Claim Missing Document
Check
Articles

PERANCANGAN JARINGAN VPN DAN KEAMANAN DATA MENGGUNAKAN TUNELLING PADA LABORATORIUM KOMPUTER UIN SUNAN KALIJAGA YOGYAKARTA Afrianto, Nurdi; Candra, Dori Gusti Alex; Permana Putra, Budi; Meiditra, Irzon; Fitriyanto, Idir; Sugiantoro, Bambang
JURNAL TEKNIK INFORMATIKA UNIS Vol. 12 No. 1 (2024): Jutis (Jurnal Teknik Informatika)
Publisher : Universitas Islam Syekh Yusuf

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33592/jutis.v12i1.3074

Abstract

Metode utama untuk mengamankan dan mengenkripsi transmisi data melalui jaringan internet adalah dengan meggunakan virtual private network (VPN) atau jaringan pribadi virtual. Saat ini Laboratorium UIN Sunan Kalijaga belum terkoneksi antara komputer server dan klien hal ini menyebabkan sulitnya transfer data atau sharing data dan juga dalam transfer data ini user masih menggunakan media internet seperti email karena banyak data-data penting yang terdapat didalamnya yang sangat rentan jika email itu sendiri diretas oleh pihak yang tidak bertanggung jawab, sehingga kampus belum dapat memastikan keamanan data yang dikirim. Karena permasalahan tersebut, maka dilakukan perancangan VPN yang merupakan sarana untuk berkomunikasi dan mentransfer data dengan aman dan menjaga keabsahan data. Penelitian yang dilakukan dilaboratorium UIN Sunan Kalija Yogyakarta ini bertujuan untuk membangun atau merancang sebuah sistem jaringan pribadi virtual (VPN), yang dimana sistem ini berguna untuk memberikan keamanan pada data yang di transferkan dari komputer server ke komputer klien atau sebaiknya melalui jaringan publik. Menggunakan dua router Mikrotik, VPN diimplementasikan menggunakan protokol tunneling point to point (PPTP). Hanya sedikit penyesuaian yang dilakukan pada konfigurasi jaringan komputer untuk mengurangi biaya dan waktu implementasi. Pengujian yang dilakukan untuk menerapkan keamanan data pada jaringan VPN dengan menggunakan software wireshark yang dimana pada software ini dapat di gunakan untuk memantau jalannya aktivitas pada saat data ditransferkan atau diambil. Temuan penelitian menunjukkan bahwa ada koneksi VPN antara klien dan server komputer laboratorium. Selain itu, koneksi terus menerus antara Either-1 dan Either-2 melalui jaringan VPN yang sedang digunakan sangat berbahaya untuk menjaga keamanan.
ANALISIS QUALITY OF SERVICE JARINGAN WIRELESS SUKANET WiFi DI FAKULTAS SAINS DAN TEKNOLOGI UIN SUNAN KALIJAGA Bambang Sugiantoro; Yuha Bani Mahardhika
JURNAL TEKNIK INFORMATIKA Vol 10, No 2 (2017): Jurnal Teknik Informatika
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/jti.v10i2.7027

Abstract

ABSTRAK Performa layanan jaringan Internet pada UIN Sunan Kalijaga Fakultas Sains dan Teknologi masih belum maksimal, yaitu memiliki tingkat kualitas delay sebesar 159 milidetik menurut TIPHON Bagus. Besar Throughput sebesar 9.0 MBps dan presentase Throughput sebesar 50 % dikategorikan menurut standarisasi TIPHON sedang. Dan memiliki nilai packet loss ratio sebesar 36 % dikategorikan menurut standarisasi TIPHON adalah jelek. ABSTRACT Internet service network performance in Islamic State University of Sunan Kalijaga environment in the faculty of science and technology area is still not maximal. It has a delay quality level of 159 milliseconds according to good TIPHON. Large throughput of 9.0 Mbps and throughput percentage of 50% are categorized according to standardized of normal TIPHON and it has a value of packet loss ratio of 36% categorized according to TIPHON standardization is bad.How to Cite : Sugiantoro, B. Mahardhika, Y.B . (2017). ANALISIS QUALITY OF SERVICE JARINGAN WIRELESS SUKANET WiFi DI FAKULTAS SAINS DAN TEKNOLOGI UIN SUNAN KALIJAGA. Jurnal Teknik Informatika, 10(2), 191-201. doi:10.15408/jti.v10i2.7027Permalink/DOI: http://dx.doi.org/10.15408/jti.v10i2.7027
Evaluasi Keamanan Sistem Informasi Pada Penyedia Layanan Cloud Dan Perlindungan Data Pribadi Berdasarkan Index Kami Versi 4.2 (Studi Kasus : PTIPD UIN Sunan Kalijaga Yogyakarta) Hafizuddin, Faiz Akhmad; Sugiantoro, Bambang
Cyber Security dan Forensik Digital Vol. 7 No. 1 (2024): Edisi Bulan Mei Tahun 2024
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.1.4280

