Claim Missing Document
Check
Articles

Found 14 Documents
Search

NETWORK PROGRAMMABILITY FOR NETWORK ISSUE USING PARAMIKO LIBRARY Mutiara, Dwi Ayu; Isnaini, Khairunnisak Nur; Suhartono, Didit
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.4.691

Abstract

In a company, information technology is needed, especially computer networks, to facilitate data communication. The management of a computer network, of course, requires good administration. The criteria for whether or not a network is good can be seen from the performance, reliability, and security indicators so that it will not cause network issues. Events such as server downs, data loss, lost connections, and undetected computers cause the organization's business performance to be disrupted. This study's purpose is to detect network issues with network programmability technology automatically. Paramiko library supports network automation systems and implements OSPF routing protocol in finding the shortest path to send network packets. This study uses the PPDIOO flow, namely prepare, plan, design, implement, operate, and optimize, because it is considered by the flow of making network detection tools. The results showed that the design and implementation of a small-scale network were successfully built by utilizing network programmability technology and the paramiko library, which helps detect network conditions at any time. This design has a dashboard, provisioning, assurance, and policy features that allow administrators to manage and monitor information on each network device. The network design is fitted with REST-API technology and security through a secure shell (ssh) from the Network Controller that can detect the device's connection conditions and the device's health and update the DNS configuration used. Network Issues that have been seen are devices being down, and the connection being lost. Future research can improve features for network troubleshooting when the connection is lost.
Pelatihan Pengamanan Data Probadi di Dunia Cyber bagi Anggota Karang Taruna Fajarwati, Septi; Suhartono, Didit
J-ABDIPAMAS (Jurnal Pengabdian Kepada Masyarakat) Vol. 8 No. 2 (2024): Oktober 2024
Publisher : IKIP PGRI Bojonegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30734/j-abdipamas.v8i2.4838

Abstract

ABSTRACTThe personal data security training in the cyber world for members of Karang Taruna “Taruna Jaya 2” in Kutasari Village, Baturraden, aims to raise awareness and enhance the skills of youth in protecting personal data in the digital era. In this activity, 18 participants were provided with material on the importance of personal data protection and guided in practicing security steps, especially for social media accounts. The activity was conducted over one day, on September 1, 2024, and was met with high enthusiasm from the participants. Evaluation was carried out by interviewing several participants to assess the effectiveness of the training. The results indicated that all participants understood the material presented and were able to apply it practically. Through this training, it is hoped that participants will become more aware and better protected from cybercrime threats.ABSTRAKPelatihan pengamanan data pribadi di dunia cyber bagi anggota Karang Taruna “Taruna Jaya 2” Desa Kutasari Baturraden bertujuan untuk meningkatkan kesadaran dan keterampilan pemuda dalam menjaga keamanan data pribadi di era digital. Dalam kegiatan ini, sebanyak 18 peserta diberikan materi tentang pentingnya pengamanan data pribadi serta dipandu untuk mempraktikkan langkah-langkah perlindungan data, khususnya pada akun media sosial. Kegiatan berlangsung selama satu hari, pada 1 September 2024, dan diikuti dengan antusiasme tinggi oleh para peserta. Evaluasi dilakukan dengan mewawancarai beberapa peserta untuk menilai efektivitas pelatihan. Hasilnya menunjukkan bahwa seluruh peserta memahami materi yang disampaikan dan mampu menerapkannya secara praktis. Dengan pelatihan ini, diharapkan para peserta dapat lebih waspada dan terlindungi dari ancaman kejahatan siber. 
ANALISIS MEMORI FORENSIK PADA APLIKASI TIKTOK BERBASIS WEB MENGGUNAKAN METODE NATIONAL INSTITUTE OF JUSTICE (NIJ) Primukti, Aditya; Sari, Putri Kartika; Suhartono, Didit; Isnaini, Khairunnisak Nur
Jurnal Informatika dan Teknik Elektro Terapan Vol. 13 No. 2 (2025)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v13i2.6108

Abstract

Kemajuan teknologi dalam penggunaan aplikasi berbasis web, seperti TikTok, meningkatkan kebutuhan akan analisis forensik digital untuk mengungkap jejak aktivitas pengguna. Penelitian ini bertujuan untuk menganalisis memori forensik pada aplikasi TikTok berbasis web menggunakan metode National Institute of Justice (NIJ), dengan bantuan perangkat lunak FTK Imager 4.7.1 dan HxD. Proses analisis dilakukan untuk mengidentifikasi informasi penting yang tersimpan dalam memori aplikasi selama sesi penggunaan. Hasil analisis menunjukkan bahwa data browser dari situs TikTok dengan alamat https://www.tiktok.com mengungkap beberapa informasi penting, seperti nomor telepon yang digunakan untuk login, riwayat pencarian pengguna, dan nama pengguna (username) yang aktif selama sesi akses. Namun, data sensitif seperti kode OTP tidak ditemukan, menunjukkan adanya langkah keamanan yang diterapkan TikTok untuk melindungi informasi autentikasi. Temuan ini memberikan gambaran tentang jejak digital yang dihasilkan oleh aplikasi TikTok berbasis web dan langkah-langkah keamanan yang diterapkan. Penelitian ini merekomendasikan agar pengguna tetap menggunakan browser yang aman dan terkini, sementara pengembang aplikasi seperti TikTok terus memperkuat keamanan data, termasuk mencegah penyimpanan informasi sensitif pada sesi browser. Dengan pendekatan ini, analisis forensik memori dapat digunakan sebagai alat yang efektif dalam investigasi digital.
Security Analysis of Simpel Desa using Mobile Security Framework and ISO 27002:2013 Isnaini, Khairunnisak Nur; Suhartono, Didit
INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi Vol 7 No 1 (2023): February 2023
Publisher : Universitas Nusantara PGRI Kediri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29407/intensif.v7i1.18742

Abstract

The Personal Identification Number or KTP is prone to be stolen and used by unwanted parties, this is also a possibility for the Simpel Desa, a village administration application that also contain and use the Personal Identification Number. This study aims to detect information security vulnerabilities. This study aims to analyze security vulnerabilities in applications using MobSF and ISO 27002:2013. MobSF is used for penetration testing for malware in applications. In MobSF the Simpel Desa application is analyzed in two ways, namely static and dynamic. ISO 27002:2013 is used to map the findings of vulnerabilities and potential misuse of information so that they get accurate analysis results. The control used is domain 9 (access control) and 10 (cryptography). The results obtained in the static analysis found the existence of vulnerabilities in aspects of cryptography and permission access. The dynamic analysis found that Root Detection and Debugger Check Bypass had not been implemented. Overall, based on ISO 27002:2013 information security has not been maximally implemented. The recommendations given focus on the aspects of application permissions and access rights, user authentication, and the implementation of information security.