Claim Missing Document
Check
Articles

Found 6 Documents
Search

PERFORMANCE EVALUATION OF PENETRATION TESTING TOOLS IN DIVERSE COMPUTER SYSTEM SECURITY SCENARIOS Joseph Teguh Santoso; Budi Raharjo
JURNAL TEKNOLOGI INFORMASI DAN KOMUNIKASI Vol 13 No 2 (2022): September
Publisher : UNIVERSITAS STEKOM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtikp.v13i2.851

Abstract

This study aims to scrutinize various tools and techniques employed in vulnerability assessment, to furnish a comprehensive guide regarding the efficacy of computer system penetration testing tools, and to offer a post-exploitation analysis approach to aid security professionals in selecting security tools. The increasing interconnectivity and complexity of computer systems in this ever-evolving digital age have led to the growing sophistication of cyber threats such as hacking, malware, and data theft. To counter these threats, penetration testing has become the primary method for securing computer systems. However, in diverse environments, efficient and adaptive penetration testing tools are needed. The selection of the right tools, with a focus on their efficiency in detecting vulnerabilities and providing mitigation solutions, is a paramount and highly crucial consideration. Additionally, post-exploitation analysis to develop more effective protection strategies after a successful attack is also becoming increasingly important. This research contributes to the fields of Communication Networks and System Security, offering insights into the challenges of selecting the right tools for penetration testers and underscoring the importance of vulnerability assessment in securing computer systems. The research approach employed comprises static analysis and manual analysis, encompassing techniques such as fingerprinting, vulnerability scanning, fuzzing, Nmap scanning, and the utilization of a database search tool called search-sploit. The results of this study indicate that the tools and techniques employed in this research can assist in identifying and mitigating vulnerabilities in computer systems. However, due to certain limitations, the research findings may not apply to diverse scenarios.
CREDENTIAL ANALYSIS FOR SECURITY CONFIGURATION ON CUSTOM ANDROID ROM Joseph Teguh Santoso; Fujiama Diapoldo Silalahi; Laksamana Rajendra Haidar
Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): December: Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v1i3.149

Abstract

Android is an operating system with open source and consists of several layers, with the different layers its duties and responsibilities. Various parties in the customization chain such as device vendors such as Samsung, Xiaomi, Oppo, Huawei, and others, operators such as Telkomsel, Smartfren, XL, etc., and hardware manufacturers can customize one or more layers to adapt devices for different purposes, such as supporting specific hardware and providing different interfaces and services. The purpose of this study was to investigate systematically for any inconsistencies that arose as a result of the processes involved in this study and to assess their various security implications. This research runs DroidDiff to perform a substantial-balance diverse investigation on images collected by the analytical methodology. DroidDiff found a lot of differences when it comes to the selected features. The method used in this study is the method of five differential analysis algorithms. As a result, by comparing the security configurations of similar figures, important security changes that could be accidentally introduced during customization can be found. The results show that DroidDiff can be used by vendors to check the configuration of various security features in a given image. DroidDiff will extract those features from the image, and compare them to other image configuration sets, then DroidDiff will flag the inconsistent ones for further investigation by vendors who have the source code and tools to check their effect. For future work, improvements to DroidDiff to more accurately detect risky inconsistencies are highly recommended. Improving DroidDiff will help reduce the number of false positives and determine risky configurations more accurately.
Innovation In Project Management Utilizing Machine Learning Technology Joseph Teguh Santoso; Budi Raharjo
Journal of Technology Informatics and Engineering Vol 2 No 3 (2023): December : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v2i3.163

