Claim Missing Document
Check
Articles

Found 3 Documents
Search

Analisis terhadap Enkripsi Data SSL di MySQL: Menguji Keamanan In-Transit Haikal, Antoni; Putra, Septafiansyah Dwi; Nelmiawati, Nelmiawati
ROUTERS: Jurnal Sistem dan Teknologi Informasi Vol. 2 No. 2, Juli 2024
Publisher : Program Studi Teknologi Rekayasa Internet, Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/rt.v2i2.3446

Abstract

Data transmission security has become a pivotal point in database management, especially in response to the evolving cyber threats. This study examines a critical aspect of data security: the in-transit data encryption using Secure Sockets Layer (SSL) within MySQL. The main focus of the research is on testing data encryption by employing Wireshark, a network analysis tool capable of capturing and displaying transmitted data packets. The testing process consisted of two scenarios: first, data transmission with SSL enabled on the MySQL server; second, data transmission without the use of SSL. The results show a significant contrast between the two scenarios. With SSL, the data packets intercepted by Wireshark appeared unreadable, indicating that encryption was successful in preventing data content exposure. Conversely, without SSL, the data packets could be read as plain text, demonstrating a lack of encryption and a high security risk. This research delves only into the aspect of in-transit data encryption security in MySQL and does not explore the implications related to SSL performance or configuration further. This analysis offers a useful perspective for database administrators in efforts to enhance data security, identifying SSL as a crucial tool to ensure the security of in-transit data.
PEMBUATAN SISTEM DETEKSI HARDCODE KREDENSIAL PADA REPOSITORY Nababan, Bill Jeferson; Haikal, Antoni; Maulidya, Sity Rahmy
ROUTERS: Jurnal Sistem dan Teknologi Informasi Vol. 3 No. 1, Februari 2025
Publisher : Program Studi Teknologi Rekayasa Internet, Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/rt.v3i1.3898

Abstract

Hardcoded Credential is the practice of embedding authentication information, such as usernames and passwords, directly into the source code of software or applications. This means that the credential information is not stored separately or managed securely, but rather integrated into the program code. This practice poses significant security risks, one of which is the difficulty of changing credentials, making modifications to the source code impractical and increasing security risks. This research proposes a web-based Hardcoded Credential Detection System that can detect Hardcoded Credentials in the Repository on Github, by implementing security tools in the form of Trufflehog to the website, the system can see the results of Hardcoded Credential detection after the detection process is complete. By using the Prototyping method which is one approach in software development by following a series of stages that are carried out sequentially and completed one by one before entering the next stage. The technologies used include ReactJs as a library for making Front-end, ExpressJs as a Framework for making Back-end with Javascript as a Programming Language, and MYSQL as a database. The results of this system can help in maintaining the security of Github repositories by providing the use of tools that can identify potential leaks of sensitive credentials. Thus, developers and security teams can take action to remove or secure those accidental credentials.
Penetrasi Testing Aplikasi Website Udacoding Kushardianto, Nur Cahyono; Sari, Festy Winda; Haikal, Antoni; Idris, Muhammad
Jurnal Pengabdian kepada Masyarakat Politeknik Negeri Batam Vol. 5 No. 2 (2023): Jurnal Pengabdian kepada Masyarakat Politeknik Negeri Batam
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/abdimaspolibatam.v5i2.7235

Abstract

Abstract"” The rapid advancement of technology, particularly the internet, has propelled humanity into a modern world where digitalization is essential. Consequently, system security has become paramount in the utilization of information systems, including websites and desktop/mobile applications. According to the National Cyber and Crypto Agency (BSSN), Indonesia remains the top target for cyberattacks. Penetration testing is a lawful practice employed to identify vulnerabilities within a system and enhance its overall security. This penetration testing exercise was conducted on the website Udacoding, following a four-phase approach: planning, information gathering, attack simulation, and reporting. The findings and proposed solutions will be comprehensively documented in a final report.