Claim Missing Document
Check
Articles

Found 5 Documents
Search

Digital Transformation Maturity Analysis of Indonesian Navy Staff and Command College Using DTMM Suharjo, Bambang; Rimbawa, H.A. Danang
Journal of Information System and Informatics Vol 6 No 3 (2024): September
Publisher : Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51519/journalisi.v6i3.821

Abstract

The maturity of digital transformation refers to an organization’s development level in adopting and integrating digital technology into its business processes. The level of maturity of digital transformation in the Indonesian Navy Staff and Command College as a military education institution is very essential. The problem is the information on digital transformation maturity has not been obtained. The qualitative method through in-depth interviews was conducted on the leadership elements, namely the director and departmental heads to answer the question of digital transformation maturity. Interviews were developed in the policy and strategy, technology and infrastructure dimensions, the use of IT in the business process of educational institutions, IT-based learning, lecturers and education, data, digital leadership, efficiency and IT-based performance, and IT culture. Determination of maturity level was carried out using DTMM at initial, developing, defined, managed, and optimized. The results of the study show that overall, the level of maturity of digital transformation at the Naval Staff and Command School has reached a defined (systematic) level. The strategy for increasing the maturity of digital transformation at the Naval Staff and Command School needs to be continuously developed and implemented in each dimension.
IMPLEMENTATION OF A HUMAN FIREWALL TO PREVENT SOCIAL ENGINEERING THREATS IN REALIZING CYBER SECURITY Faidin, Firman; Rimbawa, H.A. Danang; Saputro, J.W.
Eksakta : Jurnal Penelitian dan Pembelajaran MIPA Vol 10, No 1 (2025): Eksakta : Jurnal Penelitian dan Pembelajaran MIPA
Publisher : Fakultas Keguruan Dan Ilmu Pendidikan, UM-Tapsel

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31604/eksakta.v10i1.%p

Abstract

The rapid development of information and communication technology has provided many conveniences in various aspects of life. However, on the other hand, this also brings increasing cyber security threats, one of which is the threat of social engineering. Therefore, this research aims to analyze the implementation of a human firewall to prevent social engineering threats in realizing cyber security. The research method used is a qualitative research method with in-depth interviews with several key informants including cyber security managers, employees involved in training programs, and cyber security experts in PT. Mekar Armada Jaya Magelang. From the results of the research that has been carried out, it can be concluded that the implementation of a human firewall is effective in preventing social engineering threats and improving cyber security. The integration of enabling technology with human training strengthens the company's defenses, while clear security policies and top management support help overcome the challenges of participation and organizational culture change. However, challenges such as low employee participation and resistance to cultural change remain. For greater success, the training approach should be relevant to the employee's role, use technology to increase engagement, and involve employees in the development of training materials. The success and failure case studies found show that this strategy can be adapted and improved continuously.
IMPLEMENTASI HUMAN FIREWALL UNTUK MENCEGAH ANCAMAN SOCIAL ENGINEERING DALAM MEWUJUDKAN KEAMANAN SIBER Faidin, Firman; Rimbawa, H.A. Danang; Saputro, J.W.
Eksakta : Jurnal Penelitian dan Pembelajaran MIPA Vol 10, No 1 (2025): Eksakta : Jurnal Penelitian dan Pembelajaran MIPA
Publisher : Fakultas Keguruan Dan Ilmu Pendidikan, UM-Tapsel

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31604/eksakta.v10i1.62-70

Abstract

Perkembangan teknologi informasi dan komunikasi yang begitu cepat dan telah memberikan banyak kemudahan dalam berbagai aspek kehidupan. Namun, di sisi lain, hal ini juga membawa ancaman keamanan siber yang semakin meningkat, salah satunya adalah ancaman social engineering. Oleh karena itu, penelitian ini bertujuan untuk menganalisis implementasi human firewall untuk mencegah ancaman social engineering dalam mewujudkan keamanan siber. Metode penelitian yang digunakan adalah metode penelitian kualitatif dengan wawancara mendalam kepada beberapa key informan diantaranya manajer keamanan siber, karyawan yang terlibat dalam program pelatihan, dan pakar keamanan siber di PT. Mekar Armada Jaya Magelang. Dari hasil penelitian yang telah dilakukan, dapat disimpulkan bahwa implementasi human firewall efektif dalam mencegah ancaman social engineering dan meningkatkan keamanan siber. Integrasi teknologi yang memungkinkan dengan pelatihan manusia memperkuat pertahanan perusahaan, sementara kebijakan keamanan yang jelas dan dukungan manajemen puncak membantu mengatasi tantangan partisipasi dan perubahan budaya organisasi. Namun, tantangan seperti rendahnya partisipasi karyawan dan resistensi terhadap perubahan budaya tetap ada. Agar lebih berhasil, pendekatan pelatihan harus relevan dengan peran karyawan, menggunakan teknologi untuk meningkatkan keterlibatan, dan melibatkan karyawan dalam pengembangan materi pelatihan. Studi kasus keberhasilan dan kegagalan yang ditemukan menunjukkan bahwa strategi ini dapat diadaptasi dan ditingkatkan secara terus menerus.
Analysis and design of an inset-feed microstrip antenna for a LEO satellite IoT ground station at 921 MHz Taqwa, Rangga; Rimbawa, H.A. Danang; Miptahudin, Apip; Hasibuan, Bayu Nuar Khadapi; Sastradinata, Aria Kusumah; Bangun, Abbas Madani
Jurnal Mandiri IT Vol. 14 No. 2 (2025): Computer Science and Field
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v14i2.464

