Claim Missing Document
Check
Articles

Evaluation of IT Governance at Islamic Boarding Schools in the Special Region of Yogyakarta based on the COBIT 5 Framework Mardlian, M. Sa’id Abdurrohman Kunta; Nuruzzaman, Muhammad Taufiq; 'Uyun, Shofwatul; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 11 No. 2 (2022): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2022.3988

Abstract

Nowdays,  almost all aspects of company operations are supported by information technology systems.  Many pesantren have utilized information technology in supporting operational activities such as: using computers, accessing the internet, having a website, and managing information technology systems. The purpose of this study is to implement the COBIT 5 framework in the DSS (Deliver, Service, Support) domain in evaluating information technology governance and calculate the capability level value and gap analysis at Islamic Boarding Schools. The results of the Capability Level Analysis in the COBIT 5 DSS Domain obtained from 42 Islamic Boarding Schools showed that DSS01, DSS02, and DSS03 on average were at level 2, DSS04, DSS05, DSS06 on average at level 1. The results of the Gap Analysis in the COBIT 5 DSS Domain show that in DSS01, DSS02, and DSS03 the average GAP is 3, in DSS04, DSS05, and DSS06 the average GAP is 4. The result shows that Information Technology Governance in Islamic Boarding Schools in the Special Region of Yogyakarta based on an assessment with the COBIT 5 Framework is still low status and needs to be improved, as evidenced by the low Capability Level Value and the high GAP Value.
Analysis of Factors Affecting the Students’ Acceptance Level of E-Commerce Applications in Yogyakarta Using Modified UTAUT 2 Candra, Dori Gusti Alex; Nuruzzaman, Muhammad Taufiq; 'Uyun, Shofwatul; Sugiantoro, Bambang; Pratiwi, Millati
IJID (International Journal on Informatics for Development) Vol. 12 No. 1 (2023): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.3990

Abstract

Yogyakarta is listed as the region with the highest number of residents engaging in e-commerce transactions. A total of 10.2% of the population are active e-commerce sellers, while 16.7% belong to the buyer category. Research by IDN Times showed that e-commerce application users have been dominated by students, with a percentage of 44.2%.  The purpose of this study is to analyze the factors that influence students’ level of acceptance of e-commerce applications in Yogyakarta using the modified UTAUT 2. This is quantitative research with multiple linear regression models using SPSS software version 25 with a sample size of 303 people. Data analysis in this study was conducted in a few steps, including descriptive analysis, validity test, reliability test, classical assumption test and hypothesis testing. The results of this study indicate that the student’s level of acceptance of e-commerce applications is within good criteria. The variables that have a positive effect on the behaviour intention (BI) are performance expectancy (PE), effort expectancy (EE), social influence (SI), facilitating conditions (FC), hedonic motivation (HM), habit (HB), price value (PV), perceived risk (PR), perceived security (PS), and trust (TR) are variables that negatively affect the variable behaviour intention (BI). All independent variables affect the dependent variable or behaviour intention (BI) with a total of 63.3% and the difference with a total of 36.7% is caused by other factors not examined by the researcher.
Comparison of K-Nearest Neighbor, Support Vector Machine, Random Forest, and C 4.5 Algorithms on Indoor Positioning System Astari, M Rizky; Nuruzzaman, Muhammad Taufiq; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 12 No. 1 (2023): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2023.3991

Abstract

Today’s most common Positioning System applied is the Global Positioning System (GPS). Positioning System is considered accurate when outdoors, but it becomes a problem when indoors making it difficult to read the GPS signal. Many academics are actively working on indoor positioning solutions to address GPS's drawbacks. Because WiFi Access Point signals are frequently employed in multiple studies, they are used as research material. This study compares the classification algorithms KNN, SVM, Random Forest, and C 4.5 to see which algorithm provides more accurate calculations. The fingerprinting method was employed in the process of collecting signal strength data in each room of the Terpadu Laboratory Building at UIN Sunan Kalijaga using 30 rooms and a total dataset of 5,977 data. The data is utilized to run experiments to determine the location using various methods. According to the experimental data, the Random Forest algorithm achieves an accuracy rate of 83%, C4.5 81%, and KNN 80%, while the SVM method achieves the lowest accuracy rate of 57%.
Enhancing the resistance of password hashing using binary randomization through logical gates Anbari, Muhamad Zaki; Sugiantoro, Bambang
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 5: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i5.pp5400-5407

