Claim Missing Document
Check
Articles

Found 39 Documents
Search

SCENE-CSIRT (Evaluasi Kompetensi Berbasis Skenario Untuk TTIS) Romadhon, Faizal Wahyu; Salman, Muhammad
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 12 No 5: Oktober 2025
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.2025125

Abstract

Tim Tanggap Insiden Siber (TTIS) merupakan tim yang bertanggung jawab untuk melaksanakan berbagai fungsi manajemen insiden, seperti deteksi, triase, analisis, dan respons insiden. Namun, dengan meningkatnya kompleksitas ancaman siber serta adanya kesenjangan kompetensi pada TTIS terutama di tingkat pemerintah daerah, diperlukan model evaluasi yang dapat menilai kesiapan personel secara komprehensif. Model SCENE-CSIRT (Evaluasi Kompetensi Berbasis Skenario untuk TTIS) merupakan model yang dikembangkan dengan mengintegrasikan kerangka regulasi nasional (Peraturan yang ada di Indonesia, Peta Okupasi BSSN) dengan standar internasional (NIST, FIRST, NICE Framework), sehingga relevan untuk konteks lokal maupun global. Pendekatan ini belum pernah dilakukan sebelumnya dalam konteks evaluasi TTIS di Indonesia. Selain itu, pendekatan berbasis skenario digunakan untuk mengevaluasi keterampilan teknis, seperti analisis insiden dan mitigasi, serta keterampilan non-teknis, seperti komunikasi dan koordinasi. Dengan model evaluasi yang telah disusun diharapkan dapat mengidentifikasi kesenjangan kompetensi serta memberikan rekomendasi pengembangan yang terarah guna meningkatkan efektivitas TTIS. Hasil validasi menunjukkan 97.7% ahli menyetujui model ini dengan mencakup aspek-aspek yang dibutuhkan oleh personel TTIS dalam menangani insiden siber. Penelitian ini diharapkan dapat menjadi acuan dalam pengembangan kebijakan dan penguatan kapasitas TTIS di pemerintah daerah, sehingga meningkatkan kesiapan dan ketangguhan dalam mengelola insiden siber secara efektif.   Abstract Computer Incident Response Team (CSIRT) is responsible for carrying out various incident management functions, such as detection, triage, analysis, and response. However, with the increasing complexity of cyber threats and existing competency gaps within CSIRTs—particularly at the local government level—there is a need for an evaluation model that can comprehensively assess personnel readiness. The SCENE-CSIRT model (Scenario-Based Competency Evaluation for CSIRT) was developed by integrating national regulatory frameworks (including existing Indonesian regulations and the BSSN Occupational Map) with international standards (such as NIST, FIRST, and the NICE Framework), making it relevant to both local and global contexts. This integrated approach has not been previously applied in the context of CSIRT evaluation in Indonesia. Furthermore, the scenario-based approach is used to evaluate both technical skills (such as incident analysis and mitigation) and non-technical skills (such as communication and coordination). The model is designed to identify competency gaps and provide targeted development recommendations to improve the effectiveness of CSIRTs. Validation results indicate that 97.7% of experts agree that the model encompasses the necessary aspects required by CSIRT personnel in managing cyber incidents. This study is expected to serve as a reference for policy development and capacity building for CSIRTs at the local government level, thereby enhancing preparedness and resilience in managing cyber incidents effectively.    
Image based Ubuntu operating system using packer solutions Erawan, Elfrin; Salman, Muhammad
Gema Wiralodra Vol. 14 No. 2 (2023): gema wiralodra
Publisher : Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31943/gw.v14i2.475

Abstract

System frequent Linux operations are used on critical systems. Part systems big pay attention to safety and reliability. Ubuntu Linux is one of all Lots common Linux distributions used for system server operation. To improve security on Ubuntu Linux is required to strengthen the security system process. Strengthening security system operation is one solution for the system operation more stand to attacks and vulnerabilities. Center for Internet Security (CIS) is one caring organization for cyber security and provides benchmarks for configuration system safe Ubuntu operation. Benchmarks cover recommended settings for various component systems like file permissions, application, configuration networking, logging, and management of users. The study aims to improve security system operation with the use of control strengthening security based on CIS Benchmark v1.1.0 servers’ level 2 with the automatic model use packers application. The developed methodology consists of four phases. The first phase is Packer server installation and configuration. The second phase is to build a configuration base Ubuntu installation with user data. The third phase is the application Ansible playbook in runtime Packer automation for automation reinforcement at the time of installation and produces image virtual machine. In phase, lastly, apply structure using image virtual machine-generated and verified percentage reinforcement and optimization achieved. After strengthening security, use research methods. This generated a score conformity audit of 218 controls or 99.54% of the total 219 CIS Benchmark controls.
Recommendations for designing information security framework in government procurement of goods/services certification systems based on ISO 27001:2022 Kurniawan, Ade Wahyu; Salman, Muhammad
Gema Wiralodra Vol. 14 No. 2 (2023): gema wiralodra
Publisher : Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31943/gw.v14i2.477

