Claim Missing Document
Check
Articles

Found 3 Documents
Search

Analysis and Implementation of the ISSAF Framework on OSSTMM on Website Security Vulnerabilities Testing in Polinema Muhammad Alif Nabila; Putri Elfa Mas'udia; Rachmad Saptono
Jurnal Jaringan Telekomunikasi Vol 13 No 1 (2023): Vol. 13 No. 01 (2023) : March 2023
Publisher : Politeknik Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33795/jartel.v13i1.511

Abstract

Along with the increasing number of websites circulating on the Internet, the security holes that arise are also increasing. The Electrical Engineering Department's website is no exception, especially on the Electrical Engineering Department's website which has never been audited to scan for security holes on the Electrical Engineering Department's website so the level of reliability of the Electrical Engineering Department's website cannot be known. On this basis, a study entitled "Analysis and Implementation of the ISSAF Framework for OSSTMM in Testing Website Security Gaps at Polynema" will be carried out. In this study, the authors tested security holes on the website at Polinema using the ISSAF and OSSTMM frameworks to scan for security holes on the Electrical Engineering Network website. Then from the test results, recommendations will be given to website managers to overcome existing security holes. Before giving recommendations, the author will try to update website security and re-test the updated website. This is done to prove whether updates made to website security can work effectively in overcoming security holes that were previously found. Based on the research that has been done, it is known that on the Electrical Engineering Department's website there are 21 security holes with 7 of them at medium level when testing for security holes using the ISSAF framework. And there are 17 security holes when testing security holes using the OSSTMM framework. The security holes include 10 open ports, DoS, brute-force, and there are security holes in the library used.
Design Of Building Gear Motion Control Systems On Bicycles Using Voice Comments ilham ramadhan putra; Putri Elfa Mas'udia; Hadiwiyatno Hadiwiyatno
Jurnal Jaringan Telekomunikasi Vol 13 No 2 (2023): Vol. 13 No. 02 (2023) : June 2023
Publisher : Politeknik Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33795/jartel.v13i2.544

Abstract

Voice recognition is also connected to the microcontroller connected to the servo motor to move the derailleur rear as a gear drive. The results of research on the gear motion control system on bicycles using voice comments can move in the correct gear position. Storage of voice commands is done 7 times and repetition of the same command no later than 4 times while the fastest 2 times repetition. Test results in a crowded condition obtained 72% success and an average delay of 1.38 seconds and the test results in a quiet state obtained the success of 88% and an average delay of 1.20 seconds. The results of this study indicate that this study is able to move the gear in a moving state with voice commands in a quiet state, the maximum level of voice commands is 96.1 dB and the minimum level of voice commands is 80.2 dB when crowded, the maximum level of voice commands is 101.9 dB and obtained the minimum level of voice commands is 88.1 dB, but this research still has shortcomings, namely if the voice command given is above the maximum voice command level and below the minimum level, the voice command cannot be processed and the gear cannot move. seen from the difference between the maximum crowded state and the maximum quiet state of 5.8 dB and the difference between the minimum crowded state and the minimum quiet state of 7.9 dB.
A Geolocation Visitors to the Polinema Library using QR Code and OTP Code on Internet of Things based Smart Locker Dhelia Dhelia Balqis Zharifa Az-Zahra; Mohammad Abdullah Anshori; Putri Elfa Mas'udia
Jurnal Jaringan Telekomunikasi Vol 13 No 2 (2023): Vol. 13 No. 02 (2023) : June 2023
Publisher : Politeknik Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33795/jartel.v13i2.562

Abstract

The library is one of the rooms or facilities used as a learning center. Data on library visitors with a locker at the Polinema library is in a different place, where the Polinema library locker are outside the library area which can be misused for storage of public goods. Visitors only enter the library area to ask for locker keys and leave items in the lockers, but visitors do not visit the library. To overcome this, a system was designed using a QR Code scan that can be used as a library visitor data system that can directly open the locker door using an OTP code, after getting the OTP code visitors can enter items and then lock them automatically. Application login testing can be done according to the system. Testing of open/closed locker markers and admins can access the locker if someone leaves the Library area. The coordinates of the GPS points for 4 visitors who came out of the Library area with a distance of 25,049m, 38,839m, 56,502m, and 64,904m were proven with a maximum distance of 20m. Comparison of the distance between Formula Haversine and Google Maps (distance between 2 points) obtained an accuracy rate of 0.236%.