Abstract

Digitalization in various sectors makes information security issues very crucial. Information security follows the authentication, authorization, and accounting (AAA) principle, where one of the most important parts is authentication. The most widely used authentication method is username-password. The best method to secure a user-pass is to convert the plaintext using a hash so that the converted plaintext cannot be recovered. However, with higher technology, hackers can crack the ciphertext using brute force. This research proposes a username-password scrambling algorithm before it is fed into the hash function to improve resilience from attacks. This algorithm is named logical gates (LG). It works by converting the user pass into binary form, adding salt, and scrambling it with certain logical gates before inserting it into the hash function. Testing is divided into two: time of execution and attack resistance. Time of execution results show that LG takes 0.0443432033 s, while without LG takes 0.01403197646 s. The resistance of attack results show that the plaintext of the hash amplified by LG cannot be cracked at all and increases the attack time by 321.3% at prefix and 161.3% at postfix, while without LG, the plain text can be found for a certain duration of time.
PERANCANGAN JARINGAN VPN DAN KEAMANAN DATA MENGGUNAKAN TUNELLING PADA LABORATORIUM KOMPUTER UIN SUNAN KALIJAGA YOGYAKARTA Afrianto, Nurdi; Candra, Dori Gusti Alex; Permana Putra, Budi; Meiditra, Irzon; Fitriyanto, Idir; Sugiantoro, Bambang
JURNAL TEKNIK INFORMATIKA UNIS Vol. 12 No. 1 (2024): Jutis (Jurnal Teknik Informatika)
Publisher : Universitas Islam Syekh Yusuf

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33592/jutis.v12i1.3074

Abstract

Metode utama untuk mengamankan dan mengenkripsi transmisi data melalui jaringan internet adalah dengan meggunakan virtual private network (VPN) atau jaringan pribadi virtual. Saat ini Laboratorium UIN Sunan Kalijaga belum terkoneksi antara komputer server dan klien hal ini menyebabkan sulitnya transfer data atau sharing data dan juga dalam transfer data ini user masih menggunakan media internet seperti email karena banyak data-data penting yang terdapat didalamnya yang sangat rentan jika email itu sendiri diretas oleh pihak yang tidak bertanggung jawab, sehingga kampus belum dapat memastikan keamanan data yang dikirim. Karena permasalahan tersebut, maka dilakukan perancangan VPN yang merupakan sarana untuk berkomunikasi dan mentransfer data dengan aman dan menjaga keabsahan data. Penelitian yang dilakukan dilaboratorium UIN Sunan Kalija Yogyakarta ini bertujuan untuk membangun atau merancang sebuah sistem jaringan pribadi virtual (VPN), yang dimana sistem ini berguna untuk memberikan keamanan pada data yang di transferkan dari komputer server ke komputer klien atau sebaiknya melalui jaringan publik. Menggunakan dua router Mikrotik, VPN diimplementasikan menggunakan protokol tunneling point to point (PPTP). Hanya sedikit penyesuaian yang dilakukan pada konfigurasi jaringan komputer untuk mengurangi biaya dan waktu implementasi. Pengujian yang dilakukan untuk menerapkan keamanan data pada jaringan VPN dengan menggunakan software wireshark yang dimana pada software ini dapat di gunakan untuk memantau jalannya aktivitas pada saat data ditransferkan atau diambil. Temuan penelitian menunjukkan bahwa ada koneksi VPN antara klien dan server komputer laboratorium. Selain itu, koneksi terus menerus antara Either-1 dan Either-2 melalui jaringan VPN yang sedang digunakan sangat berbahaya untuk menjaga keamanan.
ANALISIS QUALITY OF SERVICE JARINGAN WIRELESS SUKANET WiFi DI FAKULTAS SAINS DAN TEKNOLOGI UIN SUNAN KALIJAGA Bambang Sugiantoro; Yuha Bani Mahardhika
JURNAL TEKNIK INFORMATIKA Vol 10, No 2 (2017): Jurnal Teknik Informatika
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/jti.v10i2.7027

