Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Gema Wiralodra

Image based Ubuntu operating system using packer solutions Erawan, Elfrin; Salman, Muhammad
Gema Wiralodra Vol. 14 No. 2 (2023): gema wiralodra
Publisher : Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31943/gw.v14i2.475

Abstract

System frequent Linux operations are used on critical systems. Part systems big pay attention to safety and reliability. Ubuntu Linux is one of all Lots common Linux distributions used for system server operation. To improve security on Ubuntu Linux is required to strengthen the security system process. Strengthening security system operation is one solution for the system operation more stand to attacks and vulnerabilities. Center for Internet Security (CIS) is one caring organization for cyber security and provides benchmarks for configuration system safe Ubuntu operation. Benchmarks cover recommended settings for various component systems like file permissions, application, configuration networking, logging, and management of users. The study aims to improve security system operation with the use of control strengthening security based on CIS Benchmark v1.1.0 servers’ level 2 with the automatic model use packers application. The developed methodology consists of four phases. The first phase is Packer server installation and configuration. The second phase is to build a configuration base Ubuntu installation with user data. The third phase is the application Ansible playbook in runtime Packer automation for automation reinforcement at the time of installation and produces image virtual machine. In phase, lastly, apply structure using image virtual machine-generated and verified percentage reinforcement and optimization achieved. After strengthening security, use research methods. This generated a score conformity audit of 218 controls or 99.54% of the total 219 CIS Benchmark controls.
Recommendations for designing information security framework in government procurement of goods/services certification systems based on ISO 27001:2022 Kurniawan, Ade Wahyu; Salman, Muhammad
Gema Wiralodra Vol. 14 No. 2 (2023): gema wiralodra
Publisher : Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31943/gw.v14i2.477

Abstract

Certification Government Procurement of Goods/Services has applied since 2008 and switched to certification-based computers in 2015. However, technology information has raised problems with the security of necessary information fixed, like illegal access and practice jockeying through access remotely against application exam-based computers. To overcome the challenge, a framework Works security comprehensive information is required. In a study, the researcher compares System Certification Quality Management with Standard ISO 27001:2022 and observes Suite implementation certification procurement to develop a framework special can implement in system certification. Analysis results show that LKPP requires framework Work security information on the system certification procurement goods/services government based on the ISO 27001: 2022 standard. The proposed framework aims to facilitate application Certification Procurement by LKPP as institution-maker regulation and implementation system certification procurement.
Information security incident management using iso 27035 standard Poetiray, Ignatius Frank Zinatra; Salman, Muhammad
Gema Wiralodra Vol. 14 No. 3 (2023): Gema Wiralodra
Publisher : Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31943/gw.v14i3.487

Abstract

The data and information management process at BMKG entails certain risks related to information security incidents. There needs to be more emphasis on addressing these incidents regarding policies, procedures, technology, and human resources. This research project aims to develop an incident management system by ISO 27035 standards. Qualitative research methods have been employed for BMKG Communication Network Center case studies. The approach involves aligning information security incident management with BMKG's business processes. The outcome of this research includes creating policies, documents, and standardized procedures designed to enhance BMKG's capabilities in effectively managing and mitigating incident threats.
Co-Authors Afrah Junita Agustini, Ita Indah Ahmad Nasrulloh Amelia Amelia Amelia Anis Wahdi Aprilia, Dona As Salam, M Ridha Aunur Rafik, Aunur Basriwijaya, Kiagus Muhammad Zain Budiyanto, Alan Dalhar, Dalhar Eka Putri, Syalwa Naira Elli Yane Bangkele Encep Dulwahab, Encep Erawan, Elfrin Fairus, Fairus Farisanudin, Farisanudin Fasiroka, Ema Yulia Fatkurahman Arjuna Febriyani, Nur Annisa Kadarwati Fernanda, Rosma Ayu Hasanah, Fauziah Hidayati Hidayati Huzein, Muhammad Ihsani, Abdul Hafizh Imron Rosyidi, Imron Irene, Dila Anindya Khan, Muhammad Salman Kumar, Narendar Kurniawaan, Kurniawaan Kurniawan, Ade Wahyu Lubis, Nasrul Kahfi Mia Fitria Muh Al Amin, Muh Muhammad Fuad Muhammad Ikhsan Muhammad Rusdi Rasyid Munir, Muhammad Ardi Murni, Mayang Nabilla, Ulya Napitupulu, Willy Nirmala Sari Nuha, Muhammad Azza Ulin Nur Ainun Nurlina Nurlina Nursyam Andi Syarifuddin Perdana, Satya Poetiray, Ignatius Frank Zinatra Pratiwi, Dhea Oktavia Pratiwi, Trisna Novrianti Raharjo, Didit Hari Kuncoro Ratna Nila, Ida REZA FAHLEVI Rifky Riyandi Prastyawan Rinova Firman Cahyani, Rinova Firman Riyanto Riyanto Rizqiana, Sista Rochamwati, Rochmawati Romadhon, Faizal Wahyu Rosmaiti, Rosmaiti S. Devina De Fretes, Mercy Safrizal Safrizal Sari, Riezky Purnama Sari, Virta Setiawan, Sariman Budi Sigit Nugroho Siti Masriah, Siti Slamet Sutrisno Suhud, Muhammad Kharis Sulistiadi Sulistiono Sulistiyono Sulistiyono Surya, Lukman Syifa, Amanda Fairuz Tuti Meutia Ulin Nuha, Muhammad Azza Visalim, Aqim Waqar, Abdul Wicahyani, Nunik Lathifah Agustina Widjojo, Adi Windarta, Susila