Claim Missing Document
Check
Articles

Found 17 Documents
Search

IMPLEMENTASI OWASP TOP 10 DALAM PENGUJIAN PENETRASI WEBSITE : MENGIDENTIFIKASI CELAH KEAMANAN DALAM SISTEM PENGELOLAAN VOTING INDONESIA Zairina, Zora; Huwae, Raphael Bianco; Jatmika, Andy Hidayat
JTIKA (Jurnal Teknik Informatika, Komputer dan Aplikasinya) Vol 7 No 1 (2025): Maret 2025
Publisher : Program Studi Teknik Informatika, Fakultas Teknik, Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jtika.v7i1.456

Abstract

The rapid advancement of information technology has had a major influence in every aspect of life, including in government operations. the availability of platforms such as websites can be a medium for disseminating information transparently, especially in Indonesia's democratic process, namely elections. However, this digital convenience also presents cybersecurity challenges. therefore this research focuses on identifying security gaps in the voting management system in Indonesia by conducting penetration testing based on the OWASP Top 10 2021. in conducting penetration testing, it focuses on 10 subdomains on the targeted voting management website. This research process starts from the process of scanning and testing security using various tools such as subfinder, dirsearch, nuclei, ex-param and JSRecon. thus getting the analysis results that of the 10 targets 9 of them have vulnerabilities related to the OWASP Top 10 categories, such as A01-Broken Access Control, A03-Injection, A05-Security Misconfiguration, and A06-Vulnerable and Outdated Components. Broken Access Control is the most commonly found gap, identified in 6 subdomains. this research aims to improve the security of voting management systems in Indonesia while contributing to the sustainability of a more secure digital democracy in Indonesia.
THREAT MODELING MENGGUNAKAN PENDEKATAN STRIDE DAN DREAD UNTUK MENGETAHUI RISIKO DAN MITIGASI KEAMANAN PADA SISTEM LAYANAN PENDIDIKAN Iwana, Alang Artha; Huwae, Raphael Bianco; Jatmika, Andy Hidayat
JTIKA (Jurnal Teknik Informatika, Komputer dan Aplikasinya) Vol 7 No 1 (2025): Maret 2025
Publisher : Program Studi Teknik Informatika, Fakultas Teknik, Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jtika.v7i1.461

Abstract

Information system security is increasingly crucial with the rise of cyber threats. This study identifies and evaluates security risks in education service systems using STRIDE and DREAD-based Threat Modeling. STRIDE identifies threats such as spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege, while DREAD assesses risk based on potential damage, ease of exploitation, affected users, and likelihood of detection. The analysis showed that information disclosure and elevation of privilege were the highest risks, mainly due to the permissive CORS configuration. Testing using Burp Suite revealed high-level vulnerabilities allowing unauthorized access and data leakage. To address this, mitigations in the form of CORS policy validation, HTTP method restrictions, data encryption, and role-based authentication were implemented. Simulation results after mitigation showed a significant reduction in security issues, such as critical issues dropping from 6 to 1. This research confirms STRIDE and DREAD are effective in identifying and evaluating security risks, providing a strong basis for designing mitigation strategies to maintain educational service security.
Security Analysis of the Lombok Tourism Android Application Using Penetration Testing (Pentesting) Methods Based on the OWASP Mobile Top 10-2024 Framework Ida Bagus Adi Surya Kemenuh; Huwae, Raphael Bianco; Jatmika, Andy Hidayat
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 9 No 1 (2025): Juni 2025
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v9i1.624

