Claim Missing Document
Check
Articles

DATA VISUALISASI SEBAGAI PENDUKUNG INVESTIGASI MEDIA SOSIAL Suwito Pomalingo; Bambang Sugiantoro; Yudi Prayudi
ILKOM Jurnal Ilmiah Vol 11, No 2 (2019)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v11i2.443.143-151

Abstract

Social media is an application that can make everyone interact with each other and can consume information by sharing content quickly, efficiently and real time. Various kinds of information about someone's activities that we can find on social media, making social media can help to conduct investigations. Some research, using visualization with several graph methods to facilitate the process of analyzing data on social media that is so abundant. But the data used only comes from one social media, while there is still a lot of information on other social media that can be used as data sources for analysis purposes. In this study visualization using the directed graph method will be carried out, then calculate the value of network property and the value of centrality to find out which nodes have many activities which will be carried out in depth searches to find patterns of interaction or activity. Based on the results of the calculated centrality, it is found that on Twitter and Instagram accounts there are many interactions, this can be seen in the value of the indegree and outdegree node. Based on the results of the analysis in this study, information that is important for investigating social media is obtained, such as information about user profiles, posts, comments, preferred social media pages, location, and timestamp, all of which are connected by a line that shows the relationship between the node.
Forensic storage framework development using composite logic method Helmi Rachman; Bambang Sugiantoro; Yudi Prayudi
ILKOM Jurnal Ilmiah Vol 13, No 1 (2021)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v13i1.811.58-66

Abstract

Increasing number of information technology users allows possibility for crimes to take advantage of information technology to continue increasing either directly and indirectly. Criminals often use computer devices to commit crimes. This is a major concern so that the need for handling digital evidences becomes significantly urgent. Therefore, a forensic storage framework is required for managing digital evidences. This framework is designed by applying the composite logic method to determine role model of each variable or the initial pattern of the stages to be collaborated. Composite logic produces a role model that is to generate patterns in order to achieve the same goal. This method collaborates framework for handling the pre-existing hdd, ssd, and vmware to be in turn combined into a forensic storage framework. Based on the results of the test, this study proposes a new framework called forensic storage framework which comprises of four main stages, namely preparation, collection, analysis and report. The advantage of this framework is that it can be used to handle digital evidences in four storages which are SSD, HDD, VmWare, and cloud.
DETEKSI PINEAP PADA FIRMWARE WIFI PINEAPPLE MENGGUNAKAN SMARTPHONE BERBASIS ANDROID Fahmi Romisa; Bambang Sugiantoro
ILKOM Jurnal Ilmiah Vol 8, No 3 (2016)
Publisher : Teknik Informatika Fakultas Ilmu Komputer Univeristas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v8i3.68.204-211

Abstract

Kebutuhan akan akses jaringan nirkabel atau wireless saat ini sangat dibutuhkan oleh hampir semua orang, hampir di semua tempat terdapat akses jaringan wifi. Sebuah ilmu penetrasi jaringan semakin lama selama meningkat, tidak hanya menggunakan suatu penetrasi yang menggunakan perangkat lunak, tetapi sudah merambah ke perangkat keras yang sudah berubah fungsi, tidak lagi berfungsi sebagai menyebar sebuah koneksi data, tetapi sudah merambah sebagai alat penetrasi jaringan, sistem ini berguna untuk mendeteksi adanya sebuah router yang dapat menduplikasi semua router sekitar dengan permintaan probe request, maka dari itu diperlukan suatu alat pendeteksian yang dapat mendeteksi secara real time terhadap router tersebut . penelitian ini menghasilkan suatu alat pendeteksian yang user friendly menggunakan smartphone berbasis android, beserta analisis dan melakukan suatu uji beda pada router yang memiliki firmware wifi pineapple yang memiliki core pineap. 
Membangun Framework Konseptual Terintegrasi Menggunakan Metode Composite Logic untuk Cloud Forensic Readiness pada Organisasi Merisa Kurniasari Fadilla; Bambang Sugiantoro; Yudi Prayudi
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 1 (2022): Januari 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v6i1.3427

Abstract

In the Forensic Readiness approach, incident readiness is the goal of the company or organization in dealing with incidents that may occur. Forensic Readiness can consist of actions or steps, technical and non-technical, that supposedly maximize an organization's ability to use digital evidence. A well-built Cloud Forensic Readiness Framework can help speed up and simplify decision-making regarding an incident occurring in a cloud computing environment. This creates new opportunities for collaboration in the field of digital forensics and cloud computing or cloud computing, so that solutions can be studied and researched by analyzing various literature sources of cloud computing forensic readiness framework and building an integrated cloud forensic readiness framework on an institutional scale using the composite logic method. With the completeness of the readiness framework designed, it is a kind of research that is expected to ease decision making process for organizational stakeholders to handle incident responses.
Penerapan Metode Motion Graphic Pada Video Animasi Prosedur Kerja Praktek Study kasus (Teknik Informatika UAD) Muhamad Fadli; Bambang Sugiantoro; Ika Arfiani
Jurnal Pendidikan Multimedia (Edsence) Volume 4 No 1 (Juni 2022)
Publisher : Universitas Pendidikan Indonesia (UPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17509/edsence.v4i1.45264