Abstract

The successful adoption of programmable machines for complex tasks opens up opportunities for productivity and more efficient communication, but also poses serious challenges in IT project management. This study aims to tackle the issue of high project failure rates caused by inadequate planning. It aims to assist project managers in enhancing their project planning by implementing real-time solutions through the utilization of machine learning (ML) algorithms and a user-friendly graphical interface. This research is divided into two key phases. The initial phase involves an examination of existing literature in the field of machine learning to identify relevant concepts applicable to project management. In the subsequent stage, two distinct types of ML algorithms, namely example-based learning and regression modeling, will be integrated into a user-friendly platform. This research develops a system that utilizes machine learning algorithms to assist project managers in real-time or near real-time through a user-friendly graphical interface, with a focus on improving project planning and risk mitigation. This research shows that machine learning algorithms provide positive results in overcoming human factors and preventing risks based on the experience of project managers.
Analisis Pengisian Baterai Aki Kendaraan Listrik Menggunakan Sumber Daya dari Panel Surya dan PLN Unang Achlison; Joseph Teguh Santoso; Khoirur Rozikin; Silalahi, Fujiama Diapoldo
Elkom: Jurnal Elektronika dan Komputer Vol. 17 No. 2 (2024): Desember : Jurnal Elektronika dan Komputer
Publisher : STEKOM PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/elkom.v17i2.2128

Abstract

Electric vehicles use a power source from electrical energy to be converted into kinetic energy. The electrical energy source is stored in the battery. The battery charging process can be done using power sources from Solar Panels and PLN. Based on the analysis of the measurement results, it can be concluded that (1) recharging the battery using Solar Panels from minimum to maximum conditions takes 4 hours 38 minutes, and (2) recharging the battery using PLN from minimum to maximum conditions takes 2 hours.
Analisis Hasil Ukur Sensor Arus dan Tegangan untuk Memantau Daya Listrik berbasis Microcontroller Achlison, Unang; Joseph Teguh Santoso; Khoirur Rozikin; Fujiama Diapoldo
Elkom: Jurnal Elektronika dan Komputer Vol. 16 No. 1 (2023): Juli : Jurnal Elektronika dan Komputer
Publisher : STEKOM PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/elkom.v16i1.1193

Abstract

The community's need for electric power is increasing and efforts to monitor electric power are to obtain information on the results of measurements of voltage and electric current. Based on the analysis of the measurement results, it can be concluded that (1) the current measurement is more optimal when using the SCT-013 current sensor, (2) the voltage measurement is more optimal when using the PZEM-004T voltage sensor, (3) the difference in measurements using the current sensor is greater than the difference with a voltage sensor.
Transformasi Proyek Melalui Keajaiban Kecerdasan Buatan: Mengeksplorasi Potensi AI Dalam Project Management Sulartopo Sulartopo; Siti Kholifah; Danang Danang; Joseph Teguh Santoso
Jurnal Publikasi Ilmu Manajemen Vol. 2 No. 2 (2023): Juni: Jurnal Publikasi Ilmu Manajemen
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jupiman.v2i2.2477

Abstract

The aim of this research is to discuss the potential of applying AI to improve PM activities and how project managers can objectively comment on issues of responsibility in taking action, accountability in decision making and the still important need for human reasoning. In the context of project management, AI has introduced new methods and techniques that enable project managers to work more quickly and efficiently. However, the unique complexity of projects can become a bottleneck in automating complex activities. The novelty of this research lies in its focus on exploring potential applications of artificial intelligence in project management. This study captures and discusses state-of-the-art research regarding AI applications in PM, providing strong evidence to highlight the benefits of AI techniques in providing intelligent solutions by learning from previous data even with incompleteness and uncertainty in an automated, efficient and reliable manner. The method used in this research is a literature review on the application of artificial intelligence in project management. Related research in the project management domain was collected to prepare a database for review. Then, the current use of AI in real-time projects and enterprises is evaluated for a more in-depth analysis. The research results show that AI has the potential to significantly improve project management processes in developing planning phases, conducting project charters, and integrated change control. The potential application of AI to enhance PM activities can objectively comment on issues of responsibility in taking action, accountability in decision making, and the critical need for human reasoning. AI is anticipated to categorize, measure and forecast potential risks associated with project performance and their relevant impacts, to carry out reliable investigations and analysis in advance regarding broad aspects of project management.