Claim Missing Document
Check
Articles

Found 11 Documents
Search

Analisis Keamanan Cloud Dengan Zero Trust Dan Blockchain Yang Tangguh Fitrian, Harry Pribadi; Neni, Neni; Aziz Bisri, Farhan Nur; Al Fathir, Muhammad Willy; Hizbulloh, Muhammad Jaisy
Journal Global Technology Computer Vol 4 No 1 (2024): Desember 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jogtc.v4i1.6432

Abstract

This study integrates Zero Trust Architecture (ZTA) and Blockchain to strengthen cloud computing security. In the digital era, cloud computing has become a mainstream technology for data storage and processing globally. However, traditional perimeter-based security models have proven ineffective in dealing with modern threats, such as insider threats increasing by 60% and ransomware attacks on major cloud computing providers in 2022 resulting in billions of dollars in losses, highlighting the weaknesses of existing security models. Zero Trust Architecture (ZTA) offers a solution with a granular access control approach and layered authentication, but its implementation still faces challenges in efficiency and scalability, Blockchain, with its decentralized technology and immutable records, improves data transparency and integrity, but its use is often constrained by high energy consumption and latency. This study aims to explore between ZTA and Blockchain as innovative solutions to improve cloud security. By combining ZTA-based access control and Blockchain transparency, this study develops a security model that is resilient to both internal and external threats. Simulations show that ZTA and Blockchain integrity can reduce insider threats by 35% and increase data audit efficiency by 20%. This approach not only offers stronger protection but also provides an adaptive and transparent system for rapidly evolving cloud infrastructure.
PERANCANGAN ANTARMUKA PENGGUNAAN (UI/UX) PADA APLIKASI RAPOR SISWA TK AL-HUSNA Ramadhan, Chandra; Fitrian, Harry Pribadi; Rusghana, Fadzar
Jurnal Informatika dan Teknik Elektro Terapan Vol. 13 No. 3S1 (2025)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v13i3S1.7515

Abstract

Perkembangan teknologi digital semakin memengaruhi berbagai aspek kehidupan, termasuk di bidang pendidikan. Salah satu inovasi yang muncul adalah aplikasi laporan siswa, yang bertujuan meningkatkan komunikasi antara sekolah dan orang tua. Penelitian ini bertujuan untuk merancang antarmuka pengguna (UI) dan pengalaman pengguna (UX) yang efektif dan menarik pada aplikasi laporan siswa Taman Kanak-Kanak (TK). Aplikasi ini memudahkan orang tua memantau perkembangan anak secara real-time.Metode penelitian yang digunakan adalah pendekatan desain berbasis pengguna (user-centered design), yang mencakup analisis kebutuhan, perancangan prototipe, dan evaluasi antarmuka. Prototipe dirancang dengan mengedepankan prinsip desain ramah pengguna, seperti navigasi sederhana, ikon intuitif, dan tampilan visual yang menarik bagi orang tua maupun guru.Hasil perancangan menunjukkan bahwa antarmuka yang dikembangkan mampu menyajikan informasi penting seperti nilai, kehadiran, dan catatan perkembangan siswa dengan mudah diakses. Uji coba pada kelompok kecil pengguna menunjukkan tingkat kepuasan tinggi, terutama pada kesederhanaan desain dan kemudahan penggunaan aplikasi. Temuan ini menunjukkan bahwa desain UI/UX yang tepat dapat meningkatkan keterlibatan orang tua dalam pendidikan anak di tingkat usia dini.
Evaluasi Keamanan Wirelles Network WPA2 Vs WPA3 Terhadap Serangan Deauthentication dan Brute Force menggunakan Aircrack-ng Fitrian, Harry Pribadi; Eriyana, Eri; Ibrahim, Hendrick Maulana; Rizqullah, Riordan Pramana; Meliansyah, Silvia Putri
Jurnal Ilmiah Sistem Informasi Vol. 5 No. 1 (2026): January: Jurnal Ilmiah Sistem Informasi
Publisher : LPPM Universitas Sains dan Teknologi Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/gy968e07