Abstract

Kerja Praktek merupakan matakuliah wajib yang harus diselesaikan oleh mahasiswa. Pada pelaksanaan kerja praktek, banyak mahasiswa yang tidak mengerti prosedur pada mata kuliah ini karena sumber informasi yang selama ini digunakan, hanya penjelasan secara langsung dikelas dan pada saat bimbingan. Hal ini dapat menghambat praktik mahasiswa untuk menyelesaikan mata kuliah tepat waktu. penelitian ini, melakukan pembuatan video animasi Motion Graphic mengenai prosedur mata kuliah praktek, untuk mempermudah mahasiswa memahami prosedur pada praktek mata kuliah. Penelitian ini menggunakan rancangan dari pemodelan air terjun(waterfall). Pemodelan air terjun merupakan metode pendekatan desain sekuensial yang linier atau berurut untuk bidang-bidang teknik. Model air terjun ini melakukan kebutuhan sistem, rancangan sistem, implementasi, dan pengujian sistem hingga perawatan. Video animasi yang di rancang pada penelitian ini, dikembangkan menggunakan metode animasi Motion Graphic, yakni potongan-potongan rekaman digital yang di padukan dengan ilusi gerak dan gambar. Hasil penelitian ini berupa video animasi Motion Graphic, yang telah di uji menggunakan Blackbox Test dan System Usability Scale(SUS), dimana pada pengujian Blackbox Test memperoleh nilai 100% atau layak digunakan, serta pada pengujian System Usability Scale(SUS) memperoleh nilai sebesar 71 yang berarti Dapat diterima atau layak digunakan.
Analisis Unjuk Kerja TCP Sack Menggunakan Antrian Random Early Detection Rinny Asasunnaja; Bambang Sugiantoro
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 7 No. 2 (2022): Mei 2022
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (231.571 KB) | DOI: 10.14421/jiska.2022.7.2.75-82

Abstract

As time goes by, the current technology is also developing very rapidly, the rapid development of technology, especially on the internet network is also developing so that it is expected to continue to provide the best quality to meet the growing and fast information needs. An internet network is highly demanded of its best quality, one of which is in the spotlight to be developed, namely TCP Transmission Control Protocol. The efficiency and smoothness of the data transmission process is the most important thing in a communication network. TCP is one aspect that supports today’s fast internet, with TCP we can exchange information accurately, quickly, and well. In this study, researchers are interested in analyzing the performance of TCP Sack using the Random Early Detection queue. By doing this research is expected to know the performance of TCP Sack by looking at the parameter values of packet delivery ratio, throughput, end to end delay, and packet drop. Based on the results of the analysis, it can be concluded that end-to-end delay parameter testing on the TCP Sack still has poor performance, while for testing the packet delivery ratio, throughput, and packet drop TCP Sack already has good performance.
Pelatihan Reference Manager, Management Cite on Your Research, Tools: Mendeley, Zotero, End Note Endra Yuliawan; Wildan Nadiyal Ahsan; Sophan Sofian; Bambang Sugiantoro; Shofwatul 'Uyun; Maria Ulfa Siregar
Jurnal Bakti Saintek: Jurnal Pengabdian Masyarakat Bidang Sains dan Teknologi Vol. 6 No. 2 (2022)
Publisher : Fakultas Sains dan Teknologi, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Penulisan karya ilmiah yang yang memerlukan tata cara penulisan yang sesuai dengan kaedah-kaidah penulisan yang benar sesuai dengan sitasi sehingga tidak menimbulkan plagiasi merupakan hal yang wajib dipahami oleh semua peneliti yang melakukan karya ilmiah. Tools atau alat yang tepat dalam mengorganisir kebutuhan ini sangat membantu peneliti agar sesuai dengan ketentuan yang distandarkan oleh masing-masing jurnal, karya tulis ilmiah dan prosiding. Kegiatan Webinar dan Sharing Seassion ini merupakan proses pendampingan yang berorientasikan pada tata laksana secara impelementasi sehigga mahasiswa khusus nya jenjang sarjana dapat melakukan penulisan karya ilmiah nya dengan benar sesuai kaedah-kaedah penulisan karya ilmiah dengan mensitasi karya peneliti lain tanpa melakukan plagiasi atau mengutip tanpa menyertakan sumber referensinya. Pada pelaksaan kegiatan ini dilakukan secara online atau daring dikarenakan kondisi yang masih belum memungkinkan dilakukan secara tatap muka dan sebagai kepatuhan dalam menjalankan protokol kesehatan dari virus Corona (Covid-19). Dari hasil pemaparan materi, diskusi dan hasil implementasi secara langsung dapat disimpulkan sesuai dengan yang diharapkan dengan peserta 71.6% adalah jenjang mahasiswa 28.4% jenjang pasca sarjana dengan demikian mahasiswa jenjang sarjana dapat mengambil manfaat untuk menyusun karya ilmiah skripsi nya dan pasca sarjana dapat lebih mendalam memahami dalam lakukan sitasi pada tesis dan jurnal yang dituju untuk publikasi. [Writing scientific papers that require writing procedures that are in accordance with the correct writing rules in accordance with citations so as not to cause plagiarism is something that must be understood by all researchers who do scientific work. The right tools or tools in organizing these needs really help researchers to comply with the provisions standardized by each journal, scientific paper, and proceedings. This Webinar and Sharing Session activity is an implementation-oriented mentoring process so that undergraduate students in particular can write their scientific papers correctly according to the rules of scientific writing by citing the work of other researchers without plagiarizing or quoting without including sources. the reference. The implementation of this activity is carried out online or online due to conditions that are still not possible to do face-to-face and as compliance in carrying out health protocols from the Coronavirus (Covid-19). From the results of the material presentation, discussion, and direct implementation results, it can be concluded as expected with 71.6% of participants being 28.4% postgraduate level students so that undergraduate students can take advantage to compose their scientific thesis and postgraduate students can understand more deeply in doing citations on theses and journals intended for publication.]
PERAN ETHICAL HACKING DALAM MEMERANGI CYBERTHREATS Qorry Aina Fitroh; Bambang Sugiantoro
JURNAL ILMIAH INFORMATIKA Vol 11 No 01 (2023): Jurnal Ilmiah Informatika (JIF)
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v11i01.6593

