Claim Missing Document
Check
Articles

Found 3 Documents
Search

The Effectiveness of the Port Knocking Method in Computer Security Muhammad Nur; Teguh; Wasis Waskito; Azhar Fathoni; Bagas; Yuda; Ramadan Galih; Alif Ainnun Qoyum; Samsoni
International Journal of Integrative Sciences Vol. 2 No. 6 (2023): June 2023
Publisher : PT FORMOSA CENDEKIA GLOBAL

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55927/ijis.v2i6.4526

Abstract

Computer network is a group of autonomous computers that are interconnected with each other using communication protocols through communication media so that they can share information, programs, share hardware devices such as printers, hard disks, and so on. One of the most important network components is network security, computer security involves various aspects, including protection against unauthorized access, data theft, system tampering, and operational disruptions. This research method uses descriptive method. At this stage specifications are determined regarding the system that will be designed to meet the objectives of this study, the Port Knocking method to secure the Router can be applied to Mikrotik routers by utilizing a firewall which functions to guard against illegal access and overcome problems caused by Attackers
Decision Support System for New Employee Admission at PT XYZ Budi Apriyanto; Azhar Fathoni
Formosa Journal of Science and Technology Vol. 3 No. 7 (2024): July 2024
Publisher : PT FORMOSA CENDEKIA GLOBAL

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55927/fjst.v3i7.10454

Abstract

The process of recruiting new employees is one of the important aspects in a company to get the right individuals to fill open positions. PT XYZ, as a company engaged in Transportation services is faced with challenges in the recruitment process of new employees which is still carried out conventionally. This causes a process that takes a long time, is less objective, and has the potential to cause bias. Therefore, this research aims to develop a Decision Support System (SPK) to help PT XYZ in the process of recruiting new employees.
Strengthening Cyber Resilience through IoBT Best Practices: Future Applications Mohadib, Mohadib; Widjdi, Achmad Farid; Fathoni, Azhar; Faruq, Saddam Rasyidin Al
Formosa Journal of Science and Technology Vol. 4 No. 1 (2025): January 2025
Publisher : PT FORMOSA CENDEKIA GLOBAL

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55927/fjst.v4i1.13260

Abstract

In today's digital era, Internet of Battlefield Things (IoBT) security has become particularly important in ensuring the success of military operations and national security. Through systematic literature observations reviewing publications from 2015 to 2024, this research aims to identify and implement best practices for securing IoBT in state protection, explore potential study topics for future development, and suggest significant IoBT security research topics for researchers. The research results show that developing strong security standards, implementing effective cybersecurity, increasing security awareness, and training, and developing a curriculum are critical to securing IoBT. Additionally, this research also identifies research opportunities that can help implement effective IoBT security strategies and inspire the development of various training curricula. These recommendations will help implement the best IoBT security practices to enhance national security and inspire academic innovation.