Claim Missing Document
Check
Articles

Found 7 Documents
Search

PENGAMANAN DOKUMEN KEPEGAWAIAN PADA DINAS PENDIDIKAN TEMANGGUNG DENGAN ALGORITMA RC4 DAN AES-256 Pratama, Fathur Setya; Romli, Moh Ali
Jurnal Komputer dan Teknologi Vol 3 No 1 (2024): JUKOMTEK JANUARI 2024
Publisher : Yayasan Pendidikan Cahaya Budaya Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58290/jukomtek.v2i2.167

Abstract

The Education, Youth and Sports Office of Temanggung Regency is a government agency responsible for the education, culture and sports sectors in Temanggung Regency. Currently, personnel documents in this institution are still stored without certain access restrictions. This condition provides an opportunity for unauthorized individuals to access these personnel documents. Lack of data protection has the potential to pose a risk of data leakage and manipulation. Therefore, research was conducted involving the use of the RC4 cryptographic method combined with the AES-256 method to improve the security of personnel documents. The documents will be encrypted using the RC4 method, where the values will undergo permutation before being further encrypted using the AES-256 method. This encryption process involves four types of byte conversion, namely SubBytes, ShiftRows, MixColumns, and AddROUNDKey. The test results show that the encryption applied successfully functions properly, so that individuals who do not have the encryption key cannot access the document. Thus, the security of personnel documents can be improved, and unauthorized access can be prevented.
SISTEM PENGAMANAN DOKUMEN MENGGUNAKAN ALGORITMA KRIPTOGRAFI ADVANCED ENCRYPTION STANDARD (AES-256) Ridho, Akbar; Romli, Moh Ali
Jurnal Informatika Teknologi dan Sains (Jinteks) Vol 6 No 4 (2024): EDISI 22
Publisher : Program Studi Informatika Universitas Teknologi Sumbawa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51401/jinteks.v6i4.4887

Abstract

The implementation of document security systems using the Advanced Encryption Standard (AES-256) algorithm has become a crucial solution in addressing the challenges of information security in the digital era. The increasing vulnerability of sensitive data to hacking and information theft has created an urgent need for more effective security strategies. The primary issues identified include the high risk of unauthorized access to critical information, limitations of existing security methods, and the need for encryption that ensures both the confidentiality and integrity of data. This research employs a methodology that encompasses literature review, problem identification, system design, implementation, and black box testing. The designed system allows users to encrypt and decrypt documents through a web-based platform, focusing on ease of use and security. The test results demonstrate that AES-256 is effective in protecting sensitive data from unauthorized access. The conclusion of this study emphasizes the importance of integrating encryption algorithms with other security technologies to further enhance data protection, as well as recommendations for future research to improve usability for non-technical users
PENERAPAN METODE FUZZY TOPSIS DALAM PENGAMBILAN KEPUTUSAN PEMILIHAN BRAND PRODUK AIR MINERAL Minanda, Febriyan Biopsa; Romli, Moh Ali
Jurnal Informatika Teknologi dan Sains (Jinteks) Vol 6 No 4 (2024): EDISI 22
Publisher : Program Studi Informatika Universitas Teknologi Sumbawa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51401/jinteks.v6i4.4903

Abstract

Water is a fundamental human necessity. According to the Susenas by BPS in March 2023, 40.64% of people primarily consume mineral water, with usage increasing by 1.24% annually, leading to concerns about the availability of safe drinking water. The United States Environmental Protection Agency (EPA) sets the safe pH range for water between 6.5 and 8.5, while both the World Health Organization (WHO) and the Indonesian Ministry of Health (Permenkes) recommend a TDS level of 300-500 mg/liter. Consumers often face difficulty choosing among various mineral water brands due to conflicting claims about quality, packaging, and price. To address this issue, a Decision Support System (DSS) was developed using the Fuzzy TOPSIS method, focusing on pH and TDS as the primary parameters. The results show that Alfa, Aqua, and Club rank highest, each with a preference value of 1, while Pristine ranks the lowest at 0.327. From the results obtained, Alfa, Aqua, and Club products can increase their stock production because these products are the right choice for consumers.
Keamanan Arsip Kelurahan Bumijo Menggunakan Metode Advanced Encryption Standard (AES 128) Berbasis Web: Security of Bumijo Village Archives Using Advanced Encryption Standard (AES-128) Method Based on Web Indraka, Andrea Pirlo; Romli, Moh Ali
MALCOM: Indonesian Journal of Machine Learning and Computer Science Vol. 5 No. 1 (2025): MALCOM January 2025
Publisher : Institut Riset dan Publikasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.57152/malcom.v5i1.1728