Abstract

The efforts to digitize and optimize various things in the modern world will certainly highlight issues related to cybersecurity such as data breaches, security breaches, and so on. Ethical hacking and its need in the future cannot be avoided. Ethical hacking technology is spreading in almost every aspect of life, especially the computer industry, which requires protection of important data and must be handled with the right technology. Ethical hacking aims to find vulnerabilities in security systems and discover potential data breaches. This contrasts with the common understanding of hacking, which is black hat hackers who damage systems with malicious intent and steal data and infect viruses. Ethical hacking is a way to combat and neutralize black hat hackers. Teaching ethical hacking is preparing professionals in the information security field with the tools and skills to combat and prevent cybersecurity threats. Teaching inexperienced people in information security with aggressive methods can be viewed as both beneficial and harmful. This is because the same methods are used by malicious hackers hence educating professionals in information security may be perceived as enhancing malicious hackers. Using the literature study method, this article discusses various issues related to ethical hacking.
Studi Komparasi Metode Analisis Sentimen Naïve Bayes, SVM, dan Logistic Regression Pada Piala Dunia 2022 Muhamad Zaki Anbari; Bambang Sugiantoro
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 7, No 2 (2023): April 2023
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v7i2.5383

Abstract

The world cup is the most popular sporting event in the world. The 2022 World Cup will be held for the first time in the Middle East, in the country of Qatar to be precise. Its implementation was colored by various controversies ranging from human rights issues, LGBT+ issues, issues of alcoholic beverages, and so on which were so busy in the mainstream media. Various sentiments and opinions have emerged on social media regarding the implementation of the world cup, some have positive opinions and some have negative ones. Sentiment analysis was carried out to find out the main opinions that are developing in society regarding the 2022 world cup, the results can then be used as input and consideration for policy makers. This study uses the snscrape library running on the Python programming language to collect tweets related to the 2022 World Cup on the Twitter social media platform on the first day of the World Cup. The collected data then enters the pre-processing, splitting, TF-IDF stage, before it is ready to be used for modeling. The method used in this research is Bernouli Naïve Bayes, Support Vector Machine, and Logistic Regression. The evaluation results show that the Bernouli Naïve Bayes method produces a precision parameter value of 71%, a recall parameter of 99%, and an accuracy of 76%. While the Support Vector Classifier method produces precision parameter values of 94%, 93% recall parameters, and 92% accuracy. The Logistic Regression method produces a precision parameter value of 93%, a recall parameter of 93%, and an accuracy of 92%.
Evaluasi Penerimaan Masyarakat Terhadap Aplikasi Telemedicine pada Masa Pandemi COVID-19 Muhammad Reza Velayani; Muhammad Taufiq Nuruzzaman; Agung Fatwanto; Bambang Sugiantoro
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 8 No. 2 (2023): Mei 2023
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/jiska.2023.8.2.140-153

