Claim Missing Document
Check
Articles

Found 7 Documents
Search

Prototype Pengembangan Aplikasi Login menggunakan Teknologi Blockchain Imam Riadi; Herman Herman; Aulyah Zakilah Ifani
Journal of Applied Informatics and Computing Vol 5 No 1 (2021): July 2021
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v5i1.2411

Abstract

The internet is developing so fast, from the kinds of internet technolgy to something that is needed by every user. Information needs and an extensive network system give the easier to access. One of them is wireless, wireless is very helpful for internet users. However, the problem often arises in wireless securing network. Many attacks that make the username and password of the users get hacked. Based on these problems, this study focuses on securing when users login user a device. One of the innovative technologies that be able to solve these problems is Blockchain Technology. By using blockchain technology adversaries will find the difficulty to change and modify the same data on all computers at the same time because it will take the time so long to crack the encryption code on each block of sata on the entire computer network. This study used literature study as a data collection technique. Browsing method using the internet or other network media. This result of this research is the system prototype has been successfully built. The prototype for the development of this login system application has succeed in securing data such as of username and password using blockchain technology. User data is secured and converted into encryption block.
Perbandingan Forensic Tools pada Instagram Menggunakan Metode NIST Irhash Ainur Rafiq; Imam Riadi; Herman
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 7 No. 2 (2022): Mei 2022
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1167.871 KB) | DOI: 10.14421/jiska.2022.7.2.134-142

Abstract

The development of communication media continues to increase with the emergence of various communication applications on smartphones, which are currently very developed from limited communication media to social media. This change in the flow of communication applications gives a new color to communication, not just exchanging messages and sounds but also exchanging videos and pictures. This development was also followed by the rise of digital crimes in the form of defamation, fraud, and hoax news by spreading posts and then deleting them after the news spread widely. This research was conducted to obtain digital evidence with the help of special applications such as Belkasoft Evidence and Axiom Magnets using the NIST method. The results of this study show that the Magnet Axiom is better with an accuracy rate of 83.3% while Belkasoft Evidence is only 50%.
Optimasi Keamanan Web Server terhadap Serangan Broken Authentication Menggunakan Teknologi Blockchain Imam Riadi; Herman; Aulyah Zakilah Ifani
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 6 No. 3 (2021): September 2021
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (758.492 KB) | DOI: 10.14421/jiska.2021.6.3.139-148

Abstract

The aspect of the internet that needs to be considered a security is the login system. The login system usually uses a username and password as an authentication method because it is easy to implement. However, data in the form of usernames and passwords are very vulnerable to theft, so it is necessary to increase the security of the login system. The purpose of this research is to investigate the security of the system. Whether the system is good at protecting user data or not, minimizing execution errors from the system and minimizing risk errors on the system so that the login system can be used safely. This research is conducted to test the system security with Burp Suite on the login system that has been built. Testing the security of this system by experimenting with POST data which is secured using blockchain technology makes the data sent in the form of hash blocks safer and more confidential so that the system is safer than before. Blockchain technology has successfully secured usernames and passwords from broken authentication attacks. By using the Burp Suite testing system, login is more specific in conducting security testing.
K Nearest Neighbor Imputation Performance on Missing Value Data Graduate User Satisfaction Abdul Fadlil; Herman; Dikky Praseptian M
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 4 (2022): Agustus 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (346.44 KB) | DOI: 10.29207/resti.v6i4.4173

Abstract

A missing value is a common problem of most data processing in scientific research, which results in a lack of accuracy of research results. Several methods have been applied as a missing value solution, such as deleting all data that have a missing value, or replacing missing values with statistical estimates using one calculated value such as, mean, median, min, max, and most frequent methods. Maximum likelihood and expectancy maximization, and machine learning methods such as K Nearest Neighbor (KNN). This research uses KNN Imputation to predict the missing value. The data used is data from a questionnaire survey of graduate user satisfaction levels with seven assessment criteria, namely ethics, expertise in the field of science (main competence), foreign language skills, foreign language skills, use of information technology, communication skills, cooperation, and self-development. The results of testing imputation predictions using KNNI on user satisfaction level data for STMIK PPKIA Tarakanita Rahmawati graduates from 2018 to 2021. Where using the five k closest neighbors, namely 1, 5, 10, 15, and 20, the error value of the k nearest neighbors is 5 in RMSE is 0, 316 while the error value using MAPE is 3,33 %, both values are smaller than the value of k other nearest neighbors. K nearest neighbor 5 is the best imputation prediction result, both calculated by RMSE and MAPE, even in MAPE the error value is below 10%, which means it is very good.
Pelatihan Tools Microsoft Word dan PowerPoint untuk Mempermudah Penulisan Tugas Akhir Mahasiswa Manajemen Informatika Politama Surakarta Rusydi Umar; Herman Herman; Izzan Julda D.E Purwadi Putra; Aldi Rifki Andriawan
Bubungan Tinggi: Jurnal Pengabdian Masyarakat Vol 4, No 4 (2022)
Publisher : Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/btjpm.v4i4.6561