Abstract

Pusat Teknologi Informasi Dan Pangkalan Data (PTIPD) merupakan salah satu Unit Pelaksana Teknis (UPT) yang ada di Universitas Islam Negri Sunan Kalijaga Yogyakarta yang memiliki tugas untuk mengelola dan mengembangkan sistem informasi manajemen, pengembangan, pemeliharaan jaringan dan aplikasi, pengelolaan basis data, pengembangan teknologi lainnya, dan kerjasama jaringan. Perkembangan teknologi yang pesat dan pola bisnis yang dinamis menyebabkan munculnya risiko keamanan informasi baru. Keterlibatan pihak ketiga penyedia layanan dalam suatu instansi menimbulkan risiko terkait keberadaan dan keterlibatan pihak eksternal. Layanan berbasis infrastruktur awan (Cloud) memberikan peluang efisiensi dan peningkatan kinerja yang sangat signifikan bagi instansi, akan tetapi risiko terkait data yang berada pada pengendalian pihak ketiga (penyelenggara layanan) perlu dimitgasi. Penggunaan tools indeks KAMI dalam penelitian ini hanya berfokus dalam tiga area diantaranya: pengamanan keterlibatan pihak ketiga, pengamanan layanan infrastrukutur awan dan perlindungan data pribadi. Hasil dari evaluasi tingkat presentase kelengkapan dan efektifitas penggunaan teknologi dalam pengamanan aset informasi di PTIPD UIN Sunan Kalijaga Yogyakarta yaitu: untuk pengamanan keterlibatan pihak ketiga mendapatkan presentase 49%, pengamanan layanan infrastruktur awan (cloud) sebesar 33% dan untuk pengamanan perlindungan data pribadi mendapatkan presentase 67%. Rekomendasi dari penelitian ini dapat di jadikan sebagai bahan pertimbangan da evaluasi bagi instansi dalam melakukan perbaikan yang berkaitan dengan mitigasi risiko dan pencegahan terhadap kerentanan keamanan informasi, serta dapat memastikan aturan dapat tercapai dengan baik dan keputusan terhadap kebijakan keamanan informasi dalam satu instansi di masa depan. Evaluation Of Information System Security In Cloud Service Provider And Protection Of Personal Data Based On Index Kami Version 4.2 (Case Study: PTIPD UIN Sunan Kalijaga Yogyakarta) Kata kunci: Indeks KAMI, PTIPD, Keamanan Informasi, Penyedia Layanan Cloud, Perlindungan Data Pribadi ------------------------------------------------------------------------- The Center for Information Technology and Database (PTIPD) is one of the Technical Implementation Units (UPT) at the Islamic University of Sunan Kalijaga, Yogyakarta, which has the task of managing and developing management information systems, developing, maintaining networks and applications, managing databases, developing other technologies, and network cooperation. Rapid technological developments and dynamic business patterns have led to the emergence of new information security risks. The involvement of third party service providers in an agency creates risks related to the presence and involvement of external parties. Cloud infrastructure-based services (Cloud) provide significant efficiency and performance improvement opportunities for agencies, but risks related to data that are in the control of third parties (service providers) need to be mitigated. The use of the KAMI index tools in this study focuses only on three areas including: securing third party involvement, securing cloud infrastructure services and protecting personal data. The results of evaluating the percentage level of completeness and effectiveness of using technology in securing information assets at PTIPD UIN Sunan Kalijaga Yogyakarta, namely: for securing third party involvement gets a percentage of 49%, securing cloud infrastructure services (cloud) for 33% and for securing personal data protection getting a percentage 67%. Recommendations from this research can be used as material for consideration and evaluation for agencies in making improvements related to risk mitigation and prevention of information security vulnerabilities, and can ensure that rules can be achieved properly and decisions on information security policies within an agency in the future. Keywords: KAMI Index, PTIPD, Information Security, Cloud Service Provider,  Protection Of Personal Data
Evaluasi Tingkat Kesiapan Keamanan Informasi Pada SMK XYZ Menggunakan Indeks KAMI Versi 4.2 Imtikhan Azmi, Himawan; tulus_akbar; Tasya Kumala Dewi, Bella; Sugiantoro, Bambang
Cyber Security dan Forensik Digital Vol. 7 No. 1 (2024): Edisi Bulan Mei Tahun 2024
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.1.4422

