cover
Contact Name
ibnu surya
Contact Email
ibnu@pcr.ac.id
Phone
+6285272673321
Journal Mail Official
jurnalkomputerterapan@pcr.ac.id
Editorial Address
Jurnal Komputer Terapan (JKT) Badan Penelitian dan Pengabdian kepada Masyarakat (BP2M) Politeknik Caltex Riau Jl. UmbanSari No. 1 Rumbai - Pekanbaru 28265
Location
Kota pekanbaru,
Riau
INDONESIA
Jurnal Komputer Terapan
Published by Politeknik Caltex Riau
ISSN : 24434159     EISSN : 24605255     DOI : https://doi.org/10.35143/jkt
Core Subject : Science,
Applied Computer Journal Articles from various fields in Informatics, Information Systems and Computer science. Topics included, 1. Informatics 1.1 Software Engineering 1.2 Multimedia 2. Information Systems 2.1 Soft Computing 2.2 Business Analyst 2.3 Data Engineering 3. Computer science 3.1 Operating System 3.2 Computer Network
Articles 6 Documents
Search results for , issue "Vol 11 No 1 (2025): Jurnal Komputer Terapan" : 6 Documents clear
ANALISIS IMPLEMENTASI NUCKLEI VULNERABILITY DAN OWASP-ZAP SCANNER UNTUK DETEKSI KERENTANAN KEAMANAN (SECURE SYSTEM) PADA PLATFORM WEB BASED Rahman, Aulia; Indra, Indra; Zulkarnaim, Nuralamsah; Mukhram, Muhammad; Rizaldi, Agung
Jurnal Komputer Terapan Vol 11 No 1 (2025): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v11i1.6430

Abstract

Web-based platform security is an important aspect that developers must consider. However, numerous developer still exhibit insufficient attention to enhancing the security level of their websites, thereby increasing the likelihood of these platforms becoming targets of cyber attacks. To address this challenge, the utilization of tools such as Nuclei Vulnerability Scnner and Owasp Zap presents an effective solution for the rapid detection of potential vulnerabilities  in web-based platforms. This research involved testing a locally developed dummy web application , with scanning processes conducted using the Nuclei Vulnerability Scanner and Owasp Zap tools. The findings reveal that Nuclei Vulnerability Scanner proves effective in identifying vulnerabilities at the network layer, particularly in relation to SSL/TLS protocols and proxy configurations. In contrast, Owasp Zap is more focused on detecting vulnerabilities  within the web application layer, especially concerning security header configurations  that may be exploited through browser-based attacks such as XSS and clickjacking. Mitigation of the identified  vulnerabilities resulted in a substantial reduction in their severity, with a 90% decrease in Nuclei and an 80% reduction in Owasp Zap. Both tools demonstrated high accuracy and efficient scanning times, establishing them as effective solutions for enhancing security across both network and application layers. This study recommends the integration of these tools into a comprehensive cyber security strategy  to safeguard system integrity and availability while addressing the continuously  evolving threat landscape, in alignment with the layered security principle advocated in contemporary literature.
PENGEMBANGAN SISTEM INFORMASI PENGELOLAAN BEASISWA POLITEKNIK CALTEX RIAU Arifin, Satria Perdana; zainal Arifin Renaldo; Surya, Ibnu
Jurnal Komputer Terapan Vol 11 No 1 (2025): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v11i1.6464

Abstract

Politeknik Caltex Riau manages several scholarships whose funding sources can come from the government or private sector. The management of this scholarship scheme is done manually in the form of collecting files and recaps via Ms. Excel. In addition, the scholarship management process is carried out by an operator, namely the Head of Student Affairs, so it takes a long time to carry out the selection process until the announcement of scholarship recipients and has the potential for errors. The errors that occur include duplication of scholarship recipients, miscalculation of the scholarship funds submitted and inconsistency in writing data related to scholarship recipients. In fact, the presentation of information on scholarship recipients is absolutely needed as reporting material to related parties, such as reporting Scholarships to the Riau Provincial Government. Therefore, to assist the operator in managing scholarships, an information system was developed to manage Scholarships at Politeknik  Caltex Riau. In the development of this information system, it was built based on software development standards, namely the Software Development Life Cycle (SDLC) with Waterfall Methodology. The scholarship management system was tested on the head of student affairs, executives and scholarship recipients. From the results of testing this information system, there were no errors and it could run well. In addition, in terms of system acceptance by users, it can be concluded that this system is acceptable and makes it easier to manage scholarships
SISTEM DETEKSI AKTIVITAS BERBAHAYA PADA SERVER MENGGUNAKAN CROWDSEC Ridha, Muhammad Arif Fadhly; Maheswara, Galih Ihsan
Jurnal Komputer Terapan Vol 11 No 1 (2025): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v11i1.6486

