Claim Missing Document
Check
Articles

Found 5 Documents
Search

Sistem Keamanan Work From Anywhere Menggunakan VPN Generasi Lanjut Haeruddin Haeruddin; Gautama Wijaya; Husnul Khatimah
JITU : Journal Informatic Technology And Communication Vol. 7 No. 2 (2023)
Publisher : Universitas Boyolali

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36596/jitu.v7i2.1086

Abstract

Working remotely or what we know as Work From Anywhere is still a trend after the COVID-19 pandemic. Working from anywhere and anytime can increase productivity and reduce transportation costs, and is accompanied by fast internet support, good communication and collaboration platforms so this is very popular and in demand. When implementing WFA, it has its own challenges, namely data security. Not all organizations are supported by a reliable IT infrastructure that can protect employee data during WFA. One of the security system technologies that can be used during WFA is VPN. Currently there are many VPN protocols that can be used for WFA. However, in implementing a VPN network, there are several things that must be considered to ensure that the VPN network is successful and functional, such as security, choosing the right architecture, selecting technology and protocols, scalability, quality of service, management and monitoring, as well as security and privacy policies. ZeroTier is a next-generation VPN that is easy to configure, can support multiple devices, and uses an end-to-end connection, eliminating the need for a centralized VPN server. In implementing VPN ZeroTier the method used is the Network Development Life Cycle (NDLC). This methodology is used to plan, implement, and manage a VPN network with ZeroTier to function according to WFA needs.
Implementasi Pembuatan Website Company Profile Dan Menu Digital Pada Umkm Simalis Cafe Stefanus Eko Prasetyoi; Gautama Wijaya; Haeruddin; Sopiyan
Nusantara Journal of Multidisciplinary Science Vol. 2 No. 6 (2025): NJMS - Januari 2025
Publisher : PT. Inovasi Teknologi Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

SIMALIS Cafe merupakan sebuah usaha mikro kecil menengah (UMKM) di bidang kuliner yang berlokasi di Batam, Kepulauan Riau, menghadapi tantangan dalam meningkatkan efisiensi operasional dan daya saing di era digital. Sebagai solusi, proyek ini mengusulkan pembuatan website company profile dan menu digital untuk memudahkan akses informasi, meningkatkan visibilitas, dan mengoptimalkan pengalaman pelanggan. Metode penelitian yang digunakan adalah kualitatif, dengan tahapan identifikasi masalah, perancangan, implementasi, pengujian, dan analisis data. Website dikembangkan menggunakan WordPress dengan fitur-fitur seperti menu digital berbasis QR code, pemesanan online, dan informasi lengkap tentang cafe. Hasil implementasi menunjukkan peningkatan signifikan dalam visibilitas, efisiensi operasional, dan kepuasan pelanggan. Kesimpulannya, digitalisasi melalui website company profile dan menu digital terbukti efektif dalam mendukung pertumbuhan dan daya saing SIMALIS Cafe. Saran untuk pengembangan selanjutnya mencakup pemeliharaan rutin, pembaruan konten, dan pengumpulan umpan balik pelanggan untuk perbaikan berkelanjutan
Ketersediaan Tinggi Website menggunakan Penskalaan Otomatis dan Penyeimbang Beban AWS Haeruddin, Haeruddin; Andik Yulianto; Stefanus Eko Prasetyo; Gautama Wijaya; Dominggo Givarel
Telcomatics Vol. 10 No. 1 (2025)
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/telcomatics.v10i1.10951

Abstract

The rapid development of information technology requires digital service systems to have high performance and optimal availability. One of the main challenges in managing web-based services is the system's ability to deal with an unpredictable surge in the number of users. If not anticipated, this can cause a decrease in performance and even detrimental downtime. This study aims to analyze and implement the concept of auto scaling and load balancing in an effort to improve the performance and availability of web-based services. Auto scaling functions to automatically adjust the number of server resources according to workload needs, while load balancing plays a role in distributing network traffic evenly to several servers. The research method used is an experiment, by implementing and testing service performance before and after the implementation of auto scaling and load balancing. The test results show that the combination of the two technologies is able to increase the speed of service response, reduce server load, and maintain optimal service availability. This research is expected to be a reference in the development of reliable and efficient cloud-based systems.
Comparison of DES, AES, IDEA RC4 and Blowfish Aglorithms in Data Encryption and Decryption Stefanus Eko Prasetyo; Gautama Wijaya; Felix
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 9 No 1 (2025)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v9i1.2259

Abstract

The advancement of information technology has had a significant impact, one of which is as a medium for transmitting information from one place to another, making information access easier for many people. However, the ease of access to communication media also poses challenges for information security, as information becomes more vulnerable to being accessed, stolen, or manipulated by irresponsible parties. To protect the confidentiality of information, specific methods are needed, one of which is cryptography. In cryptography, there are various algorithms, including DES, AES, IDEA, Blowfish, Twofish, and RC4. This research aims to compare the performance of several cryptographic algorithms in the data encryption and decryption processes, focusing on processing speed and the size of the encrypted file. The results of the research show differences in processing time and file size of encrypted and decrypted data for each algorithm. Keywords: Aglorithms, Decryption, Encryption.
Website Security Analysis Using Vulnerability Assessment Method : Case Study: Universitas Internasional Batam Haeruddin; Gautama Wijaya; Winata, Hendra; Sukma Aji; Muhammad Nur Faiz
Journal of Innovation Information Technology and Application (JINITA) Vol 6 No 2 (2024): JINITA, December 2024
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v6i2.2476

Abstract

In today’s digital era, ensuring website security is crucial, especially in the education sector which is frequently targeted by cyber attacks. This research aims to test security of the Universitas Internasional Batam (UIB) website using OWASP ZAP and Nessus. The method will be used in this research was vulnerability assessment. It will involve gathering information with the tools such as, Nmap, whois and nslookup. OWASP ZAP detected 11 vulnerabilities, categorized into 6 medium level and 5 low level, including Content Security Policies (CSP) and anti-clickjacking headers. Otherwise, Nessus only detected one medium level vulnerability, the absence of HTTP Strict Transport Security (HSTS). The difference in detection results from the tools that OWASP ZAP is better at finding web application weakness that are consistent with the OWASP Top Ten 2021, while Nessus specifically targets server and network configuration. For educational institutions, these results emphasize the importance of conducting regular vulnerability assessment to protect sensitive data. Recommended action include implementing CSP to prevent Cross-site scripting (XSS) and other injection attacks, enforcing HSTS to secure communication, and its recommend to updating software to mitigate the unknown vulnerabilities. By adopting these measures, institutions can reduce their exposure to cyber attacks, its also can maintain user trust, and strengthen overall security. This research provides a pratical framework for stregthening the security of educational websites against evolving threats. These findings highlight that the importance of using multiple tools can provide a more comprehensive view of security gaps.