Claim Missing Document
Check
Articles

Found 2 Documents
Search

Audit Kerentanan Infrastruktur Siber Dan Korelasinya Terhadap Eskalasi Ketidakpercayaan Publik: Studi Kasus Layanan Digital Pemerintah Indonesia Farhan, Muhammad Ulya; Nadia, Rayyatun; Naziva, Muhammad Alzi; Idrisi, Muhammad Al; Kobat, Nicoiwan Adha
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.162

Abstract

Digital transformation in Indonesia's public sector faces a dual challenge: technical infrastructure vulnerabilities and a crisis of public trust due to recurring cyber incidents. This study aims to empirically test whether the level of technical vulnerability in government systems correlates linearly with the intensity of public negative sentiment (public distrust). Using a mixed-method approach, this research combines passive security audits (Passive Reconnaissance) based on Open Source Intelligence (OSINT) on 30 government domains (.go.id) and sentiment analysis based on Large Language Models (LLM) on 55,451 social media comments. The results reveal a counterintuitive finding of no significant correlation between technical vulnerability and public distrust (Pearson ). Data analysis uncovered a "Reputation Paradox," where agencies with critical vulnerability scores exhibited low negative sentiment, whereas agencies with seemingly secure technical profiles faced the highest levels of distrust. This study concludes that public perception of security is driven by service availability and User Experience (UX) rather than technical cybersecurity parameters.
Teknik Penyembunyian Data Non-Destruktif pada Citra Digital Menggunakan Metode End-of-File (EOF) dan Enkripsi AES-256 Farhan, Muhammad Ulya; Akbar, Fathul Barri; Fatin, Ammar; Harahap, Ariifah Yaasir
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.172

Abstract

Conventional cryptography and LSB steganography often suffer from detectability and visual distortion. This study proposes a non-destructive solution integrating End-of-File (EOF) steganography with AES-256 encryption to ensure data security without compromising carrier media quality. The method functions by appending encrypted data after the image file terminator, leaving the original pixel structure intact. Security is reinforced using AES-256 (CBC mode) and PBKDF2-HMAC-SHA256 with 100,000 iterations. Experimental results using the "PrivaSel" interface demonstrate perfect visual integrity, evidenced by identical histograms between original and stego images. Validation via Hex Editor confirms data insertion through a unique "AES-EOF" marker. Consequently, this system achieves an optimal balance between confidentiality and invisibility, preserving 100% of carrier media integrity for secure digital exchange.