Abstract

Android has become the most widely used operating system for mobile devices, playing a crucial role in supporting the tourism sector. As tourism in Indonesia grows, the demand for quick and easy access to information for travel planning has increased. However, concerns about the security of user data in Android applications have emerged. This study focuses on penetration testing of tourism-related Android applications in Lombok to identify vulnerabilities, particularly based on the OWASP Top 10 Mobile Risks. Using static analysis with the Mobile Security Framework (MobFS), two critical vulnerabilities were identified: Insecure Data Storage and Insufficient Cryptography. Penetration testing revealed that although there was a risk related to insecure data storage, no sensitive user data was found in the application's database. The application was also found to use outdated encryption (CBC with PKCS7 padding), which could expose it to padding oracle attacks. This research emphasizes the need for robust security measures in mobile applications within the tourism sector.
Studi Eksperimen Keamanan Jaringan Wi-Fi Kampus: Analisis Kerentanan terhadap Serangan Evil Twin dan Deauthentication Asiana, Kia Putri; Huwae, Raphael Bianco; Jatmika, Andy Hidayat
Jurnal Pendidikan Informatika (EDUMATIC) Vol 9 No 2 (2025): Edumatic: Jurnal Pendidikan Informatika
Publisher : Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29408/edumatic.v9i2.31822

Abstract

The increasing use of Wi-Fi in higher education also brings security risks, such as Evil Twin Attacks that trick users into connecting to fake access points. This study aims to assess the vulnerability of Universitas Mataram’s Wi-Fi network to such attacks using a multihop model and to propose technical improvements. An ethical penetration testing method was applied using a NodeMCU ESP8266 with Deauther firmware, tested across 13 campus locations. Observed variables included the number of connected devices, user interaction with phishing pages, deauthentication success, and captured credentials. The results reveal that five out of 13 locations (38.46%) were vulnerable, where users were redirected to fake SSIDs and entered credentials, even though most deauthentication attempts failed. These findings highlight that attack success depends not only on deauthentication but also on firmware variation and AP configuration. The study implies the need for network security audits, firmware standardization, stronger authentication with full encryption, and enhanced user awareness to reduce phishing risks.
Front-End Development of an Android-Based Fish Price Prediction Application: PENGEMBANGAN FRONT-END APLIKASI PREDIKSI HARGA IKAN BERBASIS ANDROID Rahman, Pradita Dwi; Ratnasari, Dwi; Huwae, Raphael Bianco
Jurnal Begawe Teknologi Informasi (JBegaTI) Vol. 6 No. 2 (2025): JBegaTI
Publisher : Program Studi Teknik Informatika, Fakultas Teknik Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jbegati.v6i2.1150

Abstract

Program Magang dan Studi Independen Bersertifikat (MSIB) Bangkit Academy merupakan inisiatif yang bertujuan menyiapkan talenta digital Indonesia melalui tiga jalur pembelajaran, yaitu Mobile Development, Cloud Computing, dan Machine Learning. Pada akhir program, peserta diwajibkan menyelesaikan proyek capstone secara kolaboratif lintas jalur. Penelitian ini merupakan hasil dari proyek capstone dengan mengembangkan aplikasi MyRitime, yaitu aplikasi berbasis Android yang berfungsi untuk memprediksi harga ikan hingga 5 hari ke depan serta menyediakan berita terkini seputar dunia perikanan. Latar belakang pengembangan aplikasi ini adalah permasalahan nelayan Indonesia yang sering kali menjual hasil tangkapan dengan harga rendah kepada pihak kedua, sementara harga di pasaran jauh lebih tinggi. Metode pengembangan dilakukan melalui studi literatur, survei, wawancara dengan nelayan, perancangan antarmuka (front end), integrasi sistem dengan layanan cloud dan machine learning, serta pengujian menggunakan metode System Usability Scale (SUS).Hasil pengujian menunjukkan bahwa aplikasi memperoleh skor rata-rata 72 (grade C), yang menandakan aplikasi sudah layak digunakan meskipun masih terdapat ruang untuk perbaikan. Dengan adanya aplikasi ini, diharapkan nelayan dapat memperoleh informasi harga ikan secara lebih akurat dan transparan, sehingga dapat mengurangi ketimpangan harga serta berkontribusi pada peningkatan kesejahteraan nelayan.
Construction of an Electricity Demand Forecasting Model for PT PLN (Persero) UIW NTB for the Year 2025 Using the Random Forest Algorithm Based on Tariff Categories: PEMBANGUNAN MODEL PREDIKSI KEBUTUHAN ENERGI LISTRIK PT PLN (PERSERO) UIW NTB TAHUN 2025 DENGAN METODE RANDOM FOREST BERDASARKAN KELOMPOK TARIF Anjani, Ida Ayu Dewi Purnama; Huwae, Raphael Bianco; Prawira, Komang Yehuda; Jatmika, Andy Hidayat
Jurnal Begawe Teknologi Informasi (JBegaTI) Vol. 6 No. 2 (2025): JBegaTI
Publisher : Program Studi Teknik Informatika, Fakultas Teknik Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jbegati.v6i2.1433