Abstract

Certification Government Procurement of Goods/Services has applied since 2008 and switched to certification-based computers in 2015. However, technology information has raised problems with the security of necessary information fixed, like illegal access and practice jockeying through access remotely against application exam-based computers. To overcome the challenge, a framework Works security comprehensive information is required. In a study, the researcher compares System Certification Quality Management with Standard ISO 27001:2022 and observes Suite implementation certification procurement to develop a framework special can implement in system certification. Analysis results show that LKPP requires framework Work security information on the system certification procurement goods/services government based on the ISO 27001: 2022 standard. The proposed framework aims to facilitate application Certification Procurement by LKPP as institution-maker regulation and implementation system certification procurement.
Information security incident management using iso 27035 standard Poetiray, Ignatius Frank Zinatra; Salman, Muhammad
Gema Wiralodra Vol. 14 No. 3 (2023): Gema Wiralodra
Publisher : Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31943/gw.v14i3.487

Abstract

The data and information management process at BMKG entails certain risks related to information security incidents. There needs to be more emphasis on addressing these incidents regarding policies, procedures, technology, and human resources. This research project aims to develop an incident management system by ISO 27035 standards. Qualitative research methods have been employed for BMKG Communication Network Center case studies. The approach involves aligning information security incident management with BMKG's business processes. The outcome of this research includes creating policies, documents, and standardized procedures designed to enhance BMKG's capabilities in effectively managing and mitigating incident threats.
ANALISIS STRATEGI PEMASARAN DALAM MENINGKATKAN PENJUALAN DI WARKOP SEHATI PANGKALAN ASEM Salman, Muhammad; S. Devina De Fretes, Mercy
JAMBIS : Jurnal Administrasi Bisnis Vol. 4 No. 3: Juni 2024
Publisher : JAMBIS : Jurnal Administrasi Bisnis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31334/jambis.v4i3.4090

Abstract

This research was based on a problem where Warkop Sehati experienced a decline in sales due to several reasons. The aim of this research is to find out and analyze the marketing strategies implemented by Warkop Sehati Pangkalan Asem in increasing sales. The method in this research uses a qualitative descriptive method. This research data collection technique uses observation, interviews, and documentation methods. The results of the research show that the marketing strategy implemented by Warkop Sehati has been carried out quite well, although it has not been optimal because several inhibiting factors have been encountered, including an increase in standard prices, a less strategic location and limited parking space, less than optimal promotion. The supporting factors include the menu offered being varied, unique and new while still prioritizing quality and taste, the prices are quite affordable, the room atmosphere is comfortable and has a classic nuance and is supported by adequate facilities.
Pengaruh Opini Auditor Dan Jumlah Komite Audit Terhadap Audit Delay Dengan Auditor Switching Sebagai Variabel Intervening Irene, Dila Anindya; Salman, Muhammad; Meutia, Tuti
Ekonomi Bisnis Manajemen dan Akuntansi (EBMA) Vol 3, No 2: 2022
Publisher : LPPM Universitas Labuhanbatu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36987/ebma.v3i2.3466

Abstract

This study aims to find out the influence of auditor's opinion and the number of audit Committees on Audit delay and Auditor switching as intervening variables in trading, services and investment companies listed in the Sharia stock index in 2011-2020. The population of this study was 89 trading,services and investment companies listed on the Sharia stock index in 2011-2022. The sampling method used was purposive sampling method, so that 9 sample companies were obtained. The data analysis method used is classical assumption test, path analysis test and sobel test using SPSS (Statistical Package for the Social Science) as an analysis tool. The results of this study stated that the auditor's opinion and the number of audit committees did not significantly affect the auditor switching. Auditor switching, auditor opinion and number of audit Committee did not significantly affect audit delay. Switching auditors cannot mediate the effect of auditor's opinion and the number of audit Committees on audit delay. The limitation of this study is the lack of the latest references and the latest theories about Auditor switching and audit delay. Suggestions from this study that investors pay more attention to the condition of the company compared with the auditor's opinion. Because it does not mean if the opinion given by the auditor other than Unqualified the company has a bad reputation because many other aspects can be seen and assessed from the company's performance other than the auditor's opinion.
Pemberdayaan Istri Nelayan dalam Rangka Meningkatkan Pendapatan Keluarga melalui Pembuatan Garam di Desa Kuala Idi Cut Kabupaten Aceh Timur Rosmaiti, Rosmaiti; Sari, Riezky Purnama; Salman, Muhammad; Amelia, Amelia; Safrizal, Safrizal; Nabilla, Ulya; Fuad, Muhammad; Basriwijaya, Kiagus Muhammad Zain; Fairus, Fairus
Agrokreatif: Jurnal Ilmiah Pengabdian kepada Masyarakat Vol. 9 No. 3 (2023): Agrokreatif Jurnal Ilmiah Pengabdian Kepada Masyarakat
Publisher : Institut Pertanian Bogor

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29244/agrokreatif.9.3.370-375

Abstract

The fishermen's wife group is PKM Partners, who need empowerment. The limited knowledge and skills of partners in processing iodized salt and hygiene are problems that must be resolved. This community service aims to increase people's income, especially partners of fishermen's wives, by providing training and assistance in processing iodized and hygienic salt. The stages of this activity include 1) Socialization with partners regarding the processing of iodized and hygienic salt; 2) Salt processing training; 3) Financial bookkeeping training; 4) Monitoring and evaluation of PKM activities. The PKM method is the RRA (Rapid Rural Appreial) / PRA (Participatory Rural Appreial) method. This PKM produces iodized and hygienic salt products. Based on the questionnaire, it was found that 77% of partners are very understanding and skilled in processing iodized and hygienic salt, and 78% of partners strongly agree that this PKM activity can improve the quality of partners' salt.
Integrating Y, Star, and Interpersonal Communication Patterns to Enhance the Tahfidzul Qur’an Program at Pesantren Ar-Rahmah Salman, Muhammad
Risalatuna Journal of Pesantren Studies Vol. 4 No. 2 (2024): JULY
Publisher : Pesantren and Community Development Studies - Islamic Institute of Syarifuddin, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54471/rjps.v4i2.3530

Abstract

This article explores the role of Pesantren Tahfidzul Qur’an Ar-Rahmah in nurturing a generation of Muslims who not only memorise the Qur’an but also comprehend and embody its teachings in daily life. While producing students who can memorise the Qur’an is relatively straightforward, cultivating high-quality memorizers through effective methods is significantly more critical. This study adopts a qualitative descriptive approach with participatory observation as its primary data collection method. The findings indicate that the communication patterns employed by the pesantren are based on the Y and Star communication models, which facilitate two-way interactions among caretakers, teachers, and students. Interpersonal communication emerges as a central element in the intensive mentoring process led by the asatidz and musyrif, who serve not only as educators but also as spiritual guides and motivational figures. The study also identifies several internal inhibiting factors that impact the effectiveness of the Qur’anic memorisation programme, such as lack of motivation, laziness, and tendencies among students to skip memorisation sessions. It concludes that the success of the Tahfidzul Qur’an programme is closely tied to the effectiveness of communication strategies and the emotional closeness cultivated through consistent and structured interpersonal engagement.
PERKEMBANGAN SERANGAN TERHADAP WINDOWS DEFENDER UNTUK MENGAMBIL PENGOPERASIAN SISTEM TERINTEGRASI DENGAN HID BADUSB Napitupulu, Willy; Salman, Muhammad
Jurnal Abdi Insani Vol 11 No 2 (2024): Jurnal Abdi Insani
Publisher : Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/abdiinsani.v11i2.1683