Abstract

Keamanan informasi penting untuk diperhatikan agar kerahasiaan informasi, data, manusia dan alat pendukung terlindungi. Namun, bahaya ancaman dalam bidang TI mengintai penyelenggara sistem elektronik (PSE), kejahatan yang timbul tidak hanya menyerang organisasi besar, melainkan menyerang berbagai tingkatan,   ukuran, maupun tingkat kepentingan organisasi penyelenggara layanan TI. Oleh karena itu pentingnya melakukan evaluasi ke penyedia layanan informasi untuk memaksimalkan sumberdaya dalam menghadapi ancaman. Tujuan penelitian ini untuk melakukan evaluasi penyelenggaraan layanan TI  menggunakan Indeks KAMI pada SMK XYZ. Proses evaluasi dilakukan dengan pendekatan kuantitatif. Data dikumpulkan dari hasil wawancara dan observasi dari PSE. Data yang terkumpul kemudian di analisis menggunakan aplikasi Indeks KAMI 4.2. Hasilnya, SMK XYZ termasuk kategori Rendah dengan skor SE 14, dengan status kesiapan Tidak Layak dengan skor Tingkat Penerapan Standar ISO27001 sesuai Kategori SE yaitu 314. Skor tiap area yang dievaluasi yaitu Tata Kelola memperoleh skor 72 dengan tingkat kematangan valid Tingkat II, Pengelolaan Risiko memperoleh skor 15 dengan tingkat kematangan valid Tingkat I, Kerangka Kerja Keamanan Informasi memperoleh skor 91 dengan tingkat kematangan valid Tingkat II, Pengelolaan Aset memperoleh skor 78 dengan tingkat kematangan valid Tingkat I+, Teknologi dan Keamanan Informasi memperoleh skor 58 dengan tingkat kematangan valid Tingkat II, dan bagian terakhir adalah Suplemen sebagai bagian tambahan pengukuran dengan tiga aspek di dalamnya yaitu aspek Pengamanan Keterlibatan Pihak Ketiga memperoleh nilai 33%, aspek Pengamanan Layanan Infrastruktur Awan memperoleh nilai 33%, dan aspek Perlindungan Data Pribadi memperoleh nilai 67%. Hasil evaluasi kesiapan (kelengkapan dan kematangan) yang telah dilakukan menjadi perhatian untuk meningkatkan keamanan informasi pada area dilakukan. Kata kunci: Indeks KAMI, SMKI, Keamanan Informasi, ISO/IEC27001:2013 ---------------------------- Ensuring information security is imperative to safeguard the confidentiality of data, individuals, and supporting tools. However, persistent threats in the realm of Information Technology (IT) pose a constant risk to electronic system providers. These threats target organizations of diverse sizes, levels, and interests within the IT service domain. Consequently, evaluating information service providers becomes crucial for optimizing resources in countering potential threats. This study focuses on assessing IT service delivery using the KAMI Index at SMK XYZ, employing a quantitative approach. Data is gathered through interviews and observations within the electronic system provider context. The collected data is then analyzed using the OUR Index 4.2 application. The evaluation reveals that SMK XYZ falls into the Low category, scoring 14 in the SE index, indicating an Unfit readiness status with an ISO27001 Standard Implementation Level score of 314, aligning with the SE Category. Further analysis of specific areas shows varying maturity levels. Governance scores 72 at Level II, Risk Management scores 15 at Level I, Information Security Framework scores 91 at Level II, Asset Management scores 78 at Level I +, and Technology and Information Security scores 58 at Level II. The Supplement section, addressing additional measurement aspects, records scores of 33% for Securing Third Party Involvement, 33% for Securing Cloud Infrastructure Services, and 67% for Personal Data Protection. These findings underscore the need for enhanced information security measures within the evaluated context. Keywords: KAMI Index, SMKI, Information Security, ISO/IEC27001:2013.
Evaluasi Tingkat Keamanan Indeks KAMI (Studi Kasus : Universitas X) bahary, muhammad syaiful; Sugiantoro, Bambang
Cyber Security dan Forensik Digital Vol. 7 No. 2 (2024): Edisi November 2024
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.2.4634

