Claim Missing Document
Check
Articles

Analisa Keamanan Data Pada Sistem Informasi Kampus (SISKA) Universitas Bina Darma Menggunakan Metode Burp Suite Cahya, Vicky Dwi; Ariyadi, Tamsir; Kurniawan, Djeysen; Irfansyah, Yovi Fajar
JUSTER : Jurnal Sains dan Terapan Vol. 4 No. 1 (2025): JUSTER: Jurnal Sains dan Terapan
Publisher : Jompa Research and Development

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.57218/juster.v4i1.1353

Abstract

Sistem Informasi Kampus (SISKA) adalah salah satu aplikasi penting dalam pengelolaan data akademik di Universitas Bina Darma. Keamanan data menjadi isu kritis, terutama dalam melindungi informasi sensitif seperti data mahasiswa, jadwal perkuliahan, dan hasil akademik. Penelitian ini bertujuan untuk menganalisis keamanan data pada SISKA menggunakan Burp Suite, sebuah alat pengujian keamanan aplikasi web. Proses analisis melibatkan pengujian terhadap autentikasi, otorisasi, dan kerentanan umum seperti SQL Injection, XSS (Cross-Site Scripting), dan kebocoran data. Hasil pengujian menunjukkan bahwa terdapat beberapa celah keamanan yang memerlukan perbaikan, termasuk pada pengelolaan sesi pengguna dan validasi input. Rekomendasi perbaikan disampaikan untuk meningkatkan keamanan sistem. Sistem Informasi Kampus (SISKA) adalah salah satu aplikasi penting dalam pengelolaan data akademik di Universitas Bina Darma. Keamanan data menjadi isu kritis, terutama dalam melindungi informasi sensitif seperti data mahasiswa, jadwal perkuliahan, dan hasil akademik. Penelitian ini bertujuan untuk menganalisis keamanan data pada SISKA menggunakan Burp Suite, sebuah alat pengujian keamanan aplikasi web. Proses analisis melibatkan pengujian terhadap autentikasi, otorisasi, dan kerentanan umum seperti SQL Injection, XSS (Cross-Site Scripting), dan kebocoran data. Hasil pengujian menunjukkan bahwa terdapat beberapa celah keamanan yang memerlukan perbaikan, termasuk pada pengelolaan sesi pengguna dan validasi input. Rekomendasi perbaikan disampaikan untuk meningkatkan keamanan sistem.
PROTOTYPE WATER SPRAY OTOMATIS UNTUK PEMBERSIHAN DEBU BATUBARA PADA COAL CONVEYOR Arik Putra Pratama; Nina Paramitha; Rasmila; Tamsir Ariyadi
Tech-E Vol. 8 No. 2 (2025): The Tech-E Journal Vol. 8 No. 2 publishes research papers in such informatics:
Publisher : Fakultas Sains dan Teknologi-Universitas Buddhi Dharma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31253/te.v8i2.3410

Abstract

Coal dust generated during the transfer process via belt conveyors at PT Bukit Asam Tbk has significant negative impacts on the environment and the health of workers. The current manual method, involving direct water spraying, is ineffective in controlling airborne dust and increases safety risks due to water exposure and unstable working conditions. To overcome these challenges, this study developed a prototype of an Arduino-based automatic water spraying system as a safer and more efficient solution.The system employs a SHARP GP2Y1010AU0F dust sensor to monitor coal dust concentrations in real-time and an HC-SR04 ultrasonic sensor to regulate water spraying automatically, based on the detected levels. The prototype was tested under operational conditions and showed optimal performance, effectively reducing coal dust concentrations while improving health and safety standards in the workplace.This innovation offers a practical and sustainable approach to coal dust management, addressing the shortcomings of manual methods. By automating the process, it minimizes worker exposure to dust and eliminates hazards associated with direct water application. The system's efficient and safe operation highlights its potential for broader implementation in similar mining environments. This technology not only resolves critical issues in coal dust control but also introduces a forward-thinking solution that aligns with industry goals for improved occupational safety and environmental protection.
Implementasi OWASP untuk Analisis Kerentanan dan Keamanan pada Sistem Informasi Akademik Terintegrasi Universitas Bina Darma Tamsir Ariyadi; Hidayatul Fadli; Taufik Akbar; Muhammad Bimo Prihandoko
STORAGE: Jurnal Ilmiah Teknik dan Ilmu Komputer Vol. 4 No. 1 (2025): Februari
Publisher : Yayasan Literasi Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55123/storage.v4i1.4737

