Articles
20 Documents
Search results for
, issue
"Vol. 3 No. 1 (2023): January-April"
:
20 Documents
clear
Analisis Kerentanan Website Mtss Al-Washliyah Bah Gunung Menggunakan Metode Open Web Application Security Project ZAP (OWASP ZAP)
Abdillah, Muhammad Dimas;
Gunawan, Jaka;
Atsil, Rayhan Alfatih;
Harahap, Aninda Muliani
Jurnal Sains dan Teknologi (JSIT) Vol. 3 No. 1 (2023): January-April
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47233/jsit.v3i1.487
Data security on the website is very important to prevent misuse of data or information on the website. Due to the rapid progress in the field of technology and information, there are many people called hackers who misuse it for negative things, such as stealing data. In this study, the authors are interested in learning more about the security of the MTSs Al-Washliyah Bah Gunung website. This test utilizes the OWASP ZAP application version 2.12.0.0 in conducting the analysis. The purpose of this research is to test the vulnerabilities on the MTSs Al-Washliyah Bah Gunung website. This research has 3 stages, namely data collection, website identification, and website security testing. The results of this analysis conclude that the website has a medium to high vulnerability.
Implementasi ISO 27001:2013 Dalam Pengamanan Sistem Informasi Pada Yayasan Pendidikan Islam ANNUR PRIMA
Damanik, Arya Pratama;
Zaki, Alfasyahri;
Fiddarain, Syaidah;
Nasution, Adnan Buyung
Jurnal Sains dan Teknologi (JSIT) Vol. 3 No. 1 (2023): January-April
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47233/jsit.v3i1.488
Penelitian ini bertujuan untuk mengevaluasi implementasi standar ISO 27001:2013 dalam pengamanan sistem informasi pada sekolah YPI ANNUR PRIMA. Penelitian ini melakukan analisis terhadap proses-proses yang digunakan dalam implementasi standar ISO 27001:2013 dan mengevaluasi tingkat kepatuhan sistem informasi pada sekolah tersebut terhadap standar tersebut. Hasil dari penelitian ini akan menunjukkan tingkat kepatuhan sekolah YPI ANNUR PRIMA terhadap standar ISO 27001:2013 dan memberikan rekomendasi untuk perbaikan pengamanan sistem informasi di sekolah tersebut. Implementasi standar ini dapat meningkatkan tingkat keamanan sistem informasi dan melindungi data sensitif yang dikelola oleh sekolah YPI ANNUR PRIMA.
Pengembangan Multimedia Matematika Untuk Siswa Sekolah Dasar
Hafizd, Daffa Al;
Mulya, Indah Syafitri;
Utama, Huzaefah;
Aulia, Firda;
Rifai, Ahmad;
Ikhwan, Ali
Jurnal Sains dan Teknologi (JSIT) Vol. 3 No. 1 (2023): January-April
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47233/jsit.v3i1.489
Penggunaan buku teks yang monoton membuat siswa sulit memahami materi pembelajaran. Penggunaan multimedia memudahkan siswa khususnya siswa sekolah dasar dalam memahami materi pembelajaran. Tujuan penelitian ini adalah menghasilkan multimedia interaktif dalam pembelajaran matematik di kelas II sekolah dasar. Penelitian yang dilakukan di Sekolah Dasar ini menggunakan rancangan RandD dengan model ADDