Articles
Database Forensics in Software as A Service Service using Stored Procedure
Rusydi Umar;
Imam Riadi;
Purwanto Purwanto
Jurnal Mantik Vol. 5 No. 4 (2022): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Recently, the use of web-based applications has increased significantly, especially online services, most of which are used for digital transaction activities that use the internet. However, the increasing use of online services often ignores the privacy and security aspects of an application, web developers making it an attractive target for security concerns. In this article, the proposed countermeasures include two mechanisms, namely: the use of stored procedure parameters, and the use of stored procedure encryption in SQL server. The goal is to prevent the dangers of internet crime attacks using structured query language injection attacks (SQLIA). In addition, an analytical evaluation of prevention and protection should also be carried out. The solution offered is prevention and protection using stored procedures because it can prevent SQLI attacks effectively and efficiently.
Mobile Forensics for Cyberbullying Detection using Term Frequency - Inverse Document Frequency (TF-IDF)
Imam Riadi;
Sunardi Sunardi;
Panggah Widiandana
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 5, No 2 (2019): December
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (554.761 KB)
|
DOI: 10.26555/jiteki.v5i2.14510
The case of cyberbullying in Indonesia was ranked third in the world in 2015 and as much as 91% was experienced by children [1]. RSA Anti Fraud Command Center (AFCC) report reports that in 2015 45% of transactions were carried out through mobile channels, while 61% of fraud occurred through mobile devices [2]. WhatsApp in July 2019, 1.6 billion users access the WhatsApp messenger on a monthly basis [10]. The data opens a reference for investigators to better anticipate cybercrime actions that can occur in the whatsapp application because more users are using the application. In this study using the TF-IDF method in detecting cyberbullying that occurs in order to be able to add a reference for investigators. The conclusions that have been obtained from the simulation of conversations between four people in a whatsapp group get the results of the cyberbullying rate that the user "a" has a cyberbullying rate of 66.80%, the user "b" has a cyberbullying rate of 50%, the user "c" has a level cyberbullying is 33.19%, user "c" has a cyberbullying rate of 0% from the data proving that the TF-IDF method can help investigators detect someone who will commit cyberbullying actions but in its development a better way is needed when preprocessing so that the abbreviation or changing words can still be detected perfectly.
Analisis Kerentanan Serangan Cross Site Scripting (XSS) pada Aplikasi Smart Payment Menggunakan Framework OWASP
Imam Riadi;
Rusydi Umar;
Tri Lestari
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 5 No. 3 (2020): November 2020
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (488.364 KB)
|
DOI: 10.14421/jiska.2020.53-02
E-commerce that is growing so rapidly can provide space for unauthorized parties in carrying out cybercrime, security anticipation is needed so that e-commerce applications can be protected from harassment or hacking attacks such as cross-site scripting (XSS), malware, exploits, and database injection. This research was conducted to determine the vulnerability of the Smart Payment application by self-test using the ZAP tool. This test is carried out to secure applications that serve as recommendations for follow-up in securing the Smart Payment application. The results of this study found vulnerabilities in the Smart Payment application. Vulnerabilities found were Information Disclosure-Suspicious Comments, X-Frame-Options Header not Set, X-Content-Type-Options Header Missing, Timestamp Disclosure-Unix, XSS Protection Not Enabled Web Browsers, and Directory Browsing. In addition to obtaining vulnerabilities from the Smart Payment application, solutions are also provided to overcome vulnerabilities in the Smart Payment application.
Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher
Imam Riadi;
Abdul Fadlil;
Fahmi Auliya Tsani
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 7 No. 1 (2022): Januari 2022
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (651.553 KB)
|
DOI: 10.14421/jiska.2022.7.1.33-45
Cryptography is one of the most popular methods in data security by making data very difficult to read or even unreadable. One of the well-known techniques or algorithms in cryptography is Vigenere Cipher. This classic algorithm is classified as a polyalphabetic substitution cipher-based algorithm. Therefore, this algorithm tends to only handle data in text form. By this research, a console-based application has been developed which is made from PHP programming language to be able to encrypt and decrypt digital image media using Vigenere Cipher. The encryption process is done by first converting a digital image into a base64 encoding format so that the encryption process can be carried out using the tabula recta containing the radix-64 letter arrangement used for base64 encoding. Conversely, the decryption process is carried out by restoring the encrypted file using radix-64 letters, so we get the image file in the base64 encoding format. Then, the image with the base64 encoding format is decoded into the original file. The encryption process took less than 0,2 seconds and 0.19 seconds for the decryption process and 33.34% for average file size addition on the encrypted file from the original file size. Testing on ten different images with different sizes and dimensions showed a 100% success rate which means this research was successfully carried out.
Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology
Imam Riadi;
Sunardi;
Fitriyani Tella Nani
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 7 No. 2 (2022): Mei 2022
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (832.523 KB)
|
DOI: 10.14421/jiska.2022.7.2.83-90
Nowadays developments in information technology are growing rapidly, especially in email. Email became one that almost the whole world had. Email is one of the results of developments in information and communication. Email is widely used to exchange information by sending and receiving data, such as document files, pictures, letters, and others. So much for the crimes that often occur in emails. Email crimes that often occur among them are email spoofing. Email spoofing is a forgery that occurs in the header of the email. So, the email is sent as if it were a valid email. Email spoofing is often used in spamming activities. Crimes committed by cybercrime must leave evidence such as IP Address, sender's email, and time of sending the email. This research will do forensics on email spoofing. The research uses the Live Forensics method, where the computer is used in a powered-on state. The research also uses the NIST (National Institute of Standards Technology) research flow. The email that will be analyzed is in the email header section using 3 tools, namely tracer email analyzer, email dossier, and mail header analysis. This analysis will compare and check the accuracy of the email headers using these tools. Emails suspected of email spoofing will be proven using tools. Based on the 'form' received' and 'Message-ID' headers. Based on the results, the tool that meets the value after the analysis is tracer email analysis.
Perbandingan Forensic Tools pada Instagram Menggunakan Metode NIST
Irhash Ainur Rafiq;
Imam Riadi;
Herman
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 7 No. 2 (2022): Mei 2022
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1167.871 KB)
|
DOI: 10.14421/jiska.2022.7.2.134-142
The development of communication media continues to increase with the emergence of various communication applications on smartphones, which are currently very developed from limited communication media to social media. This change in the flow of communication applications gives a new color to communication, not just exchanging messages and sounds but also exchanging videos and pictures. This development was also followed by the rise of digital crimes in the form of defamation, fraud, and hoax news by spreading posts and then deleting them after the news spread widely. This research was conducted to obtain digital evidence with the help of special applications such as Belkasoft Evidence and Axiom Magnets using the NIST method. The results of this study show that the Magnet Axiom is better with an accuracy rate of 83.3% while Belkasoft Evidence is only 50%.
Forensik Mobile pada Layanan Media Sosial LinkedIn
Imam Riadi;
Anton Yudhana;
Mushab Al Barra
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 6 No. 1 (2021): Januari 2021
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (850.46 KB)
|
DOI: 10.14421/jiska.2021.61-02
The research explores mobile forensic on LinkedIn social media. Forensic mobile finds digital evidence of job hoax cases in LinkedIn, investigation using the NIST (National Institute of Standard and Technology) method. Data collection techniques using Andriller tools in investigations. Data examination using tools Root Browser, Autopsy in the forensic process. data analysis using tools MOBILedit in the forensic process. The investigation found digital evidence of log activity, a status update on LinkedIn. Other results found in the investigation are 17 WiFi password, 117 download history, 263 phone calls, 1 file deleted, 1 file hidden, and 1 file raised, the research has reached the expected target.
Optimasi Keamanan Web Server terhadap Serangan Broken Authentication Menggunakan Teknologi Blockchain
Imam Riadi;
Herman;
Aulyah Zakilah Ifani
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 6 No. 3 (2021): September 2021
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (758.492 KB)
|
DOI: 10.14421/jiska.2021.6.3.139-148
The aspect of the internet that needs to be considered a security is the login system. The login system usually uses a username and password as an authentication method because it is easy to implement. However, data in the form of usernames and passwords are very vulnerable to theft, so it is necessary to increase the security of the login system. The purpose of this research is to investigate the security of the system. Whether the system is good at protecting user data or not, minimizing execution errors from the system and minimizing risk errors on the system so that the login system can be used safely. This research is conducted to test the system security with Burp Suite on the login system that has been built. Testing the security of this system by experimenting with POST data which is secured using blockchain technology makes the data sent in the form of hash blocks safer and more confidential so that the system is safer than before. Blockchain technology has successfully secured usernames and passwords from broken authentication attacks. By using the Burp Suite testing system, login is more specific in conducting security testing.
