Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Journal of Renewable Energy and Smart Device

Perancangan Modul Keamanan Website dan Basis Data dalam Lingkup Sistem Terdistribusi dengan Strategi Pembelajaran Berbasis Case Method Ramli, Hartini; Kadir, Muh. Yasin; Hatima, Husnul; Dini, Juliano Nufiansyach; Al'Safinat.R, Reyna Buryani; Azhari, Reynaldi Nafzal
Journal of Renewable Energy and Smart Device Vol. 2 No. 2 Mei 2025
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/joresd.v2i2.254

Abstract

In today's digital era, information systems have evolved from centralized models to distributed systems that span across various platforms and geographic locations. While this transformation enhances efficiency and scalability, it also increases security risks, particularly concerning websites and databases, which are core components of digital services. This module is designed to provide in-depth understanding of information security within distributed systems, focusing on the protection of websites and databases. The learning approach applies the case method, placing students in real or simulated scenarios to analyze, solve problems, and design security solutions based on the principle of defense in depth. This module aims to enhance students' critical thinking and technical skills in addressing ever-evolving information system security threats.
Diagnosa Kecanduan Nonton TikTok pada Gen Z dan Gen Alpha dengan Metode Fuzzy Sugeno dan Mamdani Ramli, Hartini; Amanda, Nur Aulia; Arsyila, Sinar; Irfan, Muh. Nur; Alwi, Muh.
Journal of Renewable Energy and Smart Device Vol.2, No.1, November 2024
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/joresd.v2i1.248

Abstract

Di era digital saat ini, media sosial menjadi tak terpisahkan dalam kehidupan sehari-hari. Kecanduan terhadap platform seperti TikTok menjadi perhatian serius, terutama di kalangan Generasi Z. Penelitian ini bertujuan mengembangkan metode diagnostik efektif untuk mendiagnosa tingkat kecanduan nonton TikTok pada Generasi Z menggunakan pendekatan fuzzy, seperti metode Fuzzy Sugeno dan Mamdani. Metode ini digunakan dalam sistem cerdas untuk menganalisis data yang tidak pasti. Dalam penelitian ini, metode tersebut diterapkan untuk mengidentifikasi faktor-faktor yang berkontribusi terhadap kecanduan TikTok pada Generasi Z. Pendekatan fuzzy memungkinkan penggabungan pengetahuan dan variabel kompleks dalam mendiagnosa kecanduan ini. Penelitian ini didasarkan pada tinjauan pustaka tentang kecanduan media sosial, faktor-faktor yang mempengaruhinya, dan karakteristik khusus Generasi Z dalam menggunakan TikTok. Metode diagnostik yang dikembangkan bertujuan memberikan tingkat kecanduan yang sesuai untuk setiap individu berdasarkan data input. Hasil diagnosa dapat digunakan untuk pengembangan program intervensi yang lebih efektif dalam mengatasi kecanduan TikTok pada Generasi Z. Penelitian ini memberikan pemahaman baru tentang faktor-faktor yang mempengaruhi kecanduan TikTok pada Generasi Z melalui pendekatan fuzzy, sehingga memungkinkan intervensi yang lebih tepat dan efektif dalam mengatasi kecanduan media sosial pada generasi muda ini
Analisis Keamanan Komputer Terhadap Serangan Distributed Denial of Service (DDOS) Ramli, Hartini; Alifsyah, Maharaja Yasin
Journal of Renewable Energy and Smart Device Vol.1, No.1, November 2023
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/joresd.v1i1.235

Abstract

Distributed Denial of Service (DDoS) is a type of active attack, an attack that can overwhelm a system by flooding a computer or server with network traffic, disrupting user services. The goal of this attack is usually to disable services and disconnect from the compromised­­­­­­­­ computer or network. The impact is very large for companies or agencies that offer services. Victims of these attacks are unable to provide the services they are supposed to. Due to a bug or constraint on the server you are trying to use and one of the ways to deal with these attacks is to use a computer network firewall, which is useful for protecting computers from various outer space attacks. If the computer has a firewall security system, it is likely that no one on the Internet can access the data on the connected computer or web server. Firewall, works like a partition or wall that blocks the computer from the Internet. This "firewall" allows you to control what data, information, and activity can be transferred from the Internet to your computer and vice versa. With better data security and can avoid DDOS attacks that want to be carried out by irresponsible parties.