Abstract

The advancement of information technology has brought significant changes to the way teaching and learning processes are carried out in higher education, one of which is through the implementation of the Siska (Integrated Academic Information System). While this system provides many benefits, it also introduces potential security risks that could threaten data integrity and disrupt the learning process. This study aims to analyze the vulnerabilities on the website https://siska.binadarma.ac.id/ of Universitas Bina Darma using the OWASP (Open Web Application Security Project) framework. This method assists in identifying potential security loopholes that could be exploited by unauthorized parties. The research examines these vulnerabilities based on the ten key categories proposed in the OWASP Top 10. The results of this analysis are expected to offer valuable recommendations to enhance the security of the Siska system at Universitas Bina Darma, ultimately protecting user data and ensuring that the learning process continues safely and smoothly.
Analisis Website E-learning Bina Darma Menggunakan Metode Web Application Security Project Zap (Owasp Zap) Mgs M Nur Arromadhani; Tamsir Ariyadi; A fahlevi Hadist; M Dimas Putra
STORAGE: Jurnal Ilmiah Teknik dan Ilmu Komputer Vol. 4 No. 1 (2025): Februari
Publisher : Yayasan Literasi Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55123/storage.v4i1.4740

Abstract

Penelitian ini menggunakan teknologi ZAP (Zed Attack Proxy) milik OWASP untuk menganalisis keamanan website e-learning Universitas Bina Dharma. Situs web e-learning adalah platform penting untuk pembelajaran online, namun sering kali memuat informasi pribadi pengguna, sehingga rentan terhadap ancaman keamanan. Tujuan dari penelitian ini adalah untuk mengidentifikasi kerentanan yang dapat dieksploitasi oleh pihak yang tidak bertanggung jawab. Metode yang digunakan adalah pengujian keamanan menggunakan OWASP ZAP yang secara otomatis mendeteksi kerentanan seperti XSS, SQL injection, dan masalah konfigurasi lainnya. Temuan menunjukkan adanya kerentanan terkait manajemen sesi pengguna dan validasi input. Peneliti akan memberikan rekomendasi perbaikan untuk memperkuat keamanan dan mengurangi risiko pelanggaran data yang dapat merugikan pengguna dan institusi.
TEKNIK PENGUJIAN PENETRASI HTTP MENGGUNAKAN TOOLS BURP SUITE PADA KALI LINUX Vanisa Dwi Agustina; Tamsir Ariyadi; Tari Syah Putra; Ahmad Lega
STORAGE: Jurnal Ilmiah Teknik dan Ilmu Komputer Vol. 4 No. 1 (2025): Februari
Publisher : Yayasan Literasi Sains Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55123/storage.v4i1.4770

Abstract

Burp Suite adalah alat yang digunakan untuk melakukan pengujian keamanan pada aplikasi web, dengan kemampuan untuk mengidentifikasi dan mengeksploitasi kerentanannya. Alat ini menyediakan berbagai fitur seperti Intercepting Proxy, Scanner, Intruder, dan Repeater, yang memungkinkan pengguna untuk menganalisis lalu lintas HTTP/HTTPS, mencari kerentanan otomatis, serta menguji ketahanan aplikasi terhadap input berbahaya. Burp Suite banyak digunakan oleh para profesional keamanan untuk memastikan bahwa aplikasi web yang diuji bebas dari celah yang dapat dimanfaatkan oleh pihak yang tidak bertanggung jawab. Penelitian ini bertujuan untuk menjelaskan fungsi, penggunaan, serta potensi Burp Suite dalam pengujian keamanan aplikasi web, serta memberikan saran penggunaan yang efektif untuk hasil yang maksimal.
Prototipe Sistem Smart Box untuk Keamanan Penerimaan Paket Online Shopping Valupi, Christine; Ariyadi, Tamsir; Paramyta, Nina; Purwanto, Timur Dali
Jurnal Ilmiah Universitas Batanghari Jambi Vol 25, No 1 (2025): Februari
Publisher : Universitas Batanghari Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33087/jiubj.v25i1.5675

