cover
Contact Name
Muhammad Taufiq Nuruzzaman
Contact Email
m.taufiq@uin-suka.ac.id
Phone
+6287708181179
Journal Mail Official
jiska@uin-suka.ac.id
Editorial Address
Teknik Informatika, Fak. Sains dan Teknologi, UIN Sunan Kalijaga Jln. Marsda Adisucipto No 1 55281 Yogyakarta
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
JISKa (Jurnal Informatika Sunan Kalijaga)
ISSN : 25275836     EISSN : 25280074     DOI : -
JISKa (Jurnal Informatika Sunan Kalijaga) adalah jurnal yang mencoba untuk mempelajari dan mengembangkan konsep Integrasi dan Interkoneksi Agama dan Informatika yang diterbitkan oleh Departemen Teknik Informasi UIN Sunan Kalijaga Yogyakarta. JISKa menyediakan forum bagi para dosen, peneliti, mahasiswa dan praktisi untuk menerbitkan artikel penelitiannya, mengkaji artikel dari para kontributor, dan teknologi baru yang berkaitan dengan informatika dari berbagai disiplin ilmu
Arjuna Subject : -
Articles 7 Documents
Search results for , issue "Vol. 1 No. 3 (2017): Januari 2017" : 7 Documents clear
Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email Muhammad Nur Faiz; Rusydi Umar; Anton Yudhana
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 1 No. 3 (2017): Januari 2017
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (357.277 KB) | DOI: 10.14421/jiska.2017.13-02

Abstract

Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of life in the latest operation system windows 10. That study focused IN case several email security browsers Sales Operations manager of Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer Edge. In addition, although many digital forensics type software applications not free, goal on research objectives compares browser security information so it will be more minimize abuse email.
Pengembangan Framework Pelaporan Cyber Crime Daryono Daryono; Bambang Sugiantoro
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 1 No. 3 (2017): Januari 2017
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (361.566 KB) | DOI: 10.14421/jiska.2017.13-05

Abstract

In the era of globalization, technological development is very rapid, Information and Communication Technology (ICT) has become part of human life that can not be separated. where ICTs make our lives easier and more enjoyable. But ICTs can also be used for the crime. cybercrime is a criminal offense which is done by using computer technology as a major crime.From the information above there are many communities that use the gadget Ranging from Mobile, Smartphones, Tablets, Laptops and PCs are already connected to the Internet, there are still many people who experience crime Cybercrime ignorance of knowledge. Indonesian people themselves to report kepihak responsible for dealing with cases of cyber crimes and their reluctance to report for dikepolisian procedures are so complicated and for reporting model that still konvensional.Maka here the author makes a framework for reporting cybercrime police kepihak so that people easily and quickly in report, if there are victims of crime cyber.penelitian was conducted in this study Surakarta.metode city Mapolresta menggembangkan from a previous study conducted by Shin Yong-dalNew models for cyber crime investigation Procedure, namely the framework stages of handling cases of cyber crime.hasil development that the writers are making cybercrime reporting framework using informasi.dengan system information system cybercrime report, then the public will quickly and easily in the report, if it becomes a victim of cyber , as well as the police was quick to respond and when a report from society.
Analisis Penerapan Teknik Clustering (MSCS) pada Aplikasi SAP/R3 dengan Microsoft Operating System di PT. Arun NGL Rozzi Kesuma Dinata
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 1 No. 3 (2017): Januari 2017
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (459.155 KB) | DOI: 10.14421/jiska.2017.13-01

Abstract

Pada dasarnya setiap perusahaan besar memiliki server yang besar seperti halnya SAP, yang memerlukan pengawasan lebih. Karyawan yang bertugas harus selalu stand-by diruang server tersebut untuk mengantispasi apabila server mengalami down. Tidak hanya itu saja karyawan juga dibebankan dengan permasalahan yang dihadapi oleh client. Namun kita juga harus mengakui bahwa karyawan ini juga membutuhkan istirahat dan tidak selalu berada pada tempat kerjanya. Maka dengan memperhatikan keterbatasan kemampuan tersebut diperlukan adanya sebuah teknik tertentu yakni clustering yang dapat melakukan penanganan terhadap server yang bermasalah atau masalah yang dihadapi oleh client secara otomatis. Tujuan dari tulisan ini adalah ingin mengetahui bagaimana teknik clustering mengatasi masalah server/client, dimana penerapan teknik clustering.Kata Kunci : SAP, Clustering, dan Client/Server
Deteksi Serangan DDoS Menggunakan Neural Network dengan Fungsi Fixed Moving Average Window Arif Wirawan Muhammad; Imam Riadi; Sunardi Sunardi
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 1 No. 3 (2017): Januari 2017
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (275.298 KB) | DOI: 10.14421/jiska.2017.13-03

