Claim Missing Document
Check
Articles

PERAN ETHICAL HACKING DALAM MEMERANGI CYBERTHREATS Qorry Aina Fitroh; Bambang Sugiantoro
JURNAL ILMIAH INFORMATIKA Vol 11 No 01 (2023): Jurnal Ilmiah Informatika (JIF)
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v11i01.6593

Abstract

The efforts to digitize and optimize various things in the modern world will certainly highlight issues related to cybersecurity such as data breaches, security breaches, and so on. Ethical hacking and its need in the future cannot be avoided. Ethical hacking technology is spreading in almost every aspect of life, especially the computer industry, which requires protection of important data and must be handled with the right technology. Ethical hacking aims to find vulnerabilities in security systems and discover potential data breaches. This contrasts with the common understanding of hacking, which is black hat hackers who damage systems with malicious intent and steal data and infect viruses. Ethical hacking is a way to combat and neutralize black hat hackers. Teaching ethical hacking is preparing professionals in the information security field with the tools and skills to combat and prevent cybersecurity threats. Teaching inexperienced people in information security with aggressive methods can be viewed as both beneficial and harmful. This is because the same methods are used by malicious hackers hence educating professionals in information security may be perceived as enhancing malicious hackers. Using the literature study method, this article discusses various issues related to ethical hacking.
Studi Komparasi Metode Analisis Sentimen Naïve Bayes, SVM, dan Logistic Regression Pada Piala Dunia 2022 Muhamad Zaki Anbari; Bambang Sugiantoro
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 7, No 2 (2023): April 2023
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v7i2.5383

Abstract

The world cup is the most popular sporting event in the world. The 2022 World Cup will be held for the first time in the Middle East, in the country of Qatar to be precise. Its implementation was colored by various controversies ranging from human rights issues, LGBT+ issues, issues of alcoholic beverages, and so on which were so busy in the mainstream media. Various sentiments and opinions have emerged on social media regarding the implementation of the world cup, some have positive opinions and some have negative ones. Sentiment analysis was carried out to find out the main opinions that are developing in society regarding the 2022 world cup, the results can then be used as input and consideration for policy makers. This study uses the snscrape library running on the Python programming language to collect tweets related to the 2022 World Cup on the Twitter social media platform on the first day of the World Cup. The collected data then enters the pre-processing, splitting, TF-IDF stage, before it is ready to be used for modeling. The method used in this research is Bernouli Naïve Bayes, Support Vector Machine, and Logistic Regression. The evaluation results show that the Bernouli Naïve Bayes method produces a precision parameter value of 71%, a recall parameter of 99%, and an accuracy of 76%. While the Support Vector Classifier method produces precision parameter values of 94%, 93% recall parameters, and 92% accuracy. The Logistic Regression method produces a precision parameter value of 93%, a recall parameter of 93%, and an accuracy of 92%.
Evaluasi Penerimaan Masyarakat Terhadap Aplikasi Telemedicine pada Masa Pandemi COVID-19 Muhammad Reza Velayani; Muhammad Taufiq Nuruzzaman; Agung Fatwanto; Bambang Sugiantoro
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 8 No. 2 (2023): Mei 2023
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/jiska.2023.8.2.140-153

Abstract

Telemedicine is a technology that provides benefits during the COVID-19 pandemic, which has been going on for more than two years. However, we have never conducted an evaluation or assessment of Telemedicine applications. In this study, we tried to look at people's acceptance of using the application, and 104 participants became respondents. This study uses the TAM (Technology Acceptance Model) method, which this method measures the influence between variables. TAM has five indicator variables: Perceived Ease of Use, Perceived Usefulness, Attitude Toward Using, Behavioral Intention, and Actual Usage. In this study, four models were made with three comparison models; then, for the results of testing the relationship between variables, three hypotheses are always accepted in each model, namely Perceived Ease of Use with Perceived Usefulness, Perception Ease of Use with Attitude Toward Using, and Behavioral Intention with Actual Usage. Then the two hypotheses always rejected in each model are Perceived Usefulness with Attitude Toward Using, Attitude Toward Using with Behavioral Intention. Then there is one hypothesis for each model that is refused, namely Perceived Usefulness with Behavioral Intention, Perceived Usefulness with Actual Usage, Perceived Ease of Use with Behavioral Intention, and Perceived Ease of Use with Actual Usage.
Penerapan Composite Logic dalam Mengkolaborasikan Framework Terkait Multimedia Forensik Nora Lizarti; Bambang Sugiantoro; Yudi Prayudi
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 2 No. 1 (2017): Mei 2017
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (308.175 KB) | DOI: 10.14421/jiska.2017.21-04