Abstract

Keamanan jaringan nirkabel menjadi perhatian kritis seiring meningkatnya penggunaan Wireless Local-Area Network (WLAN) diberbagai sektor. Penelitian ini mengevaluasi efektivitas protokol keamanan WPA2-PSK dan WPA3-SAE dalam mencegah serangan deauthentication dan brute-force menggunakan Aircrack-ng suite. Metodologi penelitian menggunakan pendekatan penetration testing etis dalam lingkungan lab terkontrol dengan dua access point yang di konfigurasi menggunakan protokol WPA2-PSK dan WPA3-SAE. Pengujian dilakukan menggunakan Kali Linux 2024.4 dengan Aircrack-ng suite versi 1.7 dan adapter TP-LINK WN722n yang mendukung monitor mode. Hasil penelitian menunjukkan bahwa WPA2-PSK sangat rentan terhadap serangan deauthentication, dimana frame deauthentication palsu berhasil memutuskan koneksi klien dari access point. Analisis Wireshark mengonfirmasi keberhasilan injeksi paket deauthentication tanpa verifikasi yang memadai. Setelah handshake berhasil ditangkap, proses brute-force menggunakan wordlist 300.000 kata dapat dieksekusi dalam waktu 2 menit 21 detik. Sebaliknya, WPA3-SAE menunjukkan ketahanan signifikan terhadap kedua jenis serangan berkat implemetasi Protected Management Frames (PMF) yang menolak frame deauthentication palsu dan mekanisme simultaneous authentication of equals (SAE) yang mengeliminasi kerentanan terhadap offline dictionary attack. Penelitian ini membuktikan bahwa WPA3-SAE memberikan peningkatan keamanan substansial dibandingkan WPA2-PSK, dengan rekomendasi migrasi segera ke WPA3 untuk organisasi yang mengutamakan keamanan jaringan nirkabel.
Analisis Penerapan Fiber Optik Menggunakan Metode FTTH (Fiber To The Home) pada Area Komplek Fitrian, Harry Pribadi; Alifah, Lailani; Irawan, Adnan Fariz; Saputra, Bimo; Raffael, Muhammad Maulana
Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) Vol 8, No 6 (2025): Desember 2025
Publisher : Program Studi Teknik Komputer, Fakultas Teknik. Universitas Serambi Mekkah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32672/jnkti.v8i6.10105

Abstract

Abstrak - Kebutuhan masyarakat akan layanan internet berkecepatan tinggi dan stabil di area perumahan mendorong penggunaan teknologi fiber optik dengan metode FTTH (Fiber To The Home). Penelitian ini bertujuan menganalisis penerapan jaringan FTTH pada area komplek melalui metode studi literatur dari berbagai jurnal, buku, dan standar teknis terkait. Pembahasan difokuskan pada perangkat utama seperti OLT dan ONT, proses distribusi jaringan, serta perhitungan power link budget sebagai acuan kelayakan jaringan. Hasil kajian menunjukkan bahwa penerapan FTTH mampu memberikan kualitas layanan yang optimal dengan redaman dan rise time yang masih berada dalam batas standar, sehingga layak untuk digunakan dalam distribusi layanan triple play di kawasan perumahan. Selain itu, penggunaan perangkat pendukung seperti OTDR, RFTS, dan simulasi OptiSystem terbukti membantu dalam proses pengukuran, analisis performansi, serta perancangan jaringan. Penelitian ini diharapkan memberikan gambaran komprehensif mengenai implementasi FTTH dan faktor-faktor teknis yang memengaruhi kualitas jaringan fiber optik di lingkungan komplek.Kata kunci : Fiber Optik; FTTH (Fiber to the home); Digitech University; Abstract - The growing demand for fast and stable internet access in residential areas has encouraged the adoption of fiber-optic networks using the FTTH (Fiber To The Home) method. This study analyzes the implementation of FTTH in a housing complex based on a literature review of journals, books, and relevant technical standards. The discussion focuses on key components such as OLT and ONT, the structure of network distribution, and the use of power link budget calculations as an indicator of network feasibility. The findings show that FTTH can deliver reliable service quality, with attenuation and rise-time values remaining within acceptable limits, making it suitable for supporting triple-play services in residential environments. The use of tools such as OTDR, RFTS, and OptiSystem simulations also contributes to more accurate performance assessment and network design. This study is expected to provide a clear overview of FTTH implementation and the technical factors that influence fiber-optic network performance in housing complexes.Keywords: Fiber Optic; FTTH (Fiber to the home); Digitech University;
Analisis Kinerja Protokol Routing OSPF dalam Topologi Jaringan Skala Menengah Menggunakan Cisco Packet Tracer Fitrian, Harry Pribadi; Dini, Rahma Aulia; Agustina, Mendy Esa; Djulfiqor, Achmad Zidan; Haq, Muhammad Faqih Dienul; Al Muzhaffar, Hanif
Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) Vol 8, No 6 (2025): Desember 2025
Publisher : Program Studi Teknik Komputer, Fakultas Teknik. Universitas Serambi Mekkah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32672/jnkti.v8i6.10091