Abstract

Distributed denial-of-service (DDoS) merupakan jenis serangan dengan volume, intensitas, dan biaya mitigasi yang terus meningkat seiring berkembangnya skala organisasi. Penelitian ini memiliki tujuan untuk mengembangkan sebuah pendekatan baru untuk mendeteksi serangan DDoS, berdasarkan pada karakteristik aktivitas jaringan menggunakan neural network dengan fungsi fixed moving average window (FMAW) sebagai metode deteksi. Data pelatihan dan pengujian diambil dari CAIDA DDoS Attack 2007 dan simulasi mandiri. Pengujian terhadap metode neural network dengan fungsi fixed moving average window (FMAW) menghasilkan prosentase rata-rata pengenalan terhadap tiga kondisi jaringan (normal, slow DDoS, Dan DDoS) sebesar 90,52%. Adanya pendekatan baru dalam mendeteksi serangan DDoS, diharapkan bisa menjadi sebuah komplemen terhadap sistem IDS dalam meramalkan terjadinya serangan DDoS.
Implementasi Algoritma Genetika untuk Penjadwalan Instruktur Training ICT UIN Sunan Kalijaga Niki Min Hidayati Robbi; Nurochman Nurochman
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 1 No. 3 (2017): Januari 2017
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (252.477 KB) | DOI: 10.14421/jiska.2017.13-04

Abstract

ICT training instructor scheduling involves components such as the division of the day, sessions, classroom, and availability time of instructor which is different every day. One of the methods of artificial intelligence that is suitable for case scheduling is a Genetic Algorithm. Genetic algorithm succesfully impelemented for scheduling ICT training instructor with the parameter crossover probability (Pc) 0.4, the probability of mutation (Pm) 0.1, and the total population of 30 individuals. The best fitness value is 0.9523 with a 1 value error on constraint division of classrooms that weighs 0,05. Keywords: Genetic Algorithm, Scheduling
Evaluasi Manajemen Keselamatan pada Pusat Data (Studi Kasus Perguruan Tinggi XYZ) Aniq Noviciatie Ulfah; Wing Wahyu Winarno
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 1 No. 3 (2017): Januari 2017
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (265.902 KB) | DOI: 10.14421/jiska.2017.13-06

Abstract

Data center was developed related to data security as one of the assets of the organization in addressing the data management for operational purposes as secondary storage media and data distribution. Safety management is part of the framework of the data center that should be assessed by the manager to determine whether compliance with the standards so as to minimize the likelihood of the risk of adverse effects on the organization. This prompted the University XYZ to evaluate the safety management to determine the extent of the implementation of safety management in the data center in their environtment. In evaluating the safety management of the data center in the University XYZ is using the standard ISO 22301: 2012. ISO 22301 is a standard that specifically to plan, establish, implement, operate, monitor, review, maintain and improve a documented management system to protect or reduce the possibility of the risk, be on the alert, handle and recover the time of the incident. The sources of data was obtained from 9 respondents who are heads / staff from each division in the data center University XYZ. The data that have been obtained will be used to measure the maturity level of each clause of the ISO 22301: 2012 and as an evaluation tools. The results obtained in this study indicate that the University XYZ has been implementing safety management in the data center with a value for each clause 5, 6, 7, 8, and 9 are sequential ie 2:42, 2:41, 1:21, 1.67, and 1.65.
Penerapan Data Mining untuk Analisis Pengaruh Lama Studi Mahasiswa Teknik Informatika UIN Sunan Kalijaga Yogyakarta Menggunakan Metode Apriori Gathut Cakra Sutradana; M Didik Rohmad Wahyudi
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 1 No. 3 (2017): Januari 2017
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (288.495 KB) | DOI: 10.14421/jiska.2017.13-07

Abstract

ABSTRACTThe accuracy of a long study of college students at a university becomes very important in demonstrating the quality of the learning process in college. There are many things that affect a student's study time. Data Mining offers a way to know the various aspects that may affect a student's study time. To know the various aspects that influence the duration of the study based on data graduation students are available, then the implementation of a Data Mining algorithms can be used. In this study, Data Mining algorithms used to find aspects that affect student study duration is Apriori algorithm.Keywords: graduation analysis, long studying, data mining, apriori algorithms  Ketepatan lama studi mahasiswa pada suatu perguruan tinggi menjadi hal yang sangat penting dalam menunjukkan kualitas proses pembelajaran di perguruan tinggi. Ada banyak hal yang mempengaruhi lama studi mahasiswa. Data Mining menawarkan suatu cara untuk mengetahui berbagai aspek yang dapat berpengaruh terhadap lama studi mahasiswa. Untuk mengetahui berbagai aspek yang mempengaruhi lama studi mahasiswa berdasarkan data kelulusan yang tersedia, maka implementasi suatu algoritma Data Mining dapat dipergunakan. Dalam penelitian ini, algoritma Data Mining yang dipergunakan untuk menemukan aspek yang mempengaruhi lama studi mahasiswa adalah algoritma Apriori.Katakunci : analisis kelulusan, lama studi, data mining, algoritma apriori

Page 1 of 1 | Total Record : 7