Claim Missing Document
Check
Articles

Found 7 Documents
Search

MITIGATION HANDLING OF SQL INJECTION ATTACKS ON WEBSITES USING OWASP FRAMEWORK imam riadi; Rusydi Umar; wasito sukarno
Jurnal Ilmiah Kursor Vol 9 No 4 (2018)
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28961/kursor.v9i4.182

Abstract

The development of the security system on the application of a website is now more advanced. But a software that has vulnerability will threaten all fields such as information system of health, defense, finance, and education. Information technology security issues will become the threat that made managers of the website (webadmin) alerted. This paper is focused on how to handle various application web attacks, especially attacks that uses SQL Injection, using The Open Web Application Security Project (OWASP), the aim is raise awareness about application security web and how to handle an occurred attack.
Experimental Investigation of Frozen Solid State Drive on Digital Evidence with Static Forensic Methods Imam Riadi; Rusydi Umar; Imam Mahfudl Nasrulloh
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 9, No. 3 December 2018
Publisher : Institute for Research and Community Services, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (596.776 KB) | DOI: 10.24843/LKJITI.2018.v09.i03.p06

Abstract

The rapid development of computer technology in hardware, is currently developing non-volatile computer storage media Solid State Drive (SSD). SSD technology has a faster data access speed than Hard Disk and is currently starting to replace Hard Disk storage media. Freezing software on computer systems is often carried out by computer technicians, because it can save a computer maintenance costs due to errors, be exposed to computer viruses or malware. This software is used to prevent unwanted changes to the computer system, when the computer is restarted changes that occur in the computer system will not be stored on storage media. When this happens, what should be done by digital forensic investigators. This study discusses experimental forensic investigations on SSD media storage with frozen conditions or in this study said the frozen SSD. Frozen SSD is the condition of the drive that is locked so that there is no change in the computer system. Software used to lock and prevent changes such as Deep Freeze, Shadow Defender, Windows Steady State, and Toolwiz Time Freeze. Forensic research stages using methods NIST. The result shows that from comparative analysis conducted with Deep Freeze the results of the RecoverMyFile gives 76.38% and Autopsy gives 75,27%, while frozen condition with Shadow Defender the results of the RecoverMyFile gives 59.72% and Autopsy gives 74.44%. So the results of this study indicate the drive freezing software has an effect obtained can be an obstacle in the digital forensic process.
THE VISUALISATION OF MUHAMMADIYAH MUSEUM USING AUGMENTED AND VIRTUAL REALITY TECHNOLOGY Fijaya Dwi Bima Sakti Putra; Rusydi Umar; Sunardi Sunardi
SINERGI Vol 25, No 2 (2021)
Publisher : Universitas Mercu Buana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22441/sinergi.2021.2.002

Abstract

There is a lot of media for promotion. The brochure is still widely used because of its simple, portable, and easy to carry anywhere. However, in this age of sophistication, the brochure is not effectively used for the millennial generation. Augmented Reality (AR) and Virtual Reality (VR) have been applied to many applications such as education, tourism, advertising, and news reports. With the rapid development of VR and AR technology, there are higher continuously requirements for enhancing brochure media effectiveness. AR and VR provide a potential solution for interaction between person and brochure as new emerging information technology. In this research, AR and VR are used to better educate tourists and visitors about the museum they choose to visit. Muhammadiyah Museum and its historical collection used as an example of applying AR and VR to the brochure as a promoting media. The Multimedia Development Life Cycle (MDLC) method applied to develop AR and VR. AR and VR system was tested by 30 under graduation students with 74.92% of acceptance. This research shows the AR and VR brochure is very feasible successfully sent information about the various kinds of historical collections in museum Muhammadiyah and very helpful as promoting media.
Desain Antar Muka Sistem e-Learning Berbasis Web Rusydi Umar; Anton Yudhana; Ockhy Jey Fhiter Wassalam
Query: Journal of Information Systems VOLUME: 02, NUMBER: 01, APRIL 2018
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1197.656 KB)

