Triase
Universitas Islam Negeri Sumatera Utara

Published : 5 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 5 Documents
Search

Perancangan Keamanan Data Pesan Dengan Menggunakan Metode Kriptografi Caesar Cipher Radila Pratiwi; Lola Citra Utami; Rafli Bima Sakti; Triase
Bulletin of Information Technology (BIT) Vol 3 No 4: Desember 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bit.v3i4.420

Abstract

Keamanan merupakan hal yang vital dalam segala aspek untuk menjaga informasi. Pada komputer atau laptop, pesan teks merupakan salah satu data penting yang perlu dilindungi oleh sistem keamanan data. Pada perangkat komputer atau laptop, keamanan data digunakan untuk menjaga keamanan data penting kita. data pribadi. Enkripsi digunakan untuk mencegah pihak yang tidak diundang membaca pesan. Selama proses deskripsi sedang digunakan, pesan dapat dibaca ulang oleh penerima yang dituju. Tingkat keamanan informasi pesan dapat ditingkatkan dengan mengenkripsi pesan teks. caesar cipher adalah metode untuk enkripsi yang membutuhkan sedikit usaha. Perangkat lunak Visual Basic 2010 mencakup implementasi algoritma Caesar Cipher. Deskripsi pesan dan desain aplikasi keamanan enkripsi hanya dapat digunakan pada komputer. Dengan mengubah pesan asli menjadi pesan rahasia melalui pergeseran kunci, penelitian ini telah memungkinkan pesan untuk dijaga.
SISTEM PENGAMANAN SISTEM INFORMASI RAWAT JALAN DI KLINIK Angga Wiranata; Ade Wiradito; Muhammad Reza Ardhana; Triase
Jurnal Informatika Teknologi dan Sains (Jinteks) Vol 5 No 1 (2023): EDISI 15
Publisher : Program Studi Informatika Universitas Teknologi Sumbawa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (113.821 KB) | DOI: 10.51401/jinteks.v5i1.2238

Abstract

Outpatient Information System is a critical system that concerns a person's life. In maintaining the security of patient data to keep it safe, efforts need to be made to avoid threats that can disrupt the running of the system. This study aims to determine threats to data security in outpatient information systems. This research uses a literature study method that uses a purposive sampling technique that uses journals so that it produces discussions and also conclusions in this study. Data security and confidentiality are important issues. Cases related to data security become a job that requires substantial handling costs. So that it can be concluded that the security of data on patients can be known by those criminals who steal patient data at the clinic.
SISTEM INFORMASI MONITORING KESEHATAN IBU HAMIL PADA 3 FASE TRIMESTER DAN IMUNISASI ANAK M. Putra Halomoan Daulay; Triase
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 4 No. 3 (2023): Jurnal Indonesia : Manajemen Informatika dan Komunikasi (JIMIK)
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) AMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v4i3.308

Abstract

This research aims to discuss information systems for monitoring the health of pregnant women in the 3 phases of trimesters and child immunization. In the city of Padangsidempuan, the high mortality rate in pregnant women and stunting in children is mostly due to the lack of concern for mothers to routinely carry out health monitoring and immunization for their children at the puskesmas. Some of them only came for the first monitoring and did not come again for the next visit. Apart from that, the puskesmas also still uses ledgers as a place to record monitoring results and data on every pregnant woman and child whose immunizations are considered to be less effective. So a monitoring information system is needed to assist the puskesmas in processing patient data and monitoring results and providing notifications to remind each mother for the next monitoring visit.
AUDIT TATA KELOLA TEKNOLOGI INFORMASI COBIT 5 MANAJEMEN RISIKO M Yasmin Ramadhan M; M Irwan Padli Nasution; Triase
Jurnal Sistem Informasi Kaputama (JSIK) Vol. 6 No. 1 (2022): Volume 6, Nomor 1, Januari 2022
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jsik.v6i1.176

Abstract

Conducting Information technology governance audits, which means conducting periodic checks on a system that has been built, now many audit models are emerging, but COBIT 5 is one of the relevant governance audits to use. The development of information systems goes hand in hand with the audit system, starting from reading a possible risk that will occur and preventing these risks, then in periodic checks can build a new innovation from the audit results itself, the lack of an information system is indeed a weakness of the system running, but with the evaluation, it means that the weaknesses of the system are minimized. This study discusses how to carry out risk management in an ongoing system with the APO12 domain on COBIT 5.
RANCANG DAN BANGUN APLIKASI HELPDESK SUPPORT SYSTEM BERBASIS WEBSITE PADA CV. GYAR INDONESIA Jumjumi Asbullah; Triase
JURNAL ILMIAH BETRIK Vol. 14 No. 01 APRIL (2023): JURNAL ILMIAH BETRIK : Besemah Teknologi Informasi dan Komputer
Publisher : P3M Institut Teknologi Pagar Alam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36050/betrik.v14i01 APRIL.26

Abstract

CV. Gyar Indonesia is a company engaged in technology that focuses on managing both web-based and Android/ios hardware and software. Many complaints or reports are still using whatsapp social media so that they are less effective in dealing with problems and making work twice and for that it is necessary to build a helpdesk support system to assist companies in handling reports or complaints and make it easier for administrators to manage and resolve these requests, so this system designed on a website basis so that it can be accessed by users from various locations and through various devices. The stages in the design of this application use UML (unified modeling language), and the codeigniter framework and MySql database so that this application is designed to increase efficiency in managing requests for help and problems from users, and ensure that problems are handled quickly and appropriately.