Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Jurnal TIMES

Mobile And Cloud Computing Based It Strategic Planning (Case Study: Primeone School Medan) Miharja, Satriya
Jurnal TIMES Vol 9 No 2 (2020): Jurnal TIMES
Publisher : STMIK TIME

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1490.398 KB) | DOI: 10.51351/jtm.9.2.2020637

Abstract

PrimeOne is one of the national school in Medan which has used IT application in its operational, however the IT applied hasn’t reached the maximum standard and caused the important information couldn’t be accessed personally by parents such as checking for the tuition fee paid, checking for the students study progress, etc. So that it might cause some parents object to send their kids to PrimeOne School. This shows that PrimeOne School needs to have good IT Strategic Planning so that the school can serve the best for parents and reach the operational goals effectively. There are some purposes in this research (1) Plan for the good IT Strategic Planning which gets along well with school vision, mission, goals and business process for the next 2 years, which is 2016-2017 period, (2) To gain the Information System and Information Technology solution also recommendation which can support school business strategy to increase the interest of parents and school competition. This research used several methods to analyze which are SWOT analysis, Potter Five Forces Analysis, CSF Analysis and Value Chain Analysis. From these analysis, information system strategy, information technology strategy and IS/IT management strategy are produced. The result of this research is a recommendation or suggestion which is portfolio application which can be used for PrimeOne. The conclusion from this research is PrimeOne School is at the Second Quadran where it is expected to enlarge the IS/IT strategy applied and produce IS/IT strategy suggestion ( Promotion Application with Social Media Cloud Computing, POS Mobile Application, Interactive Learning Application, Facility Application and develop network connection between the school buildings ) which will increase parents’ interest and school competition.
IMPLEMENTASI ALGORITMA AES-128 DAN SHA-256 DALAM PERANCANGAN APLIKASI PENGAMANAN FILE DOKUMEN Herman, Herman; Wijaya, Robby; Miharja, Satriya; Wilson
Jurnal TIMES Vol 10 No 2 (2021): Jurnal TIMES
Publisher : STMIK TIME

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51351/jtm.10.2.2021666

Abstract

Keamanan file dokumen merupakan sebuah hal yang sangat penting bagi setiap orang ataupun instansi perusahaan pada saat ini. File dokumen biasanya berisikan informasi-informasi penting seseorang ataupun perusahaan baik itu laporan rahasia perusahaan, strategi bisnis rahasia perusahaan, ataupun riwayat perusahaan. Proses penjagaan dokumen hanya dijaga menggunakan proteksi kata sandi. Proteksi kata sandi bertujuan mencegah agar hanya user yang mengetahui kata sandi yang dapat masuk dan mengakses informasi di dalamnya. Namun penjagaan dokumen melalui autentikasi kata sandi memiliki kekurangan seperti mudah diserang dengan teknik Brute Force yaitu serangan yang dilakukan untuk membobol kata sandi dengan cara mencoba berbagai macam kombinasi kata sandi sampai akhirnya menemukan kata sandi yang tepat. Permasalahan tersebut perlu dibangun sebuah aplikasi pengamanan informasi dokumen dengan menerapkan algoritma kriptografi. Pada penelitian ini, akan dikombinasikan 2 algoritma kriptografi yaitu Advance Encryption Standard (AES) yang bernilai 128 dan Secure Hash Algorithm (SHA) yang bernilai 256 bit. Hasil penelitian menunjukkan bahwa proses enkripsi dan dekripsi file menggunakan algoritma AES-128 dan SHA-256 dapat dilakukan dengan cepat tergantung dari besar size dari file dokumen yang dienkripsi.