Abstract

Abstrak - Penelitian ini bertujuan menganalisis kinerja protokol routing Open Shortest Path First (OSPF) pada topologi jaringan skala menengah menggunakan Cisco Packet Tracer. Pengujian dilakukan dengan membangun skenario jaringan multiarea yang terdiri dari Area 0 sebagai backbone, Area 1, dan Area 2. Tahapan penelitian meliputi perancangan topologi, konfigurasi OSPF, verifikasi tabel routing, dan evaluasi parameter Quality of Service (QoS) berdasarkan throughput, delay, jitter, packet loss, dan waktu konvergensi. Hasil penelitian menunjukkan bahwa OSPF mampu membangun adjacency secara stabil dengan status FULL di seluruh router tanpa terjadi flapping. Rata-rata waktu konvergensi tercatat sebesar 2,4 detik, sedangkan nilai QoS yang diperoleh meliputi delay 17,9 ms, jitter 6,3 ms, packet loss 1,7%, dan throughput 5,1 Mbps. Temuan ini membuktikan bahwa OSPF efektif dalam mempertahankan efisiensi routing dan kestabilan jaringan pada skala menengah, sehingga protokol ini direkomendasikan untuk implementasi pada sistem jaringan dengan kebutuhan performa tinggi dan topologi yang dinamis.Kata Kunci: OSPF; routing dinamis; topologi jaringan; QoS; Cisco Packet Tracer; Abstract - This research aims to analyze the performance of the Open Shortest Path First (OSPF) routing protocol on a medium-scale network topology using Cisco Packet Tracer. The evaluation was conducted by implementing a multi-area network consisting of Area 0 as the backbone, Area 1, and Area 2. The research stages include topology design, OSPF configuration, routing table verification, and Quality of Service (QoS) assessment based on throughput, delay, jitter, packet loss, and convergence time. The results show that OSPF successfully built stable adjacency across all routers with FULL status and no flapping. The average convergence time recorded was 2.4 seconds, while the QoS results indicated delay of 17.9 ms, jitter of 6.3 ms, packet loss of 1.7%, and throughput of 5.1 Mbps. These findings demonstrate that OSPF is highly effective in maintaining routing efficiency and network stability in medium-scale environments, making it suitable for networks that require high performance and dynamic topology support.Keywords: OSPF; dynamic routing; network topology; QoS; Cisco Packet Tracer;
Tantangan dan Solusi Keamanan pada Jaringan Internet Of Things (IoT) Fitrian, Harry Pribadi; Ramdhany, Andhika Bayu; Wager, Joel Oskar; Ardiansyah, Muhammad Rizky; Lumbantoruan, Efllin Atalya Manuela
Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) Vol 8, No 6 (2025): Desember 2025
Publisher : Program Studi Teknik Komputer, Fakultas Teknik. Universitas Serambi Mekkah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32672/jnkti.v8i6.10098

