Olivia Eunike Selvie Liando
Department Of Information Technology And Communication Education, Universitas Negeri Manado, Tondano, 95618

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Cross-site Scripting Reflected as A Risk High-Level Attack on University Website Dina Demhi; Olivia E.S Liando; John Reimon Batmetan
International Journal of Information Technology and Education Vol. 1 No. 3 (2022): June 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The era of digitalization is an era where information can be exchanged quickly and easily. This has contributed to improving the standard of human life for the better in all areas of life. The web is a technological innovation that changes the provision of information, services, and displays significantly. This allows for better interaction between service providers and their users. In general, universities use the website as a medium of information and media to support lecture activities and as campus promotions. However, many websites at universities do not yet have a strong level of security or protection, giving rise to opportunities for theft and manipulation of university data. XSS is an attack by inserting malicious code in the form of javascript through the input form that aims to steal cookies and then use these cookies to enter the web legally. The purpose of this study is to find out what risks will be posed by XSS to the website, especially the website used by Manado State University. This research method is carried out in 4 stages, namely software installation, vulnerability testing, presentation of the results of testing and solutions for website vulnerabilities.The results obtained through this study contained several vulnerabilities on Manado State University website which were obtained using OWASP tools. In addition to obtaining vulnerabilities on the website, solutions are also provided to overcome these vulnerabilities.
Internet Security Threats and Risks for Alpha Generation in Indonesia Natasya Misnawati Sikki; Olivia E.S Liando; John Reimon Batmetan
International Journal of Information Technology and Education Vol. 1 No. 3 (2022): June 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The Internet can be a wonderful place for learning, shopping, playing games, and connecting with our friends. Unfortunately, there are also predators, identity thieves, and so on online, that might try us. To be safe online, it is important for us and our children to be aware of the dangers. The purpose of this research is to find out how dangerous and how big the influence of the internet is on minors. Here the researcher uses quantitative methods to formulate Internet strategies for minors. The results of this research can be formulated that the use of the internet for minors is very dangerous because there are many negative impacts of the internet that can make children lazy, minors can use the internet with the assistance of parents and make the internet a means of learning for children to grow and develop. With this, it can be said that the role of parents is very important for children when using the internet so that no dangerous things can be accessed by children when using the internet.
Cloud Security Adoption Factors in Educational Institutions Olivia E.S Liando; Marshel R. Kapahang; John Reimon Batmetan Batmetan
International Journal of Information Technology and Education Vol. 1 No. 3 (2022): June 2022
Publisher : JR Education

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In recent years, cloud computing technology has emerged as one of the technologies that are currently hot or often used both in the world of work, online shopping (E-Commerce), and the world of education. Before we use any technology, we must first understand the security system that exists in that technology, including the security system in Cloud Computing Technology. In the world of education today, many schools and universities have implemented Cloud Computing Technology in learning systems and database storage. Currently, Cloud Computing provides 3 different services such as Saas, PaaS, and IaaS which can be used by organizations as private, public, and, Hybrid. Security is the main concern so that there is no data theft in the world of Education. This journal was created using the Literature Study by searching from several selected journals that already exist as knowledge, in order to better understand the Cloud Computing security system.