Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : INTERNAL (Information System Journal)

PRIVATE CLOUD STORAGE IN RURAL'S MANAGEMENT AND INFORMATION SYSTEM USING ROADMAP FOR CLOUD COMPUTING ADOPTION (ROCCA) Muhammad Agreindra Helmiawan; Irfan Fadil
INTERNAL (Information System Journal) Vol. 2 No. 2 (2019)
Publisher : Masoem University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32627/internal.v2i2.305

Abstract

 The draft Management Policy and Rural Information system are all articles with several articles governing all information security. In concerning Business Continuity Management it is written "The information system and security work unit backs up data periodically, to safer backing up data using Cloud computing facilities." Cloud computing has advantages as file management. Private cloud storage is a form of cloud computing that is intended for limited use in certain circles and one of its functions is used for backing up data or file management. On the other hand, there is software that can be used to implement private cloud storage, namely Owncloud. To run the Rural Information Security Policy Draft article on Business Continuity Management and for the provision of data centers, a study was conducted to implement private cloud storage using Owncloud. The method used in this study is the Roadmap for Cloud computing Adoption (ROCCA) with five stages, namely the stages of analysis, design, adoption, migration, and management. The results of this research are private cloud storage using Owncloud as a medium for storing, securing, and sharing files that are flexible and highly scalable that can be accessed via the internet by users.
PENGAMANAN SISTEM DAN DATA E-VOTING BERBASIS NETWORK Muhammad Agreindra Helmiawan; Dani Indra Juna; Billy Ramdhani
INTERNAL (Information System Journal) Vol. 1 No. 1 (2018)
Publisher : Masoem University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32627/internal.v1i1.329

Abstract

Security in a system is vital and can not be ignored at all. System security has an important role to operate a system and keep running in running business processes that support an organization. In every organization, it must have important data and stored in a system mechanism either stand-alone or network-based. Ssytem that has been connected to the network will provide opportunities for the outside world to be able to get information presented by the system in realtime. One example of a system that provides information in realtime is E-Voting, E-Voting system is processing data entered by the user in giving his opinion. If a system that has been corrupted by an outsider or in the sense of an opinion of a user being changed for a particular purpose may be detrimental to the organization. Data security will be very necessary to keep intrupsi on system. The design and application of security methods in the E-Voting system aims to maintain the data provided by the user so that the data is genuine in accordance with the input and the data is original and feasible to be informed.