Claim Missing Document
Check
Articles

Found 13 Documents
Search

Uji Vulnerability Assessment Dalam Mengetahui Tingkat Keamanan Web Aplikasi Sistem Informasi Laporan Diskominfo Dan Sandi Aceh Irfan Murti Raazi; Ima Dwitawati; Putri Nabila
Journal Of Information Technology (JINTECH) Vol 4 No 1 (2023): Februari 2023
Publisher : Prodi Teknologi Informasi UIN Ar-Raniry Bekerjasama dengan Pusat Penelitian dan Penerbitan LP2M Universitas Islam Negeri Ar-Raniry Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22373/jintech.v4i1.2409

Abstract

Along with the increasing need for information systems in the Districts/Cities of Aceh Province in supporting the development process of a region, the penetration test and evaluation of the system has been delayed. This is due to the limited number of experts in the province as well as the level of dependence on human resources in Districts/Cities who have limited capacity in terms of testing information systems. Therefore, with the presence of the latest web application information system at Diskominfo and Sandi Aceh, it requires system testing to determine the feasibility level of publication of the information system. The testing technique in this study used the VAPT Life Cycle method. Where the VAPT Life Cycle will identify, describe, assess vulnerabilities based on the CVSS (Common Vulnerability Scoring System) and provide solutions for handling vulnerabilities. The vulnerability discovery process in this study uses the Nessus Vulnerability Scanning tool. From the findings there are 4 vulnerabilities, 1 in the high category and 3 in the medium category. This vulnerability data can be used as evaluation material to close or fix existing security holes.
Identifikasi Tugas Dan Fungsi Data Stewardship Pada Dinas Komunikasi, Informatika Dan Persandian Aceh Ima Dwitawati; Putri Nabila; Irfan Mutri Raazi
Journal Of Information Technology (JINTECH) Vol 4 No 1 (2023): Februari 2023
Publisher : Prodi Teknologi Informasi UIN Ar-Raniry Bekerjasama dengan Pusat Penelitian dan Penerbitan LP2M Universitas Islam Negeri Ar-Raniry Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22373/jintech.v4i1.2413

Abstract

In the field of Information Technology, a person who has obligations regarding data security is known as data stewardship (data custodian). Data is the most important part that must be maintained and ensured its security. Therefore, institutions and organizations make various efforts in order to ensure the process of safeguarding and maintaining data, so that the data is safe and can avoid various errors and acts of misuse. This study aims to identify and document the roles, responsibilities and people involved as stewardship data at Diskominfo and Sandi Aceh. Data stewardship is grouped into 4 levels, namely external staff, internal staff, managers of internal institutions, and professionals who support data management. Where each level has specific responsibilities.
Analisis Teknik Penyerangan Phishing Pada Social Engineering Terhadap Keamanan Informasi di Media Sosial Profesional Menggunakan Kombinasi Black Eye dan Setoolkit Sri Wahyuni; Irfan Murti Raazi; Ima Dwitawati
Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) Vol 5, No 1 (2022): Februari 2022
Publisher : Program Studi Teknik Komputer, Fakultas Teknik. Universitas Serambi Mekkah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32672/jnkti.v5i1.3962

Abstract

Abstrak - Di era teknologi yang kian maju dan berkembang luas seperti sekarang ini, informasi merupakan aset yang sangat perlu dilindungi oleh suatu organisai ataupun individu, informasi yang bersifat privasi penting untuk dilindungi agar tidak dapat diakses oleh pihak yang tidak berwenang. Penyerangan social engineering hingga saat ini masih terus meningkat, hal ini terjadi karena pelaku mengetahui bahwa rantai terlemah pada sistem keamanan jaringan itu sendiri ialah pengguna, sehingga perancangan sistem keamanan yang baik harus disertai pemahaman tentang penyerangan dan ancaman oleh pengguna itu sendiri. Adapun tujuan penulisan artikel ini untuk dapat menjelaskan teknik penyerangan dengan memanfaatkan manipulasi psikologis yang dilakukan berdasarkan bagaimana cara korban berpikir dan bertindak. Teknik penyerangan phishing email spoofing adalah salah satu jenis penyerangan social engineering yang dilakukan dengan menggabungkan black eye dan setoolkit. Sehingga dapat memberikan informasi terkait dalam mengambil tindakan dalam melakukan suatu hal tentang social engineering dan acamannya.Kata kunci : Social engginering, Phishing, Email Spoofing, Black Eye, Setoolkit Abstract - In the era of increasingly advanced and widespread technology as it is today, information is an asset that really needs to be protected by an organization or individual, information that is privacy is important to protect so that it cannot be accessed by unauthorized parties. Social engineering attacks are still increasing, this happens because the hacker know that the weakest chain in the network security system itself is the user, so that a good security system design must be accompanied by an understanding of attacks and threats by the users themselves. The purpose of writing this article is to be able to explain attack techniques by utilizing psychological manipulation that is carried out based on how the victim thinks and acts. Email spoofing phishing attack technique is one type of social engineering attack that is carried out by combining black eye and setoolkit. So that it can provide information related to taking action in doing something about social engineering and its threats.Keywords : Social engginering, Phishing, Email Spoofing, Black Eye, Setoolkit