Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Jurnal E-Komtek

Evaluasi Autentikasi Dua Faktor (2FA) TOTP Pada Perguruan Tinggi Menggunakan Vulnerability Assessment dan CIA Triad Heru Wijayanto Aripradono; Haeruddin; Kurnia Cantra
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 8 No 2 (2024)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v8i2.2113

Abstract

Vulnerability exploitation in education websites often leads to data breaches, negatively impacting learning activities, notably higher education, which is highly susceptible to such attacks. This research evaluates the effectiveness of two-factor authentication in mitigating exploitability. To analyze issues further, vulnerability assessment tools, such as Burp Suite and ZAP, can explore website vulnerability and the CIA Triad framework (Confidentiality, Integrity, Availability). The analysis revealed three medium-level vulnerabilities and six low-level vulnerabilities; key topics such as CSRF (Cross-Site Request Forgery) and XSS (Cross-Site Scripting), compromise integrity, and MITM (Man-In-The-Middle) attacks threaten Confidentiality, these vulnerabilities indicate non-compliance with CIA Triad, mitigation strategy such are VPN (Virtual Private Network), and WAF (Web Application Firewall) were proposed. While two-factor authentication improves security, additional fixes and optimizations are required for its effective implementation in the education sector.
Ransomware Attack Analysis in Cybersecurity Stefanus Eko Prasetyo; Heru Wijayanto Aripradono; Ricardo
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 9 No 1 (2025)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v9i1.2279

Abstract

Ransomware attacks have emerged as a significant threat to computer security in the digital age. This research aims to analyze ransomware attacks within the context of cybersecurity, specifically focusing on the impact of such attacks on an organization's database infrastructure. The study involves simulating ransomware attacks using techniques commonly employed by attackers in real-world scenarios. It includes a comprehensive literature review, case observations of previous ransomware attacks, and system simulations to understand the nature of these attacks and their potential consequences. The research highlights the need for effective mitigation strategies to safeguard critical organizational infrastructure and provide insights into strengthening defenses against ransomware. The findings of this study are expected to contribute to the development of more effective and sustainable cybersecurity strategies to address the growing complexity of cyber threats and ensure the operational continuity of organizations.Keywords: Ransomware attacks, Cybersecurity, Database infrastructure