Abstract

The Windows operating system is an operating system that is commonly used by many people. Universal Serial Bus (USB) is a mechanism used by many people with practical plug and play functionality, making data transfer fast and easy compared to other hardware. In its use, Windows has a weakness, namely that it is easy for users to experience exploitation of computers/laptops. There is a method called that makes it possible for someone to plant a reverse shell backdoor and exploit files just by connecting a USB to the target computer without being noticed. This research aims to implement and analyze the impact of attacks carried out by BadUSB . Research was carried out to see whether planting a reverse shell backdoor and exploiting files on the target computer using BadUSB could be done or not. The results obtained were that the backdoor reverse shell test using which was carried out on the Windows operating system was successfully carried out. Keywords: BadUSB, reverse shell, Linux, Programming, Python, Computer, Operation System, , HID usb.
Design of Data Security Module Using Key-Policy Attribute Based Encryption (KP-ABE) Algorithm for an Internet-of-Things System Fahlevi, Reza; Salman, Muhammad
Jurnal Penelitian Pendidikan IPA Vol 10 No 11 (2024): November
Publisher : Postgraduate, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jppipa.v10i11.8289

Abstract

Internet becomes more popular over time. Everything can be connected with the internet with larger coverage area which makes everyone have a higher dependence on it. Along with that, internet-based technology development and application is also moving to its best pattern. In the development, there are a lot of devices that can be used for Internet-of-Things system development. However, Internet-of-Things system has the following security vulnerabilities especially for access control and data protection. For the data privacy protection, it becomes more critical especially when using a standard TCP/IP based application layer protocol to secure the data before its transmitted from the client to the server. This work will be focused on the data privacy security development using a cryptographic scheme for Internet-of-Things system. Attribute Based Encryption (ABE) is one of cryptographic scheme that can be one of the best choices for data protection implementation in embedded device using NVIDA Jetson Nano. It will demonstrate the design of Key-Policy Attribute Based Encryption (KP-ABE) scheme to generate a symmetric key that will be used for Advanced Encryption Standard (AES) while encryption and decryption process. The result shows the execution time of key generation, data encryption and decryption using unique number of attributes.
Co-Authors Afrah Junita Agustini, Ita Indah Ahmad Nasrulloh Amelia Amelia Amelia Anis Wahdi Aprilia, Dona As Salam, M Ridha Aunur Rafik, Aunur Basriwijaya, Kiagus Muhammad Zain Budiyanto, Alan Dalhar, Dalhar Eka Putri, Syalwa Naira Elli Yane Bangkele Encep Dulwahab, Encep Erawan, Elfrin Fairus, Fairus Farisanudin, Farisanudin Fasiroka, Ema Yulia Fatkurahman Arjuna Febriyani, Nur Annisa Kadarwati Fernanda, Rosma Ayu Hasanah, Fauziah Hidayati Hidayati Huzein, Muhammad Ihsani, Abdul Hafizh Imron Rosyidi, Imron Irene, Dila Anindya Khan, Muhammad Salman Kumar, Narendar Kurniawaan, Kurniawaan Kurniawan, Ade Wahyu Lubis, Nasrul Kahfi Mia Fitria Muh Al Amin, Muh Muhammad Fuad Muhammad Ikhsan Muhammad Rusdi Rasyid Munir, Muhammad Ardi Murni, Mayang Nabilla, Ulya Napitupulu, Willy Nirmala Sari Nuha, Muhammad Azza Ulin Nur Ainun Nurlina Nurlina Nursyam Andi Syarifuddin Perdana, Satya Poetiray, Ignatius Frank Zinatra Pratiwi, Dhea Oktavia Pratiwi, Trisna Novrianti Raharjo, Didit Hari Kuncoro Ratna Nila, Ida REZA FAHLEVI Rifky Riyandi Prastyawan Rinova Firman Cahyani, Rinova Firman Riyanto Riyanto Rizqiana, Sista Rochamwati, Rochmawati Romadhon, Faizal Wahyu Rosmaiti, Rosmaiti S. Devina De Fretes, Mercy Safrizal Safrizal Sari, Riezky Purnama Sari, Virta Setiawan, Sariman Budi Sigit Nugroho Siti Masriah, Siti Slamet Sutrisno Suhud, Muhammad Kharis Sulistiadi Sulistiono Sulistiyono Sulistiyono Surya, Lukman Syifa, Amanda Fairuz Tuti Meutia Ulin Nuha, Muhammad Azza Visalim, Aqim Waqar, Abdul Wicahyani, Nunik Lathifah Agustina Widjojo, Adi Windarta, Susila