Abstract

This research aims to design a tool with a smart box system that is used by package owners to be able to automatically receive packages and temporarily store packages safely. This tool uses an ESP-32Wroom microcontroller which will process input from the HC-SR04 ultrasonic sensor, HX-711 loadcell and Keypad. The courier can only open the box by inputting the code on the 4 x 4 keypad on the box. When the receipt is successfully entered, the door lock solenoid on the box will be ON and the box will open and the package will be stored in the box. After the package is put into the box by the courier, the package will move to another room below which can be closed automatically, and only the owner of the package box has access to open the box. Equipped with an ESP-32 Camera which can take pictures or photos of the package before putting it in the box. This device is integrated with Internet of Things technology where notifications about package status can be received and monitored in real-time remotely by the package recipient.
ANALISIS MONITORING UNTUK PENCEGAHAN AKSES ILEGAL DI DALAM JARINGAN DEPARTEMENT TI PT. PUSRI Ariyadi, Tamsir; Ikrar Agamuri, M.Alzi; Wiratama, Rahmat; Kholid, Dasril
JURNAL ILMIAH INFORMATIKA Vol 13 No 01 (2025): Jurnal Ilmiah Informatika (JIF)
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v13i01.9915

Abstract

Technology plays an important role in human survival in daily activities that cannot be separated from technology. Information technology makes it easy for humans to share information or search for information. Cyber ​​attacks such as malware attacks or hacking attempts are a serious threat to IT networks. The purpose of network security is to anticipate the risk of network threats that can disrupt daily computer network operations. In this study, the author used the Action Research method. This study aims to test and develop, find and design. The network in the IT Department of PT. Pupuk Srwidjaja Palembang is quite safe because when network monitoring was carried out for 10 days on June 6, 2023 to June 22, 2023, there was no illegal access.
RANCANG BANGUN SISTEM LOKER OTOMATIS MENGGUNAKAN QRCODE DAN LAMPU UV DISINFEKTAN Estrada, Novesel; Rafli Pratama, Muhammad; Ariyadi, Tamsir
JURNAL ILMIAH INFORMATIKA Vol 13 No 01 (2025): Jurnal Ilmiah Informatika (JIF)
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v13i01.9923

Abstract

As technology advances, the level of intelligence in humans increases, so humans always want to create progressive innovations, but besides that, it can also give rise to crime in society. Therefore, security aspects are very much needed in various sectors of life today. One of them is the locker security system which can influence criminal acts. A locker is a place for storage that usually has a lock, which is used to store or place valuable items. One of the facts is that there is often theft and loss of items at places where lockers are rented or borrowed. Thieves can easily open the locker lock using a piece of wire or other artificial keys. This research designs and builds a locker door security system consisting of QRcode sensors, solenoid locks, UV lights, Arduino and other sensor devices. The result of this research is an implementation of a locker security system that can open and close locker locks automatically using Arduino Uno which can provide automatic lock security with a better level of security such as the use of an automatic lock that uses a QRcode scan sensor which only the owner can open by pasting the QRcode code, and additional automatic locks such as a password keypad to open the locker.
RANCANG BANGUN PROTOTYPE SISTEM PROTEKSI MOTOR DC BERBASIS MIKROKONTROLER DENGAN NOTIFIKASI TELEGRAM Al Baihaqqi, Difa; Paramytha, Nina; Fitriani, Endah; Ariyadi, Tamsir
JURNAL ILMIAH INFORMATIKA Vol 13 No 01 (2025): Jurnal Ilmiah Informatika (JIF)
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v13i01.9940

Abstract

CTP / CTCP machine which is a machine used in the printing industry that functions to make printing plates. CTP (Computer to Plate) CTCP (Computer to Conventional Plate). Continuous usage of this machine may cause the vacuum blower motor to overheat and shut off, which could impede the creation of printing plates and ultimately halt output. The performance of the machine can be enhanced by using protective system technology on the vacuum blower motor. By using microcontroller Node MCU ESP 8266 as control system, using a DS18B20 as temperature sensor, two fan as cooler, PZEM 017t as voltage and current monitoring motor, LCD 16x2 as display showing the values of current, voltage, DC motor temperature, DC motor speed control, and telegram to monitoring system realtime. The research’s output is a prototype that uses a DC motor as vacuum blower motor for monitoring and cooler if the DC motor temperature reaches a certain point, it will automatically notify the user via a chatbot (Telegram). So that when used with the plate printing machine, it can subsequently aid in improving output results.
Prototype Implementation of It Business VPS and Web Hosting Services as a Research Laboratory for Bina Darma University Suryayusra; Reyhan Achmad Alfarizhi; Fatoni; Tamsir Ariyadi; Maria Ulfa
INOVTEK Polbeng - Seri Informatika Vol. 9 No. 2 (2024): November
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/syx1bj02

