; Aulyah Zakilah Ifani; Khaerunnisa Khaerunnisa
Elinvo (Electronics, Informatics, and Vocational Education) Vol 7, No 2 (2022): November 2022
Publisher : Department of Electronic and Informatic Engineering Education, Faculty of Engineering, UNY

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (601.017 KB) | DOI: 10.21831/elinvo.v7i2.49863

Abstract

The application of technology is a need that is in demand in the industrial world today, especially in the field of contractors of goods and services that have implemented the use of applications to help the process of managing data and project documents in their companies. This study aims to optimize the web-based project tender document system using the extreme programming method. The extreme programming method consists of planning, design, coding, testing, and software increment. Research methods using extreme programming methods consisting of planning, design, coding, testing, and software increment. The planning stages obtain results in the form of functional and non-functional application needs. The design stage results in the design of applications using activity diagrams, diagram classes, use case diagrams, and flowcharts. The coding stages obtain results in the form of applications that can be built using web programming languages. The testing stage uses the ISO 9126 standard. Suitability test results are worth 1 (very good), security is not found to have viruses or malicious malware in applications (grade B), reliability is worth 0.99 (good), usability is worth 90.9% (very feasible), efficiency is worth 98% (grade A), maintainability meets the three standard aspects of assessment (good), and portability is worth 1 (very good). The software increment stage obtained results in the form of implementation and application trials on users who have functioned properly. Based on the results, it can be concluded that the development of web-based project tender document applications using extreme programming methods can function properly and be feasible to use.
Evaluation in Assessment of Student Competence: Application of the Indonesian Student Competency Assessment (AKSI) in Elementary Schools Mustari S. Lamada; Sanatang Sanatang; Aulyah Zakilah Ifani; Dwi Hastuti Hidayat
International Journal of Environment, Engineering and Education Vol 4 No 2 (2022)
Publisher : Three E Science Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55151/ijeedu.v4i2.81

Abstract

The purpose of the study was to determine the application of the Indonesian Student Competency Assessment application at the elementary school level, to determine the readiness of teachers, to find out the ease of guidance and the suitability of literacy and numeracy learning modules with assessment questions, and to find out the obstacles experienced by teachers during the process of using the Application of Indonesian Student Competency Assessment (AKSI) application using a purposive sampling technique. Data collection using questionnaires and documentation. Data analysis in this study used descriptive statistics. The results showed that the application of the Indonesian Student Competency Assessment application at the elementary school level in, Takalar Regency had been implemented well. Research with sub-variables of the application of the Indonesian Student Competency Assessment application at three elementary schools for students obtained data showing 44.70% were in a good category. The readiness of teachers to apply the AKSI application obtained data that 84.80% were in the ready and very ready category and the very ready category was balanced with the ready category. The ease of guidance and the suitability of the literacy and numeracy learning modules with the assessment questions provided by the AKSI application for teachers obtained data that showed 39.00% were in the very good category. Obstacles experienced by teachers during the process of using the AKSI application, data showed that 35.70% were in the high category
Analisis Kualitas dan Pengembangan Sistem Informasi Perpustakaan berbasis web menggunakan Teknologi Barcode Mustari Lamada; Fathahillah; Aulyah Zakilah Ifani; Fitri Wahyuni
Journal of Embedded Systems, Security and Intelligent Systems Vol. 3 No. 1 (2022): Vol 3, No 1 (2022): May 2022
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Penelitian ini bertujuan untuk mengembangkan aplikasi peminjaman dan pengembalian buku di perpustakaan berbasis online yang dapat membantu pegawai atau pegawai perpustakaan dalam entri data, peminjaman dan pengembalian buku, serta pembuatan laporan bulanan. Penelitian ini menggunakan model pengembangan prototipe yang terdiri dari: pengumpulan kebutuhan, pembuatan prototipe, evaluasi prototipe, pengkodean sistem, pengujian sistem, evaluasi sistem, dan penggunaan sistem. Teknik pengumpulan data dalam penelitian ini adalah melalui observasi, wawancara, dan kuisioner, dimana hasil dari model pengembangan ini adalah produk dengan teknologi barcode. Penelitian ini melibatkan dua ahli konten dan seorang ahli sistem untuk menilai kelayakan aplikasi. Analisis data yang digunakan didasarkan pada pengujian sesuai dengan standar ISO 25010. Hasil penelitian didasarkan pada hasil pengujian ISO 25010 aspek kesesuaian fungsional presentase kelayakan 100%, aspek performance eddiciency dari aplikasi gtmatrix dimana performance 95%, structure 90%, aspek compatibility 100%, usability 87,96%. Hasil pengujian pada aspek kesesuaian fungsional berada pada kategori dapat diterima berdasarkan hasil pengujian oleh dua validator ahli sistem, aspek efisiensi kinerja telah terpenuhi berdasarkan tiga aspek pengujian, aspek kegunaan berada pada kategori sangat baik berdasarkan pada hasil tanggapan responden, aspek kecocokan berada pada kategori dapat diterima. berdasarkan ketiga aspek yang diujikan, dan aspek portabilitas dalam kategori dapat diterima berdasarkan kedua indikator pengujian. Berdasarkan hasil tersebut, aplikasi peminjaman dan pengembalian buku berbasis web menggunakan teknologi barcode layak digunakan
PEMANFAATAN TEKNOLOGI INFORMASI DAN LAPORAN KEUANGAN UNTUK MENINGKATKAN DAYA SAING DI ERA SOCIETY 5.0 Agunawan; Dirwan; Laode Amijaya Kamaluddin; Dara Ayu Nianty; Aulyah Zakilah Ifani; Eka Wijaya Paula; Wanda Cahyani; Muhammad Asrauf Mustamin
Nobel Community Services Journal Vol 3 No 1 (2023): Nobel Community Services Journal
Publisher : Lembaga Penelitian, Publikasi dan Pengabdian Masyarakat ITB Nobel Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37476/ncsj.v3i1.4199