Abstract

Computer-based learning is now widely used in various schools both high school and college. The use of such computers can use of computers as aids in teaching and learning process. Along with advances in science and technology the teaching and learning process have demanded not only indoors in the form of face-to-face, but people can learn anytime and anywhere. One of the models that  used for this purpose is e-learning based learning model. But to use the model must be available media. With e-learning system to study online courses. Through this system, students can more easily access course syllables, course modules, assignments and many other information reinforced by lecturers in the e-learning system so students can access them easily, when and wherever. All announcements of syllabus, module, task and announcement in lecturer by lecturer of e-learning system. With these systems, will form learning between faculty and students in addition to face to face in the lecture hall. With such interaction, it is sure to enrich the learning system and improve the quality of education. Which have been  in demand and delivery according to the learning needs. Results and implementation show the system works well.Keywords: E-Learning system, web-based, learning-teaching system. 
Penerapan Cloud Computing Pada Sistem Reservasi Homestay Dieng Berbasis Web Rusydi Umar, Alan Fajar Sudrajat
Query: Journal of Information Systems Volume: 01, Number: 02, October 2017
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (358.185 KB)

Abstract

Homestay is one of the places needed as lodging facilities in the tourist area. In recent years, lodging business is greatly increasing. Business lodging in Dieng is one of the promising venture business' due to the increasing number of the tourists who interested to visit the tourist  places in Dieng and they need the hotel services. However, there are some managers who are unable to promote their lodging through the internet. Therefore, this research will make a software as a service in a cloud computing, regarding the Homestay Reservation System service in order to make the managers able to promote their homestay to public through the internet and it will make customers able to make a reservation through the software. This software was made by following waterfall paradigm in software engineering, start from analysis, design, implementation and testing. Testing result showed that the application deserved to be used.Keywords: information, cloud computing, homestay, reservation
Pemanfaatan Telegram Sebagai Notifikasi Serangan untuk Keperluan Forensik Jaringan Jefree Fahana, Rusydi Umar, Faizin Ridho
Query: Journal of Information Systems Volume: 01, Number: 02, October 2017
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (270.909 KB)

Abstract

Cyber attacks are a serious threat to network security, especially in routers that result in termination of connections, missing configurations that affect all communications and transactions between networks become impeded by the loss of many parties. The first step to do is to design and build an attack detection system that is Intrusion Detection System (IDS). The use of snort is useful for recording Distributed Danial of Services (DDoS) attacks as well as traffic data stored on the router stored in the log and forwarded to the instant messaging telegram application as a notification to alert the administrator. A telegram can be used not only as a notification but can also be used as a network forensic stage to strengthen evidence of an attack as a process of data collection for the purposes of the trial. The results showed that by utilizing Instant Messaging Telegram by designing wake Application (App) notification using PHP programming language able to detect attacks by using existing rules on snort and can serve as the basis of evidence of an attack. Keywords: Telegram, Intrusion Detection System (IDS), Snort, Network Forensics, DDoS. 
Analisis Sistem Pendukung Keputusan Seleksi Calon Anggota Organisasi IMM Menggunakan Metode SAW Jaka Dernata Jaka; Rusydi Umar; Anton Yudhana
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 9 No 2 (2022): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v9i2.1534

Abstract

Acceptance of prospective new members is an activity that must be carried out in an organization to get good quality prospective members from the acceptance of members in the Muhammadiyah Student Association. The more prospective members who want to enter an organization, the more difficult it is to make decisions in selecting new prospective members. There are several organizations, the recruitment of prospective members is still mostly done professionally. This problem is caused by the absence of a system to be selected in the selection of new members. The Simple Additive Weighting (SAW) method was chosen to conduct this research because this method can create a weight value after each one, then rank the attributes on each alternative from all alternatives, the alternative is a prospective new member based on the criteria that have been determined by the committee. This research will produce a system to simplify and speed up the selection of new members and the selection committee in making decisions for new members of the Muhammadiyah Student Association.