Abstract

Penelitian ini bertujuan untuk mengevaluasi tingkat keamanan informasi di Universitas X dengan menggunakan Indeks KAMI, alat yang dikembangkan oleh Badan Siber dan Sandi Negara untuk mengukur kesiapan dan kematangan keamanan informasi berdasarkan standar internasional ISO/IEC 27001:2013. Hasil penelitian menunjukkan bahwa Universitas X memiliki tingkat kesiapan dan kematangan yang baik dengan skor keseluruhan 638. Namun, terdapat beberapa area yang membutuhkan perbaikan lebih lanjut. Evaluasi mencakup berbagai aspek, termasuk tata kelola keamanan informasi, manajemen risiko, kerangka kerja keamanan, manajemen aset, teknologi keamanan, serta perlindungan data pribadi dan keterlibatan pihak ketiga. Berdasarkan temuan ini, diberikan rekomendasi untuk meningkatkan pengelolaan keamanan informasi di Universitas X agar lebih efektif dan efisien. Kata kunci: Indeks KAMI; tingkat keamanan informasi ------------------------------------- Abstract This study aims to evaluate the level of information security at Universitas X using the KAMI Index, a tool developed by the National Cyber and Crypto Agency to measure the readiness and maturity of information security based on the international standard ISO/IEC 27001:2013. The results indicate that Universitas X has a good level of readiness and maturity with an overall score of 638. However, several areas require further improvement. The evaluation covers various aspects, including information security governance, risk management, security framework, asset management, security technology, as well as data protection and third-party involvement. Based on these findings, recommendations are provided to enhance the information security management at Universitas X to be more effective and efficient.   Keywords: US Index; information security level
Evaluation and Implementation of IT Governance Using the 2019 COBIT Framework at the Department of Food Security, Agriculture and Fisheries of Balangan Regency Rini Audia; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 11 No. 1 (2022): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2022.3381

Abstract

The food security, fisheries and agriculture services work with local government to help the community. In carrying out its work, the government applies information technology to achieve the goals. Therefore, it is necessary to have an IT governance design to ensure the alignment of the government’s objectives and the use of IT. Governance is an important asset to measure the effectiveness and efficiency of work process improvement using IT. This research is conducted because there has never been an IT governance design assessment. The analysis and design of IT governance at government agencies are carried out using the COBIT 2019 framework to measure the level of IT capability. The research method used is descriptive qualitative by conducting interviews with influential government parties. This study obtained an IT governance design and detected important processes for the domains used, namely EDM04, APO04, APO07, APO08, APO11, BAI03, BAI08, BAI10.
Factors Influencing 5G Adoption in Java: A Theory of Consumption Value and Stimulus-Organism-Response Approach Kesumahadi, Lisdianto Dwi; Nuruzzaman, Muhammad Taufiq; Sugiantoro, Bambang; Sumarsono , Sumarsono
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol. 11 No. 1 (2025): March
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v11i1.30557