Abstract

Kebutuhan akan energi listrik di Nusa Tenggara Barat semakin tinggi seiring dengan meningkatnya aktivitas masyarakat dan jumlah pelanggan yang semakin banyak. Oleh karena itu, memiliki sistem prediksi yang akurat sangat penting untuk mendukung perencanaan distribusi energi yang efisien. Penelitian ini bertujuan untuk mengembangkan model yang dapat meramalkan konsumsi listrik pada tahun 2025 berdasarkan kategori tarif dengan menggunakan algoritma Random Forest. Data yang digunakan adalah konsumsi listrik dari tahun 2016 hingga 2024 yang diperoleh dari PT PLN (Persero) UIW NTB. Proses pengolahan data dilakukan melalui pembersihan dan preparasi, diikuti dengan pelatihan model serta penyesuaian hyperparameter menggunakan metode Grid Search. Hasil evaluasi model menunjukkan kinerja yang baik dengan nilai R² mencapai 0,9057 dan MAE sebesar 0,48. Prediksi untuk tahun 2025 memperlihatkan bahwa kelompok tarif rumah tangga dengan daya 450 VA akan menjadi kelompok konsumen yang paling besar. Hasil ini dapat dijadikan sebagai acuan untuk merencanakan strategi distribusi energi oleh PLN.
Reducing Transmission Signal Collisions on Optimized Link State Routing Protocol Using Dynamic Power Transmission Mahabbati, Lathifatul; Jatmika, Andy Hidayat; Huwae, Raphael Bianco
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 24 No. 1 (2024)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v24i1.3899

Abstract

Many devices connected to a network inevitably result in clashes between communication signals. These collisions are an important factor that causes a decrease in network performance, especially affecting Quality of Service (QoS) like throughput, Packet Delivery Ratio (PDR), and end-to-end de- lay, which has a direct impact on the success of data transmission by potentially causing data loss or damage. The aim of this research is to integrate the Dynamic Power Transmission (DPT) algorithm into the Optimized Link State Routing (OLSR) routing protocol to regulate the communication sig- nal strength range. The DPT algorithm dynamically adapts the signal coverage distance based on the density of neighboring nodes to reduce signal collisions. In our protocol, the basic mechanism of a DPT algorithm includes four steps. The Hello message structure of OLSR has been modified to incorporate the ”x-y position” coordinate field data. Nodes calculate distances to neighbors using these coordinates, which is crucial for route discovery, where all nearby nodes can process route re-quests. The results of this research are that DPT-OLSR improves network efficiency in busy areas. In particular, the DPT-OLSR routing protocol achieves an average throughput enhancement of 0.93%, a 94.79% rise in PDR, and reduces end-to-end delay by 45.69% across various variations in node density. The implication of this research result is that the algorithm proposed automatically adapts the transmission power of individual nodes to control the number of neighboring nodes within a de-fined range. This effectively avoids unwanted interference, unnecessary overhearing, and excessive processing by other nodes, ultimately boosting the network’s overall throughput.