Abstract

Penelitian ini bertujuan untuk memaksimalkan serta mempermudah mahasiswa dalam menggunakan tools Microsoft Word dan PowerPoint sebagai media penulisan tugas akhir. Pelatihan ini diikuti 23 mahasiswa tingkat akhir pada program studi Manajemen Informatika Politeknik Pratama Mulia Surakarta (Politama) yang beralamat di Jl. Haryo Panular No.18A, Panularan, Kec. Laweyan, Kota Surakarta, Jawa Tengah. Pelatihan ini dilakukan secara kombinasi yaitu dalam jaringan (DARING) dan luar jaringan (LURING) dengan tetap memperhatikan protokol kesehatan karena sedang dalam masa pandemic Covid-19. Pelatihan ini dilaksanakan pada Sabtu, 30 oktober 2021 yang bertempat di laboratorium Manajemen Perusahaan Politama Surakarta. Pertemuan sesi pertama memberikan materi tentang tools Microsoft Word yang disampaikan oleh saudara Izzan Julda dan sesi kedua materi PowerPoint disampaikan oleh saudara Aldi Rifki, dilanjutkan dengan tanya jawab mahasiswa terkait materi yang disampaikan. Hasil pre-test dan post-test menunjukkan bahwa nilai presentase meningkat setelah dilakukan pelatihan Microsoft Word dan PowerPoint. Hasil ini mengindikasikan adanya peningkatan dalam pengetahuan dan soft skill tentang tools Microsoft Word dan PowerPoint.This study aims to maximize and facilitate students in using Microsoft Word and PowerPoint tools as media for writing their final project. This training was attended by 23 last year students in the Informatics Management study program at the Pratama Mulia Surakarta Politeknik (Politama), whose address is Jl. Haryo Panular No. 18A, Panularan, Kec. Laweyan, Surakarta City, Central Java. This training is carried out online and offline, while still paying attention to health protocols due to the Covid-19 pandemic. This training was held on Saturday, 30 October 2021, at the Surakarta Politama Company Management laboratory. The first meeting session provided material on Microsoft Word tools delivered by Izzan Julda and the second session presented PowerPoint material by Aldi Rifki, followed by questions and answers from students regarding the material presented. The pre-test and post-test results showed that the percentage score increased after the Microsoft Word and PowerPoint training. These results indicate increased knowledge and soft skills in Microsoft Word and PowerPoint tools.
The UTAUT Model for Measuring Acceptance of the Application of the Patient Registration System Tugiman Tugiman; Herman Herman; Anton Yudhana
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol 22 No 2 (2023)
Publisher : LPPM Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v22i2.2844

Abstract

The Covid-19 pandemic forced hospitals to innovate so that services comply with health protocols in the new adaptation period. Electronic Health (E-Health) such as online patient registration is expected to be a solution for hospitals with high patient visit rates. The purpose of this study was to analyze the level of user acceptance and the factors that influence the implementation of the online patient registration system for hospital patients. This research was conducted at PKU Muhammadiyah Gombong Hospital, which has implemented an online patient registration system based on Android since May 2020. The evaluation model uses Unified Theory of Acceptance and Use of Technology(UTAUT) and the analysis uses the Structural Equation Model (SEM) method using smart PLS. The results of the research show that all the hypotheses formed show valid values. So it can be said that the application of SIPENDOL in hospitals has been well received by users.
Analisis Keamanan Website Menggunakan Information System Security Asessment Framework(ISSAF) Herman Herman; Imam Riadi; Yudi Kurniawan; Irhas Ainur Rafiq
Jurnal Teknologi Informatika dan Komputer Vol 9, No 1 (2023): Jurnal Teknologi Informatika dan Komputer
Publisher : Universitas Mohammad Husni Thamrin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37012/jtik.v9i1.1439

Abstract

Di zaman ini internet sudah menjadi kebutuhan ini, begitu banyak hal yang dapat dilakukan dengan Internet. Mulai dari mendapatkan informasi, belajar, berbelanja, dan yang lainnya Melalui website, website adalah web yang berada di dalam web server. Tetapi banyak pengguna atau pemilik website kurang mengetahui tentang pentingnya keamanan dari sebuah website. Misalnya yang berkatian dengan kerentanan terhadap malware maupun terhadap SQL Injection. Kerentanan bisa disebabkan oleh berbagai macam, salah satu yang penting adalah di bagian coding website tersebut, sehingga menyebabkan backdoor yang dapat di eksploitasi oleh penyerang. Analisis kerentanan keamanan sebuah website sangat diperlukan. Pada paper ini penulis memaparkan sebuah proses analisis kerentatan website menggunakan metode ISSAF Information Systems Security Assessment Framework. Dalam melakukan assessment digunakan beberapa tools untuk mencari hingga menganalisis kerentanan sebuah website seperti WhoIsDomain, Subgraph Vega, dan Nmap Sehingga pengguna atau pemilik website mengetahui bagaimana kerentanan terhadap website tersebut. Hasil analisis ini menyimpulkan bahwa website yang di uji masih memiliki beberapa kerentanan seperti XSS, SQL Injection, CSRF Token not set, dan yang lainnya. Hasil akurasi  yang  di dapatkan menggunakan subgraph vega adalah sebesar 100% untuk kerentanan  Cross  Site Scrpting, dan 77% untuk SQL Injection.