Nasrul Firdaus
Program Studi Sistem Informasi STMIK PPKIA Pradnya Paramita Malang

Published : 5 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : TEKNOLOGI INFORMASI

ANALISIS ONLINE SHOP DI INDONESIA MENGGUNAKAN TOOLS ALEXA.COM KATEGORI FORUM ONLINE DAN IKLAN BARIS Setyowibowo, Sigit; Firdaus, Nasrul
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi Vol 6 No 1 Tahun 2015
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Perkembangan teknologi informasi yang semakin pesat menimbulkan banyak hal baru bermunculan salah satunya yaitu online shopping, Online Shopping adalah pembelian barang maupun jasa yang dilakukan melalui internet, Indonesia menduduki peringkat ke-4 tertinggi di Asia Tenggara dalam populasi pemakaian internet pada tahun 2014, hal ini mengindikasikan bahwa Indonesia merupakan pasar yang menjanjikan dalam bisnis online shopping. kaskus.co.id, berniaga.co.id, olx.co.id merupakan contoh dari beberapa situs online shooping diindonesia, penelitian ini bertujuan untuk memberikan rangking dari ke-3 situs tersebut untuk nantinya dapat digunakan sebagai bahan pertimbangan bagi penjual dalam memasarkan produknya. Penelitian ini mengguna menggunakan situs pemeringkatan dalam metode pemberian rangking yaitu alexa.com Keywords: online shoping, forum online , alexa.com
RANCANGAN APLIKASI INDEKS KINERJA DOSEN PADA STAFFSITE STMIK PPKIA PRADNYA PARAMITA MALANG Widarti, Dinny Wahyu; Firdaus, Nasrul
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi VOL 9 No. 2 Tahun 2018
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The IKAD Information System application at STIMATA is still done in the conventional way. Collecting Tridharma data for each lecturer such as teaching, research and dedication as well as questionnaire data from students, then entering data and entering the IKAD formula. So far, the calculation of IKAD uses Microsoft Excel. Then the secretary of the study program made a letter of IKAD by combining the calculation data of IKAD. Then the letter was distributed to the Lecturers through BAAK. Letters distributed to lecturers often settle for days in the BAAK room. The delay in the process of making IKAD makes each lecturer slow for self-introspection, so that in the next semester there has been no better progress.On the basis of the above problems, it is necessary to make the IKAD Application in Web-based STIMATA. This research was carried out with the SDLC method. The IKAD application will be placed on the staffsite.stimata.ac.id page.It is expected that by using the IKAD application it can reduce the entry processing time and ease of data calculation, and can produce lecturer report cards quickly, as well as graphical display of lecturers' achievement every semester
IMPLEMENTASI KEAMANAN MIKROTIK MENGUNAKAN METODE SIMPLE PORT KNOCKING PADA SMAN 1 NGANTANG Firdaus, Nasrul; Fitriawan, Angga
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi VOL 9 No. 2 Tahun 2018
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A computer network is a group of computers or more that are connected to each other electronically.Network security is currently one of the most important and growing issues.Microtic security at SMAN 1 NGANTANG is still not fully considered, it makes the network administrator nervous about the Brute Force attack.SMAN 1 NGANTANG is a high school located in the poor district of Malang, SMAN 1 NGANTANG has services for students and teachers, namely wifi based on mikrotik.At present the security of mikrotik there has not been prioritized, even the microticists there are still vulnerable to attacks from those who do not have authorization.Because security has not been prioritized, mikrotik there is vulnerable to attacks from outside and inside.Therefore, researchers are interested in implementing the Simple Port Knocking method on the mikrotik server of SMAN 1 NGANTANG.Testing in this study using a router that uses a mikrotik operating system, this study will compare mikrotik without using Simple Port Knocking with mikrotik that use Simple Port Knocking and will be attacked by Brute Force. The results of this study are the comparison table of security mikrotik without using Simple Port Knocking and using Simple Port Knocking. Keywords: Mikrotik Security, Firewall, Simple Port Knocking, Brute Force Method, SMAN 1 NGANTANG