Claim Missing Document
Check
Articles

Found 3 Documents
Search

Evaluation of IT Governance Maturity Level in Stationery Stores Using COBIT 5 Yahu, Mikhael Neta; Septian, Daniel Marvelino; Ghifari, Nabil Najwa Al; Sabrila, Trifebi Shina; Latif, Abdul; Lindawati, Ratna
INSTALL: Information System and Technology Journal Vol 1 No 2 (2024): INSTALL : Information System and Technology Journal
Publisher : LPPM Universitas Sari Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33859/install.v1i2.802

Abstract

In the operation of a company that utilizes and implements information technology components, a framework is needed to ensure that all information technology components are operational in accordance with the goals that the company wants to achieve. The use of information technology components in the business sector requires companies to have good information technology governance skills so that the identification and implementation of information technology component components work optimally. To measure the level of maturity and ensure that the information technology components used in the ATK store are implemented and run properly and ensure whether the information technology component provides benefits for the ATK store business. The data collection method to measure the maturity level at the ATK xyz take was carried out by direct interviews and questionnaires for the staff responsible for the operation of the information technology component at the ATK xyz take. Based on the results of measuring the maturity level using the COBIT 5 framework, it was found that the maturity value was at a value of 3.25 or at level 3 (established). At this level, the IT governance process is considered good and runs optimally and comprehensively. The gap between the current and expected IT governance processes is at 1.67. This gap indicates that the current IT governance process is quite good. In the future, it is recommended to use more domains from COBIT 5 as the focus of the assessment area, both the Governance area and the Management area, so that the assessment becomes more comprehensive with a more varied research focus.
Design of Information Technology Infrastructure Integration as Support Academic Sevice at a University Nursandi, Muhammad; Ramadhani, Amanda Putri; Maretmy, Angella; Septian, Daniel Marvelino
INSTALL: Information System and Technology Journal Vol 2 No 3 (2025): INSTALL : Information System and Technology Journal
Publisher : LPPM Universitas Sari Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33859/install.v2i3.995

Abstract

The rapid growth of digital academic services requires universities to develop reliable, scalable, and integrated information technology infrastructures. This study focuses on the design and planning of the IT infrastructure for Building E at Universitas Sari Mulia, aiming to support both academic and administrative activities while integrating seamlessly with the existing campus network. The research applies a design and development method, encompassing technical analysis, network architecture design, detailed system design, and conceptual validation. The Building E infrastructure includes six main rooms, with a server room functioning as the central local network management node. A three-tier network architecture core, distribution, and access layers is implemented to ensure efficient management, traffic segmentation, and direct interaction with end users. The integration plan considers inter-building connectivity, network security, and operational workflow to maintain stability and reliability while accommodating future expansion. The proposed design enhances network performance, simplifies maintenance, ensures centralized data management, and provides reliable digital services for students, faculty, and administrative staff. Conceptual validation confirms that the design aligns with technical requirements, security standards, and institutional policies. The study establishes a strategic foundation for developing a smart campus environment, ensuring that Building E contributes significantly to the university’s digital transformation and long-term academic excellence.
Simulation of End-to-End Secure Channels in Digital Payment Systems Using TLS 1.3 Combined with Client-Side AES-GCM Encryption Neta Yahu, Mikhael; Septian, Daniel Marvelino; Daud, Excel
INSTALL: Information System and Technology Journal Vol 2 No 3 (2025): INSTALL : Information System and Technology Journal
Publisher : LPPM Universitas Sari Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33859/install.v2i3.1002

Abstract

The rapid growth of digital payment systems and online transaction services has intensified the need for stronger mechanisms to protect sensitive user data from interception, leakage, and unauthorized access. Although Transport Layer Security (TLS) is widely adopted to secure communication channels, it primarily protects data during transmission and does not fully address risks arising from compromised servers or application-layer vulnerabilities. This study proposes and simulates an end-to-end secure channel architecture that integrates client-side encryption using the Advanced Encryption Standard in Galois/Counter Mode (AES-GCM) with the TLS 1.3 protocol to provide layered security. A web-based simulation was developed using HTML, CSS, and JavaScript with the Web Crypto API to illustrate the complete workflow, including client-side key generation, application-layer encryption, TLS 1.3 handshake, secure channel establishment, transport-layer encryption, and server-side processing. The simulation also implements a zero-knowledge mode, ensuring that the server does not possess the client-side encryption key and therefore cannot decrypt sensitive data at the application layer. The experimental results indicate that separating cryptographic keys between the application layer and the transport layer significantly enhances confidentiality and minimizes the impact of key compromise or server-side breaches. Furthermore, the visualization provided by the simulation helps clarify the interaction between client-side encryption and TLS 1.3 mechanisms, making it a useful educational and analytical tool. Overall, this study demonstrates that combining AES-GCM-based client-side encryption with TLS 1.3 offers a robust and practical approach for securing digital payment systems and other applications requiring high levels of data protection.