Abstract

The rapid advancement of information and communication technology has led to a significant transformation in telecommunication networks, particularly with the introduction of 5G technology, which offers high speed, low latency, and extensive device connectivity. However, the adoption of 5G in Indonesia, particularly in Java, remains challenging due to unequal network distribution and disparities in purchasing power between urban and rural areas. This study examines the key factors influencing consumer acceptance of 5G services in Java using the Theory of Consumption Value (TCV) and Stimulus-Organism-Response (SOR) framework. A descriptive quantitative approach was applied, collecting primary data from 200 respondents through purposive sampling. Data were analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM). The findings reveal that Safety Affordance and Facilitation Conditions significantly influence consumption value, whereas Visibility Affordance and Guidance Affordance do not. These results highlight the importance of security perceptions and supporting infrastructure in 5G adoption. This study contributes to the theoretical understanding of technology adoption by integrating TCV and SOR in the context of 5G and provides practical recommendations for policymakers and service providers to enhance 5G implementation, particularly by addressing infrastructure gaps in rural areas.
The Development of a Web Profile System for SMK N 1 Singingi Hilir Using the Prototyping Method Sucinta, Hanny Handayani; Mahmuda, Muhimmatul; Mujahidah, Latifatul; Sugiantoro, Bambang
IJISTECH (International Journal of Information System and Technology) Vol 9, No 1 (2025): The June Edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v9i1.395

Abstract

The development of a web-based information system for the school profile is a strategic step in improving the accessibility of information and interaction between the school and the community, particularly prospective students and parents. This study aims to develop a web profile system for SMK N 1 Singingi Hilir by applying the Prototyping method, so that the system can be developed based on user feedback during the design process. This system presents comprehensive information about the school profile, expertise programs, facilities, student activities, and other important information. With the Prototyping approach, system development is carried out iteratively by building an initial prototype, which is then improved based on user evaluations. The result of this development is expected to enhance school promotion as well as transparency and efficiency in delivering information.
The Development of a Web Profile System for SMK N 1 Singingi Hilir Using the Prototyping Method Sucinta, Hanny Handayani; Mahmuda, Muhimmatul; Mujahidah, Latifatul; Sugiantoro, Bambang
IJISTECH (International Journal of Information System and Technology) Vol 9, No 1 (2025): The June Edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v9i1.395

Abstract

The development of a web-based information system for the school profile is a strategic step in improving the accessibility of information and interaction between the school and the community, particularly prospective students and parents. This study aims to develop a web profile system for SMK N 1 Singingi Hilir by applying the Prototyping method, so that the system can be developed based on user feedback during the design process. This system presents comprehensive information about the school profile, expertise programs, facilities, student activities, and other important information. With the Prototyping approach, system development is carried out iteratively by building an initial prototype, which is then improved based on user evaluations. The result of this development is expected to enhance school promotion as well as transparency and efficiency in delivering information.
Performance Evaluation of Vehicular Ad Hoc Networks Considering Malicious Node Impact on Quality of Services Metrics Alfarizi, Naufal Faiz; Nuruzzaman, Muhammad Taufiq; Uyun, Shofwatul; Sugiantoro, Bambang; Abdullah, Mohd. Fikri Azli bin
JOIN (Jurnal Online Informatika) Vol 10 No 2 (2025)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v10i2.1568

