Novida Sari, Sri
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Penerapan Metode Multi-Objective Optimization On The Basis Of Ratio Analysis Dalam Sistem Pendukung Keputusan Penilaian Kinerja Pegawai Klinik Kecantikan Yohana br Ginting, Dewi; Rahmi Danur, Surizar; Putro Utomo, Dito; Feby Ronauli Lubis, Eka; Novida Sari, Sri; Rizqi Dwikunti Siregar, Dini
Bulletin of Information Technology (BIT) Vol 5 No 3: September 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bit.v5i3.1408

Abstract

The research conducted is to conduct an employee performance assessment process at a Beauty Clinic. The employee performance assessment process at a Beauty Clinic is carried out to provide awards to qualified employees at the Beauty Clinic. This study applies a Decision Support System (DSS) which is used as a system that can process employee performance assessments at the Beauty Clinic. In the employee performance assessment process at the Beauty Clinic, there are 6 criteria, namely Service Orientation, Integrity, Responsibility, Initiative, Discipline and Attendance. Thus, a system is needed that can make decisions, namely DSS by implementing the MOORA method to obtain preference values ​​from employee performance assessments at the Beauty Clinic, there is the best alternative in alternative A5 with a preference value of 0.37472
PEMANFAATAN KERANGKA KERJA INVESTIGASI FORENSIK JARINGAN UNTUK IDENTIFIKASI SERANGAN JARINGAN MENGGUNAKAN SISTEM DETEKSI INTRUSI (IDS) Khaliq, Abdul; Novida Sari, Sri
Jurnal Nasional Teknologi Komputer Vol 2 No 3 (2022): Volume 2 Nomor 3 Juli 2022
Publisher : CV. Hawari

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61306/jnastek.v2i3.52

Abstract

One of the media to secure computers is to apply Intrusion Detection System (IDS) technology. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the types and types of computer network attacks. Logs on the IDS will be analyzed in depth to be used as an effort to improve computer network security. The research method that will be used is applied research. The research was carried out using the Network Forensic Investigation Framework proposed by Pilli, Joshi and Niyogi. The stages of the Network Forensic Investigation Framework are used to perform network simulations, analysis and investigations to determine the types of computer network attacks. The results show that the Network Forensic Investigation Framework facilitates the investigation process when a network attack occurs. The Network Forensic Investigation Framework is effectively used when the computer network has network security support applications such as IDS or others. IDS is effective in detecting network scanning activities and DOS attacks. IDS provides alerts to administrators because there are activities that violate the rules on the IDS.