Analisis Application Programming Interface Pada Mobile E-Voting Menggunakan Metode Test-Driven Development
Sunardi Sunardi;
Imam Riadi;
Pradana Ananda Raharja
Techno (Jurnal Fakultas Teknik, Universitas Muhammadiyah Purwokerto) Vol 20, No 2 (2019): Techno Volume 20 No.2 Oktober 2019
Publisher : Universitas Muhammadiyah Purwokerto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30595/techno.v20i2.4266
Pengujian pada perangkat lunak dibutuhkan sebagai jaminan mutu terhadap kemampuan perangkat lunak. Perangkat lunak diterapkan pada pekerjaan yang nyata tanpa memiliki kendala terhadap kinerja dalam memberikan perintah, memproses perintah hingga memperoleh hasil dari pemrosesan sesuai dengan tujuan pengembangan. Pengujian unit Application Programming Interface (API) pada web service fokus sebagai upaya untuk menguji kemampuan pada tiap unit. Unit yang diuji secara spesifik akan digabungkan dengan unit lain hingga menjadi suatu sistem terintegrasi. Aplikasi mobile membutuhkan dukungan API sebagai penghubung dengan basis data, dimana aplikasi mobile dengan basis data tersebut tidak saling berhubungan secara langsung. Tampilan antarmuka pada aplikasi mobile hanya difokuskan sebagai interaksi visual antara pengguna dengan sistem. Sistem yang diberi perintah akan merespon dengan umpan balik yang dihubungkan melalui perantara dan merespon kembali melalui perantara dan dikembalikan dalam bentuk visual melalui antaramuka. Pengujian pada tiap unit sistem menggunakan proses Test-Driven Development (TDD) untuk menguji tiap fungsi. Perancangan dan pembangunan web service pada aplikasi e-voting memerlukan pengujian sehingga dalam penerapanya dapat digunakan sesuai dengan spesifikasi yang telah dirancanakan tanpa menimbulkan bug atau error yang dapat menganggu kinerja sistem. API yang telah diuji dan berinteraksi dengan antarmuka dapat melakukan proses data pemilih, validasi data pemilih dan pemilihan. Sistem ini juga telah diuji dengan metode System Usability Scale dengan skor total 69,02. Testing on the software is needed to guarantee its capabilities. So software in real condition wouldn’t have any deflect with the performance to providing wich in line with the goal of development. Testing the Application Programming Interface (API) unit on the web service is an effort to testing the performance of each unit. Specifically tested unit will be combined with other units to become an integrated system. A Mobile application requires API support as the connector to a database, which not directly related to mobile application. The user-interface in mobile application only act as a visual interaction between the user and the system. The commanded system will respond through feedback which connected into a connector and gives the response back through the connector and returns in visual form through an interface. Test-Driven Development (TTD) was used in testing each system unit. Designing and building web service on e-voting application requires testing so that application can be used properly without causing bugs or errors that can interface system performance. Approved APIs are able to process voter data, validate voter data and election. The system also tested with “System Usability Scale” method which gains 69,02 total score.
Training on how to use Social Media Wisely and Ethically
Herman Herman;
Imam Riadi;
Dikky Praseptian M;
Faiz Isnan Abdurrachman;
Syahrani Lonang
ABDIMAS: Jurnal Pengabdian Masyarakat Vol. 5 No. 2 (2022): ABDIMAS UMTAS: Jurnal Pengabdian Kepada Masyarakat
Publisher : LPPM Universitas Muhammadiyah Tasikmalaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (803.308 KB)
|
DOI: 10.35568/abdimas.v5i2.2686
Nowadays, the behavior of users in social media arguably represent human behavior in the real world. Training on how to use social media wisely and ethically to young ages is needed to grow the good behavior. Based on a preliminary study, the ages of students in SMK Kesehatan Binatama is considered a terget of such training. 15 years old dominates with 63.6% followed by 16 years old with 29.3% according to age which has the highest penetration rate of social media users reaching 99.16%, namely ages 13-18 years. The activeness of students in social media reaches 99%. The number of hours students use social media where 10.1 % stated between 0-2 hours, 40.4% stated 2-5 hours, 36.4% stated 5-10 hours and 11.1 % more than 10 hours. Knowledge training on social media has been carried out several times but must continue to be carried out along with the development of social media technology and the shift in the age of its users. Training activities with wise and ethical materials using social media have been successfully held with the expected results. Participants' knowledge and insight, namely students can increase with information regarding what can and should not be done when using social media, information about hoaxes and cyberbullying and the ITE Law can be understood properly. The survey results also show an increase in the knowledge provided from the criteria of understanding to criteria of very understanding with an increase from the average score on the pre-test 2.96 with a percentage of 59.2% to the average score on the post-test 3.64 with a percentage of 72.8%.