Abstract

Vehicular Ad Hoc Networks (VANETs), a subset of mobile ad hoc networks (MANETs), is essential for enabling communication between vehicles in intelligent transportation systems. However, their dynamic and decentralized nature exposes them to significant security threats, particularly from malicious nodes. Attacks such as black holes and wormholes can severely degrade network performance by causing packet loss and increasing end-to-end delays. This paper aims to evaluate the impact of malicious node behavior on VANET performance using key Quality of Service (QoS) parameters, including throughput, end-to-end delay, jitter, packet delivery ratio (PDR), and packet loss ratio (PLR). The specific objective is to analyze how black hole and wormhole attacks affect communication efficiency in VANET environments. The main contribution of this work lies in the integration of Simulation of Urban Mobility (SUMO) for realistic traffic scenario generation with Network Simulator 3 (NS-3) for detailed network performance evaluation. This approach enables comprehensive simulation of VANET behavior under attack conditions. The findings provide valuable insights into the vulnerabilities of VANETs and form a basis for the design of more robust and secure vehicular communication systems.
Co-Authors Abdul Haris Muhammad Abdullah, Mohd. Fikri Azli bin Afrianto, Nurdi Agung Fatwanto Ahmad Luthfie Akbar, Bintang Faisal Akbar, Muhammad Tulus Akbar, Reonaldo Al Jum'ah, Muhammad Na'im Alfani, Muhammad Nur Alfarizi, Naufal Faiz Alifah Amalia Amalia, Alifah Amanulloh, Rivkih Amin Pujiati Amin Retnoningsih Anbari, Muhamad Zaki Arromdoni, Bad’ul Hilmi Astari, M Rizky Asyhab, Naufal bahary, muhammad syaiful Bahry, Muhammad Syaeful Budi Permana Putra Budiman, Kholiq Candra, Dori Gusti Alex Dewantara, Rizki Efdika, Muhamad Fadil Elvanisa Ayu Muhsina, Elvanisa Ayu Endra Yuliawan Fahmi Romisa Gatra, Rahmadhan Gatra, Ramadhan Gunawan Gunawan Habibah, Berlian Ummu Habibullah, Ricky Hafizuddin, Faiz Akhmad Hakim, Fani Rakhman Hanif Hanif Hartono Hartono Helmi Rachman Hikmatyar, Firmansyah Gustav Idir Fitriyanto Idir Ika Arfiani Imtikhan Azmi, Himawan Istianto, Yudi Izdiharsant, Almaas Jazi Eko Istiyanto Karmesti, Danissa Wirna Kesumahadi, Lisdianto Dwi Khanif Setiyawan Khusna, Tachiyya Nailal Mahardhika, Yuha Bani Mahbub Puba Fawzan Mahbub Puba Fawzan, Mahbub Puba Mahmuda, Muhimmatul Mardlian, M. Sa’id Abdurrohman Kunta Maria Ulfa Siregar Maria Ulfah Siregar Maria Ulfah Siregar Mastur Mastur Meiditra, Irzon Merisa Kurniasari Fadilla Muhamad Fadli Muhamad Soleh Muhamad Zaki Anbari Muhammad Hambali, Muhammad Muhammad Reza Velayani Muhammad Taufiq Nuruzzaman Mujahidah, Latifatul Mulyana, Riyan Nana Kariada Trimartuti Nana Supriyana Ngisomudin, Ngisomudin Nora Lizarti Nugrah Rekto Prabowo Nur Wibowo, Trio Nuruzzaman, Muhammad Taufiq Panggih Gumelaring Praja Pomalingo, Suwito Prasdika, Prasdika Pratiwi, Millati Putry Wahyu Setyaningsih Qorry Aina Fitroh Rachman, Helmi Retantyo Wardoyo Rini Audia Rinny Asasunnaja Riwanto, Yudha Romisa, Fahmi Rusnaldhy, Rusnaldhy Sakuri, Sakuri Sakuri, Sakuri Shofwatul 'Uyun Shofwatul ‘Uyun Son’Aniy, Irham Sophan Sofian Sri Hartati Subki, Ahmad Sucinta, Hanny Handayani Sumarsono , Sumarsono Sunyoto Sunyoto Supiyana, Nana Supriyono, Abdul Rohman Susilo Adi Widyanto Sutarno Sutarno Tasya Kumala Dewi, Bella Tri Widodo Utis Sutisna Warso Warso, Warso Wicaksono, Nur Kukuh widowati widowati Wildan Nadiyal Ahsan Winasis, Bima Putra Wishnu, Asep Yudi prayudi Yuha Bani Mahardhika