Abstract

ABSTRAK Performa layanan jaringan Internet pada UIN Sunan Kalijaga Fakultas Sains dan Teknologi masih belum maksimal, yaitu memiliki tingkat kualitas delay sebesar 159 milidetik menurut TIPHON Bagus. Besar Throughput sebesar 9.0 MBps dan presentase Throughput sebesar 50 % dikategorikan menurut standarisasi TIPHON sedang. Dan memiliki nilai packet loss ratio sebesar 36 % dikategorikan menurut standarisasi TIPHON adalah jelek. ABSTRACT Internet service network performance in Islamic State University of Sunan Kalijaga environment in the faculty of science and technology area is still not maximal. It has a delay quality level of 159 milliseconds according to good TIPHON. Large throughput of 9.0 Mbps and throughput percentage of 50% are categorized according to standardized of normal TIPHON and it has a value of packet loss ratio of 36% categorized according to TIPHON standardization is bad.How to Cite : Sugiantoro, B. Mahardhika, Y.B . (2017). ANALISIS QUALITY OF SERVICE JARINGAN WIRELESS SUKANET WiFi DI FAKULTAS SAINS DAN TEKNOLOGI UIN SUNAN KALIJAGA. Jurnal Teknik Informatika, 10(2), 191-201. doi:10.15408/jti.v10i2.7027Permalink/DOI: http://dx.doi.org/10.15408/jti.v10i2.7027
Evaluasi Keamanan Sistem Informasi Pada Penyedia Layanan Cloud Dan Perlindungan Data Pribadi Berdasarkan Index Kami Versi 4.2 (Studi Kasus : PTIPD UIN Sunan Kalijaga Yogyakarta) Hafizuddin, Faiz Akhmad; Sugiantoro, Bambang
Cyber Security dan Forensik Digital Vol. 7 No. 1 (2024): Edisi Bulan Mei Tahun 2024
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.1.4280