Abstract

Like the digital forensics in general, multimedia forensics requires an integrated and flexible framework that can guide the process of proof is procedurally in order to maintain the validity of a digital evidence so that it can be justified in court. But this time, the digital forensics investigation framework that develops more emphasis on computer forensic investigations in general and did not give a specific stage of multimedia forensics. Often in investigating multimedia forensics investigator uses a framework that vary depending on the type of multimedia content to be analyzed, of course it becomes inflexible and inefficient, whereas multimedia content share characteristics that allow it to be integrated into a single unit. This study develops a forensic multimedia framework by implementing the Composite Logic to collaborate on several multimedia framework and related documents. Logic Composite method is a method of modeling the distribution of structured logical modularization techniques with explicit interface in which a model consists of a set of components that are interconnected with the principle of decomposition. In other words, the application of this method will allow researchers to extract and merge several frameworks into a single unit does not eliminate the function and the basic structure of the frameworks.
Rekomendasi Access Point Network pada Fakultas di Lingkungan UIN Sunan Kalijaga Yogyakarta Bambang Sugiantoro; Mahbub Puba Fawzan
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 2 No. 2 (2017): September 2017
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1020.93 KB) | DOI: 10.14421/jiska.2017.22-03

Abstract

The wireless network indoors is strongly influenced by the presence of interference. To overcome such interference and to improve the performance of wireless networks, then the optimization is done. There are several kinds of propagation that can interfere with the performance of the wireless network, which includes the number of transmitters (access point), free space loss, Received Signal Stength (RSSI), coverage that can be served, measuring attenuation at the barrier (concrete wall, soft partition, door, and floor).This research is an analysis research where the purpose of this research is to determine the position of good access point at Faculty of Shari'ah and Law Building using bayesian probability method. The first stage of this research is to determine the distance of signal reception to know the strength of the weak signal with manual random sampling so that the data obtained vary. The second stage is to determine the position of the access point with a choice of several points in order to be able to compare the best position based on the floor plan of the Faculty of Shari'ah and Law. The last stage is to calculate probability with Bayesian probability method.Result of this research is the position of the best access point on the 3rd floor that is at position B with probability value 13 while on floor 4 the best access point position at position A with value 10, position D with value 13 and position E with value 13. The most influential propagation in the Faculty of Shari'ah and Law Building is a concrete wall with a large 60% reducing the mass of radiated signals.
Development of National Digital Evidence Metadata Bambang Sugiantoro
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i1.292