Abstract

Permasalahan yang ada pada pengelolaan keamanan arsip Kelurahan Bumijo saat ini adalah belum terdapat sistem keamanan yang memadai dalam menjaga arsip dan file penting, yang dapat menyebabkan rentannya terjadinya kebocoran dan pencurian data. Oleh karena itu, penelitian ini bertujuan untuk merancang dan membangun sebuah aplikasi keamanan arsip berbasis Web yang menerapkan enkripsi data menggunakan algoritma Advanced Encryption Standard (AES) 128 bit. Metode penelitian yang digunakan adalah metode pengembangan sistem dengan tahapan analisis kebutuhan, perancangan, implementasi, dan pengujian. Hasil dari penelitian ini adalah sebuah aplikasi keamanan arsip yang dapat melakukan proses enkripsi dan deskripsi file menggunakan algoritma AES 128 bit, dengan data hasil enkripsi disimpan pada database MySQL untuk memudahkan akses dan pengelolaan. Implementasi algoritma AES 128 bit ini diharapkan mampu meningkatkan keamanan penyimpanan arsip milik Kelurahan Bumijo. Hasil pengujian User Acceptance Testing (UAT) menunjukkan tingkat kepuasan pengguna sebesar 56.52%, yang menunjukkan bahwa meskipun sistem diterima dengan baik, masih ada ruang untuk perbaikan lebih lanjut. Sementara itu, pengujian blackbox menghasilkan tingkat keberhasilan 99%, yang menandakan bahwa sistem berfungsi sesuai dengan spesifikasi yang diharapkan dan dapat mengatasi skenario fungsionalitas yang diuji.
Aplikasi Konsultasi Kesehatan Mental dengan Fitur Penjadwalan di Bimbingan Konseling Universitas Teknologi Yogyakarta Heriansaputri, Kevina Maydiva; Romli, Moh Ali
J-INTECH ( Journal of Information and Technology) Vol 13 No 01 (2025): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v13i01.1922

Abstract

This study developed a mobile-based mental health consultation application at Universitas Teknologi Yogyakarta (UTY) to offer both online and offline counseling services for students. The tool incorporates two primary features online consultations and offline consultation scheduling, designed to improve students' access to mental health support. The system utilizes Flutter for cross-platform mobile application development, Firebase for data management, and Node.js for backend services. The study employs a Research and Development (R&D) methodology encompassing needs analysis, system design, implementation, and testing. The results indicate that the application successfully mitigates obstacles such time limitations, stigma, and restricted accessibility, hence enhancing student involvement with mental health services. The Self-Reporting Questionnaire 20 (SRQ-20) serves as a mental health screening instrument within the application, enabling students to evaluate their mental health status. This program aims to deliver a thorough and accessible solution for mental health counseling at UTY and may serve as a prototype for other universities.
Penerapan Metode A-Star untuk Rute Evakuasi dengan Menggunakan Jaringan Long Range Wide Area Network (LoRaWAN) Daniel, Charles; Romli, Moh Ali
J-INTECH ( Journal of Information and Technology) Vol 13 No 01 (2025): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v13i01.1923

Abstract

Optimal evacuation route planning is a crucial factor in disaster mitigation, especially in areas with limited communication infrastructure. This study proposes the application of the A-Star method for evacuation route optimization, supported by the Long-Range Wide Area Network (LoRaWAN) as an emergency communication system. The research methodology includes the development of an A-Star algorithm optimized with an adaptive heuristic function, integration with LoRaWAN-based sensors for real-time road condition monitoring, and simulations in various disaster scenarios. The results show that the developed system can reduce evacuation time by up to 31.4% compared to conventional methods and maintain communication connectivity up to 95% even under emergency conditions. Furthermore, the dynamic adaptation mechanism allows for automatic route changes based on current field conditions, enhancing the effectiveness of the evacuation process. Therefore, the integration of the A-Star method and LoRaWAN network proves to be a reliable and efficient solution for improving public safety during disasters.
Aplikasi Honeypot dalam Keamanan Jaringan untuk Mendeteksi Serangan Siber pada Infrastruktur TI Susanto, Carlos; Romli, Moh Ali
J-INTECH ( Journal of Information and Technology) Vol 13 No 01 (2025): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v13i01.1924

Abstract

The high security risks that are susceptible to hacking and exploitation by malicious actors to steal data or information often arise due to a lack of awareness regarding the critical importance of implementing deceptive network security using honeypots. Negligence can create vulnerabilities that are easily exploited, allowing attackers to initiate breaches. A notable network security approach involves using Honeypots, a method that creates a decoy server to mimic an authentic one. Honeypots are deliberately engineered to attract the attention of cyber attackers and facilitate their access to the trap server, thereby enabling the monitoring and analysis of their activities without compromising the integrity of the primary server. To achieve optimal network security, comprehensive testing of Honeypots is essential. This testing process serves as a fundamental metric in evaluating the efficacy and performance of Honeypot systems in mitigating cyber threats.