Abstract

The evolution of the Internet of Things (IoT) demands global connectivity that terrestrial networks alone cannot provide1. Low Earth Orbit (LEO) satellites equipped with Long Range (LoRa) communication technology offer a promising solution to bridge this connectivity gap2. This paper presents a specific case study calculation for a LoRa-based IoT satellite mission, defining the system's operational constraints based on selected hardware3. This analysis is framed by the RFM95W LoRa transceiver for the ground station and the Satlab Polaris receiver for the satellite4. The datasheet specifications of these components establish the critical link parameters that dictate performance: a maximum Transmit Power (Pt) ) of 20 dBm from the RFM95W 5and a Receiver Sensitivity threshold of -130 dBm for the Satlab Polaris6. The objectives are: (1) to conduct a comprehensive link budget analysis to validate the communication viability between a LEO satellite and a ground station 77, and (2) to design and predict the performance of an inset-feed microstrip antenna operating in the 920-925 MHz Indonesian LoRa frequency band using an FR-4 substrate. The detailed link budget analysis, performed for an uplink to a 500 km orbit 9, reveals that these specific parameters create a stringent performance requirement: while a reliable link margin of $+7.8 \text{ dB}$ is achieved at a 90°  elevation (best case) 10101010, the system reaches its theoretical critical threshold (0.0 dB margin) at 19.1° and enters link failure with a -2.8 dB margin at the target 10°  elevation. This failure is directly linked to the preliminary simulation of the initial antenna design, which shows a suboptimal return loss (S11) of -9.41 dB. This paper concludes that the system's target for low-elevation communication has not been met. The performance gap, defined by the hardware constraints, confirms that the initial antenna design is insufficient15. Therefore, systematic optimization of the antenna design is identified as the crucial next step to achieve a positive link margin at the 10° target elevation and ensure a robust communication link across all operational scenarios.
Implementasi Extended Detection and Response pada Security Operation Center dan Computer Security Independent Response Team dalam Peningkatan Sistem Keamanan Informasi Guna Meningkatkan Sistem Pertahanan Informasi Luqman, Fathan; Rimbawa, H.A. Danang; Sunarta, Sunarta; Wibisono, Nugroho
VISA: Journal of Vision and Ideas Vol. 5 No. 3 (2025): Journal of Vision and Ideas (VISA)
Publisher : IAI Nasional Laa Roiba Bogor

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47467/visa.v5i3.9145

Abstract

The rapid development of digital technology increases the complexity of cyber threats, which are now increasingly sophisticated and organised, targeting individuals, enterprises and critical infrastructure. Therefore, an information security system capable of automatically detecting and responding to threats is an urgent need. This research aims to examine the implementation of Extended Detection and Response (XDR) in the Security Operation Centre (SOC) and Computer Security Incident Response Team (CSIRT) to improve the effectiveness of information security systems. The method used is experimental with testing in a controlled environment using Wazuh as the XDR platform. This study analyses how XDR collects, analyses and responds to log data in real-time to detect threats more accurately. The results show that XDR is able to improve threat detection by integrating logs from multiple sources, including endpoints, networks, and cloud services, and automating incident mitigation for faster response. The integration of Machine Learning in XDR is also proven to improve attack detection accuracy, reduce false positives, and speed up incident analysis. In conclusion, XDR is a comprehensive solution for modern information security systems, especially in the context of SOC and CSIRT, with its capabilities in detection-based analytics, multi-source data correlation, and automated response to threats. Based on this test, the efficiency of XDR in detecting and mitigating malware attacks is 98.3% using up to 60 malware and respons time under 10 second. Therefore, the implementation of XDR is recommended for organisations looking to enhance their security systems in a more adaptive and proactive manner in the face of evolving cyber threats.