Abstract

The industrial era 4.0 has caused tremendous disruption in many sectors of life. The rapid development of information and communication technology has made the global industrial world undergo a revolution. The act of cyber-crime in Indonesia that utilizes computer equipment, mobile phones are increasingly increasing. The information in a file whose contents are explained about files is called metadata. The evidence items for cyber cases are divided into two types, namely physical evidence, and digital evidence. Physical evidence and digital evidence have different characteristics, the concept will very likely cause problems when applied to digital evidence. The management of national digital evidence that is associated with continued metadata is mostly carried out by researchers. Considering the importance of national digital evidence management solutions in the cyber-crime investigation process the research focused on identifying and modeling correlations with the digital image metadata security approach. Correlation analysis reads metadata characteristics, namely document files, sounds and digital evidence correlation analysis using standard file maker parameters, size, file type and time combined with digital image metadata. nationally designed the highest level of security is needed. Security-enhancing solutions can be encrypted against digital image metadata (EXIF). Read EXIF Metadata in the original digital image based on the EXIF 2.3 Standard ID Tag, then encrypt and insert it into the last line. The description process will return EXIF decryption results in the header image. This can secure EXIF Metadata information without changing the image quality
METODE KLASIFIKASI DAN ANALISIS KARAKTERISTIK MALWARE MENGGUNAKAN KONSEP ONTOLOGI Abdul Haris Muhammad; Bambang Sugiantoro; Ahmad Luthfi
Jurnal Teknomatika Vol 9 No 2 (2017): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Analisis malware membutuhkan keterampilan khusus untuk melakukan pendeteksian dan memahami cara kerja dari malware tersebut. Program berbahaya atau malware menjadi sebuah ancaman atau masalah yang sulit bagi para peneliti, tidak ada platform komputasi atau lingkungan yang kebal terhadap ancaman tersebut. Kompleksitas yang meningkat membuat para peneliti harus bekerja keras dan membutuhkan waktu untuk memahami cara kerja malware. Terdapat dua teknik dasar yang sering digunakan untuk melakukan analisis malware yaitu statis dan dinamis analisis, dan penelitian malware yang dilakukan selama ini masih berfokus pada analisis perilaku yang keberhasilan metode tersebut tergantung pada model malware. Penggunaan teknik signature based sangat tergantung pada perilaku malware yang dianalisis, analisis menjadi sulit ketika ditemukan malware baru yang menggunakan suatu teknik baru untuk menyulitkan sistem analisis. Berdasarkan uraian fakta yang disampaikan, dianggap perlu dibangun sebuah ontologi dalam melakukan analisis terhadap malware sehingga dapat digunakan sebagai pengemabangan, pemetaan pengetahuan serta mengindetifikasi tren, dan pola dalam melakukan analisis malware. Pada penelitian ini metode yang diusulkan adalah pengembangan dari metode Malware Analysis Body of Knowledge, dimana metode ini bekerja pada domain tertentu untuk memetakan karakteristik dan mengklasifikasi jenis malware yang akan dibahas. Pada penelitian ini berfokus kepada ontologi sebagai knowledge base dan pembahasannya lebih kepada memetakan karakteristik dan pengklasifikasian jenis malware.
Development of National Digital Evidence Metadata Bambang Sugiantoro
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i1.292

Abstract

The industrial era 4.0 has caused tremendous disruption in many sectors of life. The rapid development of information and communication technology has made the global industrial world undergo a revolution. The act of cyber-crime in Indonesia that utilizes computer equipment, mobile phones are increasingly increasing. The information in a file whose contents are explained about files is called metadata. The evidence items for cyber cases are divided into two types, namely physical evidence, and digital evidence. Physical evidence and digital evidence have different characteristics, the concept will very likely cause problems when applied to digital evidence. The management of national digital evidence that is associated with continued metadata is mostly carried out by researchers. Considering the importance of national digital evidence management solutions in the cyber-crime investigation process the research focused on identifying and modeling correlations with the digital image metadata security approach. Correlation analysis reads metadata characteristics, namely document files, sounds and digital evidence correlation analysis using standard file maker parameters, size, file type and time combined with digital image metadata. nationally designed the highest level of security is needed. Security-enhancing solutions can be encrypted against digital image metadata (EXIF). Read EXIF Metadata in the original digital image based on the EXIF 2.3 Standard ID Tag, then encrypt and insert it into the last line. The description process will return EXIF decryption results in the header image. This can secure EXIF Metadata information without changing the image quality
Data Search Process Optimization using Brute Force and Genetic Algorithm Hybrid Method Riwanto, Yudha; Nuruzzaman, Muhammad Taufiq; Uyun, Shofwatul; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 11 No. 2 (2022): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2022.3743

Abstract

High accuracy and speed in data search, which are aims at finding the best solution to a problem, are essential. This study examines the brute force method, genetic algorithm, and two proposed algorithms which are the development of the brute force algorithm and genetic algorithm, namely Multiple Crossover Genetic, and Genetics with increments values. Brute force is a method with a direct approach to solving a problem based on the formulation of the problem and the definition of the concepts involved. A genetic algorithm is a search algorithm that uses genetic evolution that occurs in living things as its basis. This research selected the case of determining the pin series by looking for a match between the target and the search result. To test the suitability of the method, 100-time tests were conducted for each algorithm. The results of this study indicated that brute force has the highest average generation rate of 737146.3469 and an average time of 1960.4296, and the latter algorithm gets the best score with an average generation rate of 36.78 and an average time of 0.0642.
Evaluation of the Maturity Level of Information Technology Security Systems Using KAMI Index Version 4.2 (Case Study: Islamic Boarding Schools in Yogyakarta Special Region Province) Arromdoni, Bad’ul Hilmi; Nuruzzaman, Muhammad Taufiq; 'Uyun, Shofwatul; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 12 No. 1 (2023): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.3987