Abstract

Abstrak - Pertumbuhan pesat Internet of Things (IoT) telah memberikan dampak luar biasa pada berbagai bidang, mulai dari rumah pintar, kesehatan, hingga sektor industri. Namun, penerapan teknologi ini juga disertai oleh meningkatnya risiko keamanan siber yang signifikan, disebabkan oleh sifat perangkat yang terbatas dalam sumber daya dan variasi protokol komunikasi. Penelitian ini bertujuan untuk menyelidiki tantangan keamanan yang ada dalam ekosistem IoT serta menemukan solusi yang menyeluruh untuk mengatasinya. Metodologi yang digunakan dalam penelitian ini adalah tinjauan pustaka dengan menganalisis 15 artikel ilmiah yang diterbitkan antara tahun 2020 hingga 2025. Hasil penelitian menunjukkan bahwa tantangan utama meliputi serangan Distributed Denial of Service (DDoS), malware, lemahnya sistem autentikasi, serta minimnya standar keamanan global. Beberapa solusi yang diusulkan mencakup penerapan arsitektur keamanan yang berbasis pada Kecerdasan Buatan (AI) dan Pembelajaran Dalam untuk mendeteksi ancaman secara real-time, pemanfaatan teknologi 5G untuk memberikan respons cepat, serta penguatan regulasi dan penyuluhan bagi pengguna. Penelitian ini menyimpulkan bahwa diperlukan kerja sama antara inovasi teknologi yang adaptif dan kebijakan regulasi yang kokoh untuk membangun lingkungan IoT yang aman, terpercaya, dan berkelanjutanKata kunci : Internet of Things (IoT); Keamanan Siber; Artificial Intelligence; DdoS; Standarisasi Keamanan; Abstract - The rapid growth of the Internet of Things (IoT) has had a tremendous impact on various fields, from smart homes and healthcare to the industrial sector. However, the implementation of this technology is also accompanied by a significant increase in cybersecurity risks, caused by the nature of devices with limited resources and various communication protocols. This study aims to investigate the security challenges that exist in the IoT ecosystem and find comprehensive solutions to overcome them. The methodology used in this study is a literature review by analyzing 15 scientific articles published between 2020 and 2025. The results show that the m   ain challenges include Distributed Denial of Service (DDoS) attacks, malware, weak authentication systems, and the lack of global security standards. Some proposed solutions include the implementation of a security architecture based on Artificial Intelligence (AI) and Deep Learning to detect threats in real-time, the use of 5G technology to provide rapid response, and strengthening regulations and counseling for users. This study concludes that collaboration between adaptive technological innovation and robust regulatory policies is needed to build a safe, trusted, and sustainable IoT environment.Keywords: Internet of Things (IoT); Cybersecurity; Artificial Intelligence; DdoS; Security Standardization;
Analisis Potensi Roblox Sebagai Platform Pengembangan Game Edukasi Berbasis Cloud Computing Fitrian, Harry Pribadi; Kirana, Sabili Putra; Satria, Muhamad Daffa; Chotibah, Muthya; Lahuddien, Ailum Mukhlish
Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) Vol 9, No 1 (2026): Februari 2026
Publisher : Program Studi Teknik Komputer, Fakultas Teknik. Universitas Serambi Mekkah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32672/jnkti.v9i1.10282

Abstract

Abstrak - Dalam jurnal ini, para penulis akan mengkaji bagaimana Roblox, sebuah platform pengembangan permainan edukatif berbasis cloud computing, dapat diterapkan dalam praktik. Pengembangan permainan edukatif secara tradisional biasanya dibatasi oleh biaya infrastruktur server dan kompleksitas teknis. Roblox menyediakan model Platform as a Service (PaaS) sebagai salah satu solusi untuk memisahkan distribusi konten dan lingkungan pengembangan (Roblox Studio). Jurnal ini akan menganalisis arsitektur, kemampuan, dan dampak integrasi Roblox dalam pembelajaran menggunakan pendekatan studi literatur dengan pendekatan deskriptif terhadap berbagai artikel relevan. Temuan analisis menunjukkan bahwa arsitektur cloud di Roblox memungkinkan instruktur untuk mengembangkan kelas interaktif 3D tanpa perlu memelihara server hardware. Platform ini telah terbukti efektif dalam meningkatkan motivasi intrinsik siswa, serta hasil belajar mereka di berbagai disiplin ilmu, termasuk teknik otomotif dan literasi. Namun, penggunaannya terkait dengan masalah besar terkait keamanan siber, seperti ancaman perundungan siber, grooming, dan aspek moral komodifikasi pengguna (playbour). Disimpulkan bahwa meskipun Roblox memiliki potensi besar untuk mendemokratisasi pengembangan media pembelajaran modern, penggunaannya mutlak memerlukan pengawasan ketat dan strategi mitigasi risiko yang komprehensif.Kata kunci : Roblox; Game Edukasi; Cloud Computing; Game-Based Learning; Platform as a Service; Abstract - In this journal, the authors will examine how Roblox, a cloud computing-based educational game development platform, can be applied in practice. Diagnosis Educational game development traditionally has been constrained by the costs of server infrastructure and the complexity of the game.. Roblox provides a Platform as a Service (PaaS) model as a solution to separate content distribution and the development environment (Roblox Studio). This journal will analyze the architecture, capabilities, and impact of Roblox integration in learning using a literature study approach with a descriptive approach to various relevant articles. The findings of the analysis show that the cloud architecture in Roblox allows instructors to develop interactive 3D classes without the need to maintain hardware servers. This platform has been tested to be useful in enhancing the intrinsic motivation of students and their learning outcomes in other subjects, such as automotive engineering and literacy. However, its use is associated with major cybersecurity issues, such as cyberbullying, grooming, and the moral aspects of user commodification (playbour). It is concluded that despite having enormous potential of democratizing the development of modern learning media, the usage of Roblox must be strictly supervised and the process of implementing its usage should be accompanied by the extensive risk mitigation strategies.Keywords: Roblox; Educational Games; Cloud Computing; Game-Based Learning; Platform as a Service;
Analisis Jaringan Wireless untuk Rumah Kos Menggunakan Router Fitrian, Harry Pribadi; Putri, Najwa Annisa; Ikhsan Amrillah Arsy; Da’ifa Maulana; Muhamad Luthfi Almanfaluthi; Zidan Zain Shibghatullah
TAMIKA: Jurnal Tugas Akhir Manajemen Informatika & Komputerisasi Akuntansi Vol 5 No 2 (2025): TAMIKA: Jurnal Tugas Akhir Manajemen Informatika & Komputerisasi Akuntansi
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/tamika.Vol5No2.pp378-385

