Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Proceeding Applied Business and Engineering Conference

PERANCANGAN SISTEM MANAJEMEN PERUBAHAN JADWAL PERKULIAHAN DI LABORATORIUM DENGAN PENERAPAN METODE DevOps Elvi Rahmi; Eva Yumami; Kasmawi; Wiwin Saputra
ABEC Indonesia Vol. 11 (2023): 11th Applied Business and Engineering Conference
Publisher : Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Optimal laboratory availability holds utmost importance in the pursuit of educational and research objectives at Politeknik Negeri Bengkalis. Confronting the global challenges and competition in today's digital age, Politeknik Negeri Bengkalis finds it imperative to ensure the effective and efficient utilization of its academic resources. Through observations, it has been noted that instances of suboptimal laboratory usage are not uncommon due to instructors' absence from the laboratory as per the designated schedule. This circumstance renders the laboratories unused, consequently disrupting the teaching and learning process. The focal point of this research is to craft academic administration software at Politeknik Negeri Bengkalis, enabling the real-time monitoring of laboratory availability and seamless adjustment of laboratory usage schedules. This ambitious task is undertaken using the innovative DevOps application development methodology. The adoption of the DevOps application development approach yields significant advantages throughout the stages of development, testing, and eventual implementation of this application.
Analysis of the Application of CIA Triad Information Security Aspects in Academic Information Systems Hidayasari, Nurmi; Kasmawi, Kasmawi; Mansur, Mansur; Husaini, M. Iqbal; Nuranisa, Putri
ABEC Indonesia Vol. 12 (2024): 12th Applied Business and Engineering Conference
Publisher : Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Threats that often attack information systems such as data leakage, credentials (account compromise),phishing, web-based attacks, malware attacks, cracking (piracy), carding (illegal transactions) and so on. These types ofcrimes can certainly be prevented and handled which is the responsibility of the company/organization. Informationsecurity is an effort to protect information assets from potential threats. Information security indirectly ensures businesscontinuity, reduces emerging risks, and makes it possible to optimize return on investment. The CIA Triad InformationSecurity aspect in information and data systems is very important as a guideline or basic framework, because in it thereare indicators in preventing Cyber Crime. Politeknik Negeri Bengkalis (Polbeng) as one of the State VocationalUniversities in Indonesia already uses SIAKADCloud, a SEVIMA product as an integrated academic managementinformation system. In addition, SEVIMA also claims that SIAKADCloud is a secure system. However, so far it has notbeen possible to ascertain the extent of its security. It is also necessary to know whether in its implementationSiakadCloud has implemented basic security standards in accordance with the CIA Triad, namely Confidentiality,Integrity, and Availability. To find out the application of Confidentiality do Block Direct, To find out the application ofIntegrity do User and Data filtering checks: user level division, while to find out the application of Availability doauthentication.