Abstract

The development of information technology worldwide has changed very rapidly. There has been a data theft on the information system belonging to one of the most prominent Islamic Boarding Schools in the Yogyakarta area. Thus, special attention is needed to evaluate information technology security using the Information Security Index version 4.2. The research methods include extracting information, literature study, data collection, data validation, data analysis, and recommendations. The evaluation results are at the basic framework fulfilment level with a value of 343; the electronic system category has a low status with a value of 15 and 5 improvements; the governance category,  the risk management category,  the framework category,  the asset management category, and the information security technology category, have a maturity level II status with 12, five, eight, four, and eight recommendations respectively, while the supplement category for third party security areas with a value of 60%, securing cloud infrastructure services 56% and protecting personal data 61% with 14 recommendations.
Co-Authors Abdul Haris Muhammad Abdullah, Mohd. Fikri Azli bin Afrianto, Nurdi Agung Fatwanto Ahmad Luthfie Ahmad Subki Akbar, Bintang Faisal Akbar, Muhammad Tulus Akbar, Reonaldo Al Jum'ah, Muhammad Na'im Alfani, Muhammad Nur Alfarizi, Naufal Faiz Alifah Amalia Amalia, Alifah Amanulloh, Rivkih Amin Pujiati Amin Retnoningsih Anbari, Muhamad Zaki Arromdoni, Bad’ul Hilmi Astari, M Rizky Asyhab, Naufal bahary, muhammad syaiful Bahry, Muhammad Syaeful Budi Permana Putra Budiman, Kholiq Candra, Dori Gusti Alex Dewantara, Rizki Efdika, Muhamad Fadil Elvanisa Ayu Muhsina, Elvanisa Ayu Endra Yuliawan Fahmi Romisa Gatra, Ramadhan Gunawan Gunawan Habibah, Berlian Ummu Hafizuddin, Faiz Akhmad Hakim, Fani Rakhman Hanif Hanif Hartono Hartono Helmi Rachman Hikmatyar, Firmansyah Gustav Idir Fitriyanto Idir Ika Arfiani Imtikhan Azmi, Himawan Istianto, Yudi Izdiharsant, Almaas Jazi Eko Istiyanto Karmesti, Danissa Wirna Kesumahadi, Lisdianto Dwi Khanif Setiyawan Mahbub Puba Fawzan Mahbub Puba Fawzan, Mahbub Puba Mahmuda, Muhimmatul Mardlian, M. Sa’id Abdurrohman Kunta Maria Ulfa Siregar Maria Ulfah Siregar Maria Ulfah Siregar Meiditra, Irzon Merisa Kurniasari Fadilla Muhamad Fadli Muhamad Zaki Anbari Muhammad Hambali, Muhammad Muhammad Reza Velayani Muhammad Taufiq Nuruzzaman Mujahidah, Latifatul Mulyana, Riyan Nana Supriyana Ngisomudin, Ngisomudin Nora Lizarti Nuruzzaman, Muhammad Taufiq Pomalingo, Suwito Prasdika, Prasdika Pratiwi, Millati Putry Wahyu Setyaningsih Qorry Aina Fitroh Rachman, Helmi Rahmadhan Gatra Retantyo Wardoyo Rini Audia Rinny Asasunnaja Riwanto, Yudha Romisa, Fahmi Rusnaldhy, Rusnaldhy Sakuri, Sakuri Sakuri, Sakuri Shofwatul 'Uyun Shofwatul ‘Uyun Son’Aniy, Irham Sophan Sofian Sri Hartati Sucinta, Hanny Handayani Sumarsono , Sumarsono Supriyono, Abdul Rohman Susilo Adi Widyanto Sutarno Sutarno Tasya Kumala Dewi, Bella Tri Widodo Utis Sutisna Warso Warso, Warso Wicaksono, Nur Kukuh Wildan Nadiyal Ahsan Winasis, Bima Putra Wishnu, Asep Yudi prayudi Yuha Bani Mahardhika