Abstract

Badan Usaha Milik Kelurahan (BUMKel) sangatlah penting, disamping untuk mensejahterakan pengusaha kecil ataupun pengrajin di lingkungan desa atau kelurahan khususnya di kelurahan Ujung Lare Kec.Soreang. Badan Usaha Milik Kelurahan (BUMKel) berkontribusi penuh sebagai wadah untuk dapat menumbuhkan perekonomian desa dan produk lokal. Tujuan dari kegiatan masyarakat ini untuk mengedukasi warga kelurahan ujung lare akan pentingnya pemasaran dengan memanfaatkan teknologi, salah satunya melalui media online serta implementasi teknologi informasi digital marketing. Metode pembayaran yang sering dilakukan pada proses penjualan melalui internet ini adalah pembayaran di tempat atau COD (cash on delivery), yaitu sebanyak 83,73%. Hasil survei Sebagian besar dari data tersebut melakukan penjualan dengan cara online mulai pada tahun 2017 sampai tahun 2018 sebanyak 45,31%. Dari kegiatan penelitian ini dengan memanfaatkan teknologi informasi dan laporan keuangan yang akurat, BUMKel dapat meningkatkan daya saing mereka di era Society 5.0.
PENGAMANAN SISTEM INFORMASI PENGGUNA PADA APLIKASI GRANT ME MENGGUNAKAN ANDVANCED ENCRYPTION STANDARD Aulyah Zakilah Ifani; Akbar Abdurrahman Jafaruddin; Antika Diana Liku; Indriani Indriani
Rabit : Jurnal Teknologi dan Sistem Informasi Univrab Vol 9 No 1 (2024): Januari
Publisher : LPPM Universitas Abdurrab

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36341/rabit.v9i1.3666

Abstract

Education has an important role in ensuring the survival of the nation and state, as well as improving the quality of human resources to participate in national development. Today's developing technology, including in the field of education, can make it easier for students to learn new things and get information, including about scholarship programs. However, the security of scholarship recipient data needs to be considered so that it is not easily accessed by unauthorized people. Cryptography can be an appropriate approach to secure such data. This research aims to secure Grant Me application user information using the AES algorithm to encrypt the username and password of scholarship recipients and scholarship providers. The method used is experimental testing of the system to be built using the AES algorithm. The results showed that the application of the AES algorithm with a key value of 256 bytes proved that user login information was not easy to know from either the application owner or a third party. With the application of AES as a security system, it can be concluded that the application becomes more secure from hacker interference.