Claim Missing Document
Check
Articles

Found 7 Documents
Search
Journal : Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA)

Penentuan Peminatan Tugas Akhir Mahasiswa Ilmu Komputer Unizar Iqbal, Muhammad Ziad; Pratama, Yusuf Hendra; Firmansyah, Firmansyah
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 1 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/m1597377

Abstract

 Monitoring kegiatan mahasiswa pada Program Studi ilmu komputer di universitas islam al azhar dilakukan untuk memantau prestasi, kompetensi, tugas akhir, praktik kerja lapangan dan organisasi yang diikuti oleh mahasiswa.  Kegiatan monitoring tersebut selama ini dilakukan dengan menggunakan google form dan microsoft excel dan dilakukan rekapitulasi secara manual oleh staff yang bertugas di Program Studi ilmu komputer diserahkan ke masing-masing dosen pembimbing akademik. Hal ini dirasa kurang efektif karena dosen pembimbing akademik maupun bagian akademik yang ada di Program Studi ilmu komputer tidak dapat me monitoring mahasiswa bimbingan secara langsung.  Oleh karena itu diperlukan sebuah aplikasi yang dapat di akses oleh mahasiswa, dosen, maupun staff agar dapat melakukan monitoring secara bersama-sama. Aplikasi dikembangkan dengan model pengembangan waterfall dengan empat tahapan yaitu analisis, desain, pengkodean dan pengujian. Aplikasi dapat diakses menggunakan web browser oleh mahasiswa, dosen, maupun staff untuk memonitor aktivitas mahasiswa serta dapat digunakan untuk mencetak laporan prestasi dan aktivitas mahasiswa. Pengujian terhadap aplikasi juga dilakukan dengan metode black box untuk menguji seluruh fungsionalitas dari aplikasi yang dibangun. Berdasarkan hasil pengujian tersebut, semua fungsionalitas dapat berjalan sesuai dengan skenario yang telah direncanakan sebelumnya[1]
Simulasi Rangkaian Media Pembelajaran Sistem Digital Piya, Mina Ukup; Firmansyah, Firmansyah; Pratama, Yusuf Hendra
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 1 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/ywdrfv14

Abstract

Sistem digital merupakan bagian penting dari teknologi informasi yang telah merubah cara kita berkomunikasi, bekerja, dan berinteraksi dengan dunia. Namun, memahami konsep dasar sistem digital dan cara kerjanya bisa menjadi suatu tantangan bagi siswa yang baru belajar. Dalam penelitian ini, kami menggunakan simulasi rangkaian sebagai media pembelajaran untuk membantu siswa memahami konsep sistem digital. Metode pengembangan yang digunakan adalah model ASSURE, yaitu Analisis, Desain, Pengembangan, Implementasi, Evaluasi, dan Revisi. Hasil penelitian menunjukkan bahwa penggunaan simulasi rangkaian sebagai media pembelajaran sistem digital sangat efektif dalam meningkatkan pemahaman siswa. Artikel ini membahas penggunaan metode ASSURE dalam pengembangan simulasi sebagai media pembelajaran sistem digital. Metode ASSURE digunakan sebagai kerangka kerja untuk merancang dan mengimplementasikan pembelajaran yang efektif. Simulasi digunakan sebagai alat yang kuat dalam membantu mahasiswa memahami konsep dasar sistem digital, seperti gerbang logika, rangkaian kombinasional, dan rangkaian sekuensial. Simulasi sebagai media pembelajaran sistem digital memiliki manfaat yang signifikan. Mahasiswa dapat meningkatkan pemahaman konsep, mengembangkan keterampilan praktis, dan meningkatkan keterlibatan dalam pembelajaran. Simulasi juga dapat membantu persiapan praktis mahasiswa dalam konteks nyata. Namun, ada beberapa kekurangan yang perlu diperhatikan dalam penggunaan metode ASSURE dan simulasi sebagai media pembelajaran. Beberapa kekurangan meliputi kompleksitas pengembangan simulasi, tantangan dalam validasi dan evaluasi, serta kebutuhan untuk mengatasi keterbatasan aksesibilitas dan perangkat lunak. Untuk mengatasi masalah ini, langkah-langkah dapat diambil. Langkah-langkah termasuk melakukan studi literatur yang mendalam, melibatkan para ahli dalam validasi dan evaluasi, mengembangkan antarmuka pengguna yang intuitif, dan meningkatkan aksesibilitas melalui penggunaan perangkat lunak yang mudah diakses. Secara keseluruhan, penggunaan metode ASSURE dan simulasi sebagai media pembelajaran sistem digital memiliki potensi yang besar dalam meningkatkan pemahaman dan keterampilan mahasiswa. Dengan memperhatikan kekurangan dan mengambil langkah-langkah yang tepat, penggunaan metode ini dapat memberikan pengalaman pembelajaran yang efektif dan bermanfaat
Data Security Analysis Using Virtual Ridgeback in Network Forensics Firmansyah, Firmansyah; Pratama, Yusuf Hendra; Wibisana, Bayu
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/671wv888