Abstract

Telemedicine is a technology that provides benefits during the COVID-19 pandemic, which has been going on for more than two years. However, we have never conducted an evaluation or assessment of Telemedicine applications. In this study, we tried to look at people's acceptance of using the application, and 104 participants became respondents. This study uses the TAM (Technology Acceptance Model) method, which this method measures the influence between variables. TAM has five indicator variables: Perceived Ease of Use, Perceived Usefulness, Attitude Toward Using, Behavioral Intention, and Actual Usage. In this study, four models were made with three comparison models; then, for the results of testing the relationship between variables, three hypotheses are always accepted in each model, namely Perceived Ease of Use with Perceived Usefulness, Perception Ease of Use with Attitude Toward Using, and Behavioral Intention with Actual Usage. Then the two hypotheses always rejected in each model are Perceived Usefulness with Attitude Toward Using, Attitude Toward Using with Behavioral Intention. Then there is one hypothesis for each model that is refused, namely Perceived Usefulness with Behavioral Intention, Perceived Usefulness with Actual Usage, Perceived Ease of Use with Behavioral Intention, and Perceived Ease of Use with Actual Usage.
Co-Authors Abdul Haris Muhammad Abdullah, Mohd. Fikri Azli bin Afrianto, Nurdi Agung Fatwanto Ahmad Luthfie Akbar, Bintang Faisal Akbar, Muhammad Tulus Akbar, Reonaldo Al Jum'ah, Muhammad Na'im Alfani, Muhammad Nur Alfarizi, Naufal Faiz Alifah Amalia Amalia, Alifah Amanulloh, Rivkih Amin Pujiati Amin Retnoningsih Anbari, Muhamad Zaki Arromdoni, Bad’ul Hilmi Astari, M Rizky Asyhab, Naufal bahary, muhammad syaiful Bahry, Muhammad Syaeful Budi Permana Putra Budiman, Kholiq Candra, Dori Gusti Alex Dewantara, Rizki Efdika, Muhamad Fadil Elvanisa Ayu Muhsina, Elvanisa Ayu Endra Yuliawan Fahmi Romisa Gatra, Rahmadhan Gatra, Ramadhan Gunawan Gunawan Habibah, Berlian Ummu Habibullah, Ricky Hafizuddin, Faiz Akhmad Hakim, Fani Rakhman Hanif Hanif Hartono Hartono Helmi Rachman Hikmatyar, Firmansyah Gustav Idir Fitriyanto Idir Ika Arfiani Imtikhan Azmi, Himawan Istianto, Yudi Izdiharsant, Almaas Jazi Eko Istiyanto Karmesti, Danissa Wirna Kesumahadi, Lisdianto Dwi Khanif Setiyawan Khusna, Tachiyya Nailal Mahardhika, Yuha Bani Mahbub Puba Fawzan Mahbub Puba Fawzan, Mahbub Puba Mahmuda, Muhimmatul Mardlian, M. Sa’id Abdurrohman Kunta Maria Ulfa Siregar Maria Ulfah Siregar Maria Ulfah Siregar Mastur Mastur Meiditra, Irzon Merisa Kurniasari Fadilla Muhamad Fadli Muhamad Soleh Muhamad Zaki Anbari Muhammad Hambali, Muhammad Muhammad Reza Velayani Muhammad Taufiq Nuruzzaman Mujahidah, Latifatul Mulyana, Riyan Nana Kariada Trimartuti Nana Supriyana Ngisomudin, Ngisomudin Nora Lizarti Nugrah Rekto Prabowo Nur Wibowo, Trio Nuruzzaman, Muhammad Taufiq Panggih Gumelaring Praja Pomalingo, Suwito Prasdika, Prasdika Pratiwi, Millati Putry Wahyu Setyaningsih Qorry Aina Fitroh Rachman, Helmi Retantyo Wardoyo Rini Audia Rinny Asasunnaja Riwanto, Yudha Romisa, Fahmi Rusnaldhy, Rusnaldhy Sakuri, Sakuri Sakuri, Sakuri Shofwatul 'Uyun Shofwatul ‘Uyun Son’Aniy, Irham Sophan Sofian Sri Hartati Subki, Ahmad Sucinta, Hanny Handayani Sumarsono , Sumarsono Sunyoto Sunyoto Supiyana, Nana Supriyono, Abdul Rohman Susilo Adi Widyanto Sutarno Sutarno Tasya Kumala Dewi, Bella Tri Widodo Utis Sutisna Warso Warso, Warso Wicaksono, Nur Kukuh widowati widowati Wildan Nadiyal Ahsan Winasis, Bima Putra Wishnu, Asep Yudi prayudi Yuha Bani Mahardhika