Abstract

The rapid development of technology has driven almost all business sectors to adopt digital operations, but this shift has also increased the risk of cybercrime, targeting systems and data. Cyber Threat Intelligence (CTI) is a cybersecurity approach that involves collecting, analyzing, and understanding data to identify the motives, targets, and attack patterns of cybercriminals. One solution to address these threats is CrowdSec, an open-source software designed to detect and prevent cyber-attacks in various environments, including servers. Testing results demonstrate that CrowdSec is effective in detecting SSH brute-force, port scanning, and SQL injection attacks. By identifying suspicious attack patterns and blocking attackers' IPs, CrowdSec significantly reduces the risk of server damage. Its response times are fast: 23 seconds for SSH brute-force, 10 seconds for port scanning, and 6 seconds for SQL injection. Compared to Fail2Ban, CrowdSec offers greater configuration flexibility and broader attack detection capabilities, supported by the CrowdSec Hub, which provides a variety of attack scenarios. With its simple installation and configuration process, CrowdSec is an ideal choice for enhancing server security.
INTEGRASI NAIVE BAYES DAN ITEM-BASED COLLABORATIVE FILTERING DALAM SISTEM PEMETAAN KOMPETENSI MAHASISWA Nurmalasari, Dini; Fadhli, Mardhiah; Yuli Fitrisia, Yuli Fitrisia; Yuliantoro, Heri R
Jurnal Komputer Terapan Vol 11 No 1 (2025): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v11i1.6612

Abstract

Preparing a strong portfolio is a crucial aspect for students in entering the workforce, one of which can be achieved through participation in various competitions. However, selecting competitions that align with student competencies remains a challenge due to the abundance of competition information, diversity in student interests and abilities, and limitations in budget, time, and resources. This study develops a recommendation system based on a Hybrid Recommendation System designed to map student competencies to relevant competition types. The system integrates the Naive Bayes method to classify student competencies and Item-Based Collaborative Filtering to calculate similarities between competition types based on other users’ preferences. The system is developed incrementally using the waterfall approach, including the stages of planning, analysis, design, implementation, and testing. The model follows standard machine learning workflows, comprising data collection, exploration and preprocessing, model building, performance evaluation, and method integration. The research data includes student profiles, competencies, and competition preferences collected through surveys and internal databases. Evaluation results indicate that the system successfully provides relevant competition recommendations with an accuracy rate of 70%. These results demonstrate the system’s contribution in assisting students to select competitions that match their competencies, presented in a user-friendly web-based application.
PENGEMBANGAN SISTEM INFORMASI CAGAR BUDAYA (SITARI) SEBAGAI UPAYA PELESTARIAN BUDAYA DI PROVINSI RIAU Dewi, Meilany; Novayani, Wenda; Rachmawati, Heni; Hidayat, Erzi; Zain, Muhammad Mahrus
Jurnal Komputer Terapan Vol 11 No 1 (2025): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v11i1.6495

Abstract

Awareness of the importance of cultural preservation should be a fundamental concern for every Indonesian citizen, particularly in the face of the rapid cultural influences brought about by globalization and advancements in internet technology. This is especially relevant for the people of Riau Province, which is rich in historical heritage and cultural diversity. The development of SITARI (Sistem Informasi Cagar Budaya Riau) represents a strategic initiative aimed at preserving the cultural assets of Riau Province through the facilitation of cultural heritage reporting, heritage data collection, and 360-degree virtual tours.During the development process, a Focus Group Discussion (FGD) was conducted involving representatives from relevant government agencies across the 12 regencies and municipalities in Riau Province. The objective was to identify existing challenges and gather input regarding system development needs. In parallel, a public survey was carried out to capture community perspectives on the difficulties faced in reporting suspected cultural heritage objects. The system was developed using the waterfall model approach. Evaluation results indicate that the SITARI application operates effectively and performs optimally without errors. It is deemed relevant in supporting cultural literacy, heritage preservation, and the promotion of tourism in Riau. The user interface and layout received positive feedback, indicating potential for further development. Notably, the 360-degree Virtual Tour feature was highly appreciated. The application also adheres to OWASP security standards, with minor low-risk vulnerabilities identified for future improvement.
Transformasi Digital Manajemen Pelatihan Internal Staf dengan Pendekatan Extreme Programming Tasya Nurul Fadilah; Santoso, Heni Rachmawati; Qudsi, Dini Hidayatul
Jurnal Komputer Terapan Vol 11 No 1 (2025): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v11i1.6662

Abstract

Internal training activities at the Information Technology Department of Politeknik Caltex Riau were previously managed in a semi-manual manner without an integrated database, leading to inefficiencies in administrative processes such as identifying potential trainers, participant registration, material documentation, and reporting. These issues resulted in disorganized data management and the risk of losing important information. This study aims to develop a web-based Training Management Information System using the Extreme Programming (XP) method as a solution to improve efficiency and service quality. The development process follows the XP stages: exploration (identifying user needs), planning (scheduling and estimating resources), development iterations (analysis, design, incremental releases, and feedback), and final production (system release and refinement). System evaluation was conducted through usability testing using questionnaires for organizers and lecturers, as well as in-depth interviews with the Head of Department as a strategic user. The results show that 79% of respondents found the system easy to use, relevant to their needs, and functionally adequate. Interviews also confirmed that the system met expectations in terms of features and interface design. These findings indicate that the XP approach is effective in developing user-centered web-based systems and improving the operational efficiency of internal training activities.

Page 1 of 1 | Total Record : 6