Abstract

As the number of users and digital activities increases, the need for quality internet networks in boarding houses is also increasing. However, Wi-Fi networks in boarding houses face challenges in the form of multi-story buildings with concrete walls, long corridors, and many small rooms, coupled with the high number of connected devices and differences in the characteristics of the 2.4 GHz and 5 GHz frequencies, which cause dead spots, decreased throughput, and increased delay during peak hours. This study uses a Systematic Literature Review method on 15 studies related to indoor Wi-Fi network design, bandwidth management, and Quality of Service analysis in boarding house environments. The results of the study show that the most suitable topology is the application of several access points at the center of the building or main corridor, reinforced by APs or repeaters in areas with high physical barriers, designed using a Top Down Network Design (TDND) approach to align with the needs of residents and the characteristics of the space. From a management perspective, the combination of User Manager, CAPsMAN, and PCQ is effective for authentication, fair bandwidth distribution, and access point load balancing, thereby reducing misuse and preventing overload. Quality of Service parameters such as throughput, delay, jitter, and packet loss are used to compare network conditions before and after optimization, and various studies show that this combination of topology design and bandwidth management consistently improves speed, stability, and equitable Wi-Fi access for boarding house residents.
Analisis Pengaruh Jarak Terhadap Kekuatan dan Stabilitas Sinyal Wifi di Area Gedung Kampus Fitrian, Harry Pribadi; Sriastuti, Dini; Dede Rifki; Muhamad Rizki Yunara; Ari Aripin
TAMIKA: Jurnal Tugas Akhir Manajemen Informatika & Komputerisasi Akuntansi Vol 5 No 2 (2025): TAMIKA: Jurnal Tugas Akhir Manajemen Informatika & Komputerisasi Akuntansi
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/tamika.Vol5No2.pp386-393

Abstract

WiFi connectivity is crucial in supporting academic activities on campus, but its signal quality is affected by distance, physical obstacles, and Non-Line of Sight (NLOS) conditions. This study uses a Systematic Literature Review method to examine the influence of distance and environmental factors on the strength and stability of WiFi signals in campus buildings. The findings indicate that increased distance and the presence of physical barriers reduce RSSI and Signal-to-Noise Ratio (SNR) values, which subsequently decreases throughput and increases delay. Channel interference also contributes to connection instability. Optimization strategies such as proper access point placement and frequency channel management are essential to maintain network quality and ensure Quality of Service (QoS). This study provides strong indications of the key factors that need consideration in managing campus WiFi networks to support user comfort and usage efficiency.
Analisis Faktor yang Mempengaruhi Kinerja Jaringan Komputer dalam Lingkungan Multi-User Fitrian, Harry Pribadi; Difa, Damia Hasna; Vina Aulia Melianti; Fajar Muhammad Ramdhani
TAMIKA: Jurnal Tugas Akhir Manajemen Informatika & Komputerisasi Akuntansi Vol 5 No 2 (2025): TAMIKA: Jurnal Tugas Akhir Manajemen Informatika & Komputerisasi Akuntansi
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/tamika.Vol5No2.pp410-415

Abstract

This study addresses the degradation of computer network performance in multi-user environments due to high traffic loads, limited bandwidth, and suboptimal configurations, leading to reduced throughput, increased delay, jitter, and packet loss. The objective is to identify key influencing factors and effective optimization techniques through a Systematic Literature Review (SLR) of empirical studies from 2020-2025. The methodology involved searching databases like Google Scholar and Garuda using keywords such as "network performance," "QoS," and "multi-user," selecting 7 relevant articles from 200 initial results via inclusion/exclusion criteria based on title, abstract, and full-text relevance. Findings reveal that Quality of Service (QoS) implementation significantly mitigates issues, reducing jitter by up to 40%, packet loss below 0.1%, and stabilizing real-time services like VoIP in settings such as schools, offices, and internet cafes.