Abstract

In today's digital era, the need for flexible and reliable IT infrastructure is increasing, especially in the education and business sectors. This research aims to develop a prototype of VPS (Virtual Private Server) and web hosting services as a research laboratory as well as IT business services at Bina Darma University. This service is designed not only to support student research, but also as an IT business model that offers hosting solutions that can be customized according to customer needs. The main objective of this research is to create a digital infrastructure solution that allows students to learn and practice in server management and hosting directly, while developing a market-ready IT hosting business service. This prototype is expected to provide a stable and secure research environment, as well as a potential IT service business model. This research utilizes an action research methodology, which involves a cycle of planning, development, performance testing, and evaluation. Testing includes performance, security, and operational cost analysis, as well as case studies of VPS service implementation in academic and business environments. Evaluation was conducted based on feedback from service users. The results of the research are expected to have a significant impact on the development of IT hosting businesses in academia and industry, as well as improving students' practical skills in digital infrastructure management.  
Co-Authors A fahlevi Hadist A Taufan Maulana A. Sayuti Kazuya Aan Restu Mukti Aan Restu Mukti, Aan Restu Ade Putra Adina, Gita Agung Saputra Ahmad Anwar Widodo Ahmad Lega Aidil Nur Riyansyah Al Baihaqqi, Difa Alfyuddin, Moh Rizki Andri Agus Salim Anggraeni, Marisa Ariandi, Muhamad Arik Putra Pratama Ariyudi Ariyudi Assalafi, Fawwaz Bagus Setiawan Bintang, Muhammad Yuan Cahya, Vicky Dwi Dani, Ilham Darwin Darwin Dastin Dimas Surya Rahmadani Dwi Pertiwiningsih Efansyah, Teguh Efransa, Didi Eggy Saputra EKA NOVITASARI Eko Fajar Cahyadi Elfrida Ratnawati endah fitriani Endah Fitriani Erwinsyah Erwinsyah Estrada, Novesel Fatoni Fatoni, Fatoni Febriani Sasti Kirana Februri, Muhammad Aldi Fitriani Ibrahim Fitriani, Endah H. Mukran Roni, H. Mukran Hafizh, Ahmad Hari Yudho Prabowo Heru Saputra Hery Setiawan, Hery Hidayatul Fadli Huda Mubarok, M. Syaiful Hutami, Peni Ikrar Agamuri, M.Alzi Ilham, Firgi Anto Irfansyah, Yovi Fajar Irham Irham Irwansyah Irwansyah IS, Nina Paramytha Jemakmun, Jemakmun Jumadil, Hanif Junianto Kasim, Ali Kasim, Ali Kholid, Dasril Khudri, Akhmad Komalasari, Dinny Kundari Kurniawan, Djeysen Lubis, Abdullah Syafei M Agung M Dimas Putra M. Alzi Ikrar M. Ilham Septariansyah M. Khairul Hadi M. Ridho, M. Ridho M. Rizky Pohan M. Rizky Pohan Makmuri, M. Kumroni Maria Ulfa Meria, Desi Mgs M Nur Arromadhani Muhamad Agung Prabowo Muhamad Malik Fajar Muhammad Bimo Prihandoko Muhammad Fikri Muhammad Kevin Al Kautsar Muhammad Nadifh Muhammad Rama Saputra Muhammad Robby Anwar Muhammad Tio Farizky Nely Apriyanti Nina Paramita Nina Paramitha Nina Paramyta Nina Paramytha IS Nuriansyah, Muhammad Arya Paramitha IS, Nina Paramitha, Nina Paramyta, Nina Paramytha , Nina Paramytha, Nina Permata, Sindi Prabowo, Hari Yudho Prawira, Wanda Yudha Purwanto, Timur Dali Putra, Abriansya Rafli Pratama, Muhammad Rahmad Novrianda Dasmen Rahmadan, Eno Raihan, M. Ramadhan, Muhammad Andre Rangga YP, M. Rasmila Reyhan Achmad Alfarizhi Rizki Juliansyah Rosyad, Farlin Roy Jordi Sabeli Aliya Saputra, Deo Sari, Diah Novita Suryayusra Suryayusra Suyanto Suyanto Syafi'ul Hamidani SYAH, JENIO MULIA Tantri Langgeng Widodo Tari Syah Putra Taufik Akbar Timur Dali Purwanto Valupi, Christine Vanisa Dwi Agustina Wanda Yudha Prawira wardani, kiky rizky nova Wildan Maula Wiratama, Rahmat Wydyanto Wydyanto, Wydyanto Yudiastuti, Helda Yulian, Akhmad Rizki