Abstract

Recorded two hospitals in Jakarta were hit by cyberattacks which caused patient data in hospital computer networks to be inaccessible. Symantec is an American company that manufactures data security software, according to Symantec's report entitled Internet Security Threat Report Volume 24 which was released in February 2019 then, in 2018, as much as 2.23%, cyberattacks in the global arena occur in Indonesia, increasing from the previous year, namely 1.67%. Meanwhile, the figure also places Indonesia in fifth place as the country that has the most cyber threats in 2018. It can operate on physical networks or on virtual networks. The only requirement is that the Ridgeback installation has access to the layer 2 network layer. Ridgeback Network Defence makes resistance to intruders using interactive defences and causes intruders to spend unnecessary resources. Interactive Defence is an advanced disguise and fraud capability designed to ensnare intruders in several ways, namely by managing billions of feeds in the network that can trigger intruder responses, affect intruder behavior so that they are easier to detect, and block access to protected network services without revealing that service has been blocked. This research is expected to create a control center by adopting a Software Defined Network (SDN) so that it can capture intruders and get data about the attack, which can be used as evidence in the process of investigating network forensics quickly and precisely.
Implementation of Live Forensic Virtual Router for Network Traffic Comparison Firmansyah, Firmansyah; Wibisana, Bayu; Purnomo, Hendri
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/1vd4xe47

Abstract

An entrepreneur or a service provider in the internet network world, will certainly find clients with different characters. Clients who are not technology blind, especially routers, sometimes want full access to the router, or some clients who ask to add a router to be able to directly access the router in full. Virtual Router allows clients to process their own network, as if the client has a router. Network forensics has the ability to reconstruct events using a system that stores all data traffic activities on the network, so that investigations can be carried out by looking back at events that have occurred and analyzing events that occurred in the past. Wireshark can review data packages in real time. This means that the wireshark application will monitor all incoming and outgoing data packets through a predefined interface and the next will display the results of the data package
Implementation of Virtual Routers for Network Simulation Purposes in Simulated Internet Firmansyah, Firmansyah; Pratama, Yusuf Hendra; Purnomo, Hendri
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/qpt5xh24

Abstract

This research aims to implement a virtual router as a network simulation solution in an artificial internet environment. Artificial internets have become important in developing and testing applications and network protocols without the need for expensive physical infrastructure. In this study, researchers used virtual router software to create a network environment that can be customized according to user needs. Researchers evaluated the performance of virtual routers in simulating various network scenarios, including reliability, scalability, and security testing. The methods used include installing and configuring virtual routers, as well as using network simulation tools to build complex topologies. Researchers also carried out performance measurements to evaluate the latency, throughput and stability of the virtual router. The research results show that the virtual router is able to simulate the network environment well, providing complete flexibility and control to the user. Although there are some limitations, such as high resource consumption in some configurations, the advantages in terms of efficiency and ease of use make virtual routers an attractive option for network simulation on artificial internet. This research is expected to contribute to the development of more effective and efficient network simulation environments, as well as assist researchers and developers in testing and developing network technology without having to rely on expensive physical infrastructure
Building Virtual Local Area Network (VLAN) for Self-Attendance Using Manageable Switch at Institut Sains & Teknologi Akprind Yogyakarta Firmansyah, Firmansyah; Wibisana, Bayu; Purnomo, Hendri; Pratama, Yusuf Hendra
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/zzvfvw55

Abstract

Building a manageable network to support the implementation of Virtual Local Area Network (VLAN) in independent attendance for students and lecturers, which can avoid individuals entrusting attendance, is part of today's technological developments, so that it is hoped to produce an individual who is independent, intelligent and supported. with a high level of technological mastery. The AKPRIND Yogyakarta Institute of Science & Technology has implemented this technology on the main server, but the VLAN implementation is specifically designed for Presence Mandiri in the west and east buildings on campus 1. Each building is designed to have 2 broadcast domains and use 2 switches to be able to produce communications. data between buildings that have the same broadcast domain. The switch on the Presence Mandiri VLAN network at the AKPRIND Yogyakarta Institute of Science & Technology has 2 VLAN IDs with the configuration used being VLAN Trunking (VTP). The IP addressing provided is DHCP from each switch, which can divide the network on each available port. This VLAN configuration is all done using a network simulation tool, namely Cisco Packet Tracert 6.1.0 in ICMP testing, with the protocol used is Internet Protocol version 4 or IPv4
Analisis QoS (Quality Of Service) Pada Jaringan Rt/Rw Net Untuk Peningkatan Efisiensi Dan Produktivitas Layanan Jordan, Muhammad; Warisin Hammami, Khairul; Firmansyah, Firmansyah
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 2 No. 1 (2024): Multimedia Integration and computer networks in the Development of Modern Infor
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/n65ms857

Abstract

In an increasingly advanced digital era, computer networks play an important role in supporting various activities, including in the community-initiated RT/RW Net environment. This research aims to analyze Quality of Service (QoS) on the RT/RW Net network to improve service efficiency and productivity. The research method used is the experimental method, which involves data collection through the Mikhmon application to monitor network performance. QoS measurements were made based on four main parameters: throughput, delay, jitter, and packet loss.The results show that the RT/RW Net network has excellent throughput with a value of 1471 Kb/s, average delay of 3.623 ms, jitter of 3.63 ms, and packet loss of 0%, all of which fall into the "Very Good" category according to Tiphon standards. Security testing was also conducted by simulating a brute force attack, which revealed several weaknesses in the security system that require improvement.The conclusion of this study is that the RT/RW Net network has a very good quality of service, but needs improvement in the security aspect. Suggestions include increasing bandwidth capacity, implementing stricter security policies, and improving connection stability.