Abstract

Pusat Teknologi Informasi Dan Pangkalan Data (PTIPD) merupakan salah satu Unit Pelaksana Teknis (UPT) yang ada di Universitas Islam Negri Sunan Kalijaga Yogyakarta yang memiliki tugas untuk mengelola dan mengembangkan sistem informasi manajemen, pengembangan, pemeliharaan jaringan dan aplikasi, pengelolaan basis data, pengembangan teknologi lainnya, dan kerjasama jaringan. Perkembangan teknologi yang pesat dan pola bisnis yang dinamis menyebabkan munculnya risiko keamanan informasi baru. Keterlibatan pihak ketiga penyedia layanan dalam suatu instansi menimbulkan risiko terkait keberadaan dan keterlibatan pihak eksternal. Layanan berbasis infrastruktur awan (Cloud) memberikan peluang efisiensi dan peningkatan kinerja yang sangat signifikan bagi instansi, akan tetapi risiko terkait data yang berada pada pengendalian pihak ketiga (penyelenggara layanan) perlu dimitgasi. Penggunaan tools indeks KAMI dalam penelitian ini hanya berfokus dalam tiga area diantaranya: pengamanan keterlibatan pihak ketiga, pengamanan layanan infrastrukutur awan dan perlindungan data pribadi. Hasil dari evaluasi tingkat presentase kelengkapan dan efektifitas penggunaan teknologi dalam pengamanan aset informasi di PTIPD UIN Sunan Kalijaga Yogyakarta yaitu: untuk pengamanan keterlibatan pihak ketiga mendapatkan presentase 49%, pengamanan layanan infrastruktur awan (cloud) sebesar 33% dan untuk pengamanan perlindungan data pribadi mendapatkan presentase 67%. Rekomendasi dari penelitian ini dapat di jadikan sebagai bahan pertimbangan da evaluasi bagi instansi dalam melakukan perbaikan yang berkaitan dengan mitigasi risiko dan pencegahan terhadap kerentanan keamanan informasi, serta dapat memastikan aturan dapat tercapai dengan baik dan keputusan terhadap kebijakan keamanan informasi dalam satu instansi di masa depan. Evaluation Of Information System Security In Cloud Service Provider And Protection Of Personal Data Based On Index Kami Version 4.2 (Case Study: PTIPD UIN Sunan Kalijaga Yogyakarta) Kata kunci: Indeks KAMI, PTIPD, Keamanan Informasi, Penyedia Layanan Cloud, Perlindungan Data Pribadi ------------------------------------------------------------------------- The Center for Information Technology and Database (PTIPD) is one of the Technical Implementation Units (UPT) at the Islamic University of Sunan Kalijaga, Yogyakarta, which has the task of managing and developing management information systems, developing, maintaining networks and applications, managing databases, developing other technologies, and network cooperation. Rapid technological developments and dynamic business patterns have led to the emergence of new information security risks. The involvement of third party service providers in an agency creates risks related to the presence and involvement of external parties. Cloud infrastructure-based services (Cloud) provide significant efficiency and performance improvement opportunities for agencies, but risks related to data that are in the control of third parties (service providers) need to be mitigated. The use of the KAMI index tools in this study focuses only on three areas including: securing third party involvement, securing cloud infrastructure services and protecting personal data. The results of evaluating the percentage level of completeness and effectiveness of using technology in securing information assets at PTIPD UIN Sunan Kalijaga Yogyakarta, namely: for securing third party involvement gets a percentage of 49%, securing cloud infrastructure services (cloud) for 33% and for securing personal data protection getting a percentage 67%. Recommendations from this research can be used as material for consideration and evaluation for agencies in making improvements related to risk mitigation and prevention of information security vulnerabilities, and can ensure that rules can be achieved properly and decisions on information security policies within an agency in the future. Keywords: KAMI Index, PTIPD, Information Security, Cloud Service Provider,  Protection Of Personal Data
Evaluasi Tingkat Kesiapan Keamanan Informasi Pada SMK XYZ Menggunakan Indeks KAMI Versi 4.2 Imtikhan Azmi, Himawan; tulus_akbar; Tasya Kumala Dewi, Bella; Sugiantoro, Bambang
Cyber Security dan Forensik Digital Vol. 7 No. 1 (2024): Edisi Bulan Mei Tahun 2024
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.1.4422

Abstract

Keamanan informasi penting untuk diperhatikan agar kerahasiaan informasi, data, manusia dan alat pendukung terlindungi. Namun, bahaya ancaman dalam bidang TI mengintai penyelenggara sistem elektronik (PSE), kejahatan yang timbul tidak hanya menyerang organisasi besar, melainkan menyerang berbagai tingkatan,   ukuran, maupun tingkat kepentingan organisasi penyelenggara layanan TI. Oleh karena itu pentingnya melakukan evaluasi ke penyedia layanan informasi untuk memaksimalkan sumberdaya dalam menghadapi ancaman. Tujuan penelitian ini untuk melakukan evaluasi penyelenggaraan layanan TI  menggunakan Indeks KAMI pada SMK XYZ. Proses evaluasi dilakukan dengan pendekatan kuantitatif. Data dikumpulkan dari hasil wawancara dan observasi dari PSE. Data yang terkumpul kemudian di analisis menggunakan aplikasi Indeks KAMI 4.2. Hasilnya, SMK XYZ termasuk kategori Rendah dengan skor SE 14, dengan status kesiapan Tidak Layak dengan skor Tingkat Penerapan Standar ISO27001 sesuai Kategori SE yaitu 314. Skor tiap area yang dievaluasi yaitu Tata Kelola memperoleh skor 72 dengan tingkat kematangan valid Tingkat II, Pengelolaan Risiko memperoleh skor 15 dengan tingkat kematangan valid Tingkat I, Kerangka Kerja Keamanan Informasi memperoleh skor 91 dengan tingkat kematangan valid Tingkat II, Pengelolaan Aset memperoleh skor 78 dengan tingkat kematangan valid Tingkat I+, Teknologi dan Keamanan Informasi memperoleh skor 58 dengan tingkat kematangan valid Tingkat II, dan bagian terakhir adalah Suplemen sebagai bagian tambahan pengukuran dengan tiga aspek di dalamnya yaitu aspek Pengamanan Keterlibatan Pihak Ketiga memperoleh nilai 33%, aspek Pengamanan Layanan Infrastruktur Awan memperoleh nilai 33%, dan aspek Perlindungan Data Pribadi memperoleh nilai 67%. Hasil evaluasi kesiapan (kelengkapan dan kematangan) yang telah dilakukan menjadi perhatian untuk meningkatkan keamanan informasi pada area dilakukan. Kata kunci: Indeks KAMI, SMKI, Keamanan Informasi, ISO/IEC27001:2013 ---------------------------- Ensuring information security is imperative to safeguard the confidentiality of data, individuals, and supporting tools. However, persistent threats in the realm of Information Technology (IT) pose a constant risk to electronic system providers. These threats target organizations of diverse sizes, levels, and interests within the IT service domain. Consequently, evaluating information service providers becomes crucial for optimizing resources in countering potential threats. This study focuses on assessing IT service delivery using the KAMI Index at SMK XYZ, employing a quantitative approach. Data is gathered through interviews and observations within the electronic system provider context. The collected data is then analyzed using the OUR Index 4.2 application. The evaluation reveals that SMK XYZ falls into the Low category, scoring 14 in the SE index, indicating an Unfit readiness status with an ISO27001 Standard Implementation Level score of 314, aligning with the SE Category. Further analysis of specific areas shows varying maturity levels. Governance scores 72 at Level II, Risk Management scores 15 at Level I, Information Security Framework scores 91 at Level II, Asset Management scores 78 at Level I +, and Technology and Information Security scores 58 at Level II. The Supplement section, addressing additional measurement aspects, records scores of 33% for Securing Third Party Involvement, 33% for Securing Cloud Infrastructure Services, and 67% for Personal Data Protection. These findings underscore the need for enhanced information security measures within the evaluated context. Keywords: KAMI Index, SMKI, Information Security, ISO/IEC27001:2013.
Evaluasi Tingkat Keamanan Indeks KAMI (Studi Kasus : Universitas X) bahary, muhammad syaiful; Sugiantoro, Bambang
Cyber Security dan Forensik Digital Vol. 7 No. 2 (2024): Edisi November 2024
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2024.7.2.4634

Abstract

Penelitian ini bertujuan untuk mengevaluasi tingkat keamanan informasi di Universitas X dengan menggunakan Indeks KAMI, alat yang dikembangkan oleh Badan Siber dan Sandi Negara untuk mengukur kesiapan dan kematangan keamanan informasi berdasarkan standar internasional ISO/IEC 27001:2013. Hasil penelitian menunjukkan bahwa Universitas X memiliki tingkat kesiapan dan kematangan yang baik dengan skor keseluruhan 638. Namun, terdapat beberapa area yang membutuhkan perbaikan lebih lanjut. Evaluasi mencakup berbagai aspek, termasuk tata kelola keamanan informasi, manajemen risiko, kerangka kerja keamanan, manajemen aset, teknologi keamanan, serta perlindungan data pribadi dan keterlibatan pihak ketiga. Berdasarkan temuan ini, diberikan rekomendasi untuk meningkatkan pengelolaan keamanan informasi di Universitas X agar lebih efektif dan efisien. Kata kunci: Indeks KAMI; tingkat keamanan informasi ------------------------------------- Abstract This study aims to evaluate the level of information security at Universitas X using the KAMI Index, a tool developed by the National Cyber and Crypto Agency to measure the readiness and maturity of information security based on the international standard ISO/IEC 27001:2013. The results indicate that Universitas X has a good level of readiness and maturity with an overall score of 638. However, several areas require further improvement. The evaluation covers various aspects, including information security governance, risk management, security framework, asset management, security technology, as well as data protection and third-party involvement. Based on these findings, recommendations are provided to enhance the information security management at Universitas X to be more effective and efficient.   Keywords: US Index; information security level
Evaluation and Implementation of IT Governance Using the 2019 COBIT Framework at the Department of Food Security, Agriculture and Fisheries of Balangan Regency Rini Audia; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol. 11 No. 1 (2022): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2022.3381

Abstract

The food security, fisheries and agriculture services work with local government to help the community. In carrying out its work, the government applies information technology to achieve the goals. Therefore, it is necessary to have an IT governance design to ensure the alignment of the government’s objectives and the use of IT. Governance is an important asset to measure the effectiveness and efficiency of work process improvement using IT. This research is conducted because there has never been an IT governance design assessment. The analysis and design of IT governance at government agencies are carried out using the COBIT 2019 framework to measure the level of IT capability. The research method used is descriptive qualitative by conducting interviews with influential government parties. This study obtained an IT governance design and detected important processes for the domains used, namely EDM04, APO04, APO07, APO08, APO11, BAI03, BAI08, BAI10.
Co-Authors Abdul Haris Muhammad Abdullah, Mohd. Fikri Azli bin Afrianto, Nurdi Agung Fatwanto Ahmad Luthfie Ahmad Subki Akbar, Bintang Faisal Akbar, Muhammad Tulus Akbar, Reonaldo Al Jum'ah, Muhammad Na'im Alfani, Muhammad Nur Alfarizi, Naufal Faiz Alifah Amalia Amalia, Alifah Amanulloh, Rivkih Amin Pujiati Amin Retnoningsih Anbari, Muhamad Zaki Arromdoni, Bad’ul Hilmi Astari, M Rizky Asyhab, Naufal bahary, muhammad syaiful Bahry, Muhammad Syaeful Budi Permana Putra Budiman, Kholiq Candra, Dori Gusti Alex Dewantara, Rizki Efdika, Muhamad Fadil Elvanisa Ayu Muhsina, Elvanisa Ayu Endra Yuliawan Fahmi Romisa Gatra, Ramadhan Gunawan Gunawan Habibah, Berlian Ummu Hafizuddin, Faiz Akhmad Hakim, Fani Rakhman Hanif Hanif Hartono Hartono Helmi Rachman Hikmatyar, Firmansyah Gustav Idir Fitriyanto Idir Ika Arfiani Imtikhan Azmi, Himawan Istianto, Yudi Izdiharsant, Almaas Jazi Eko Istiyanto Karmesti, Danissa Wirna Kesumahadi, Lisdianto Dwi Khanif Setiyawan Mahbub Puba Fawzan Mahbub Puba Fawzan, Mahbub Puba Mahmuda, Muhimmatul Mardlian, M. Sa’id Abdurrohman Kunta Maria Ulfa Siregar Maria Ulfah Siregar Maria Ulfah Siregar Meiditra, Irzon Merisa Kurniasari Fadilla Muhamad Fadli Muhamad Zaki Anbari Muhammad Hambali, Muhammad Muhammad Reza Velayani Muhammad Taufiq Nuruzzaman Mujahidah, Latifatul Mulyana, Riyan Nana Supriyana Ngisomudin, Ngisomudin Nora Lizarti Nuruzzaman, Muhammad Taufiq Pomalingo, Suwito Prasdika, Prasdika Pratiwi, Millati Putry Wahyu Setyaningsih Qorry Aina Fitroh Rachman, Helmi Rahmadhan Gatra Retantyo Wardoyo Rini Audia Rinny Asasunnaja Riwanto, Yudha Romisa, Fahmi Rusnaldhy, Rusnaldhy Sakuri, Sakuri Sakuri, Sakuri Shofwatul 'Uyun Shofwatul ‘Uyun Son’Aniy, Irham Sophan Sofian Sri Hartati Sucinta, Hanny Handayani Sumarsono , Sumarsono Supriyono, Abdul Rohman Susilo Adi Widyanto Sutarno Sutarno Tasya Kumala Dewi, Bella Tri Widodo Utis Sutisna Warso Warso, Warso Wicaksono, Nur Kukuh Wildan Nadiyal Ahsan Winasis, Bima Putra Wishnu, Asep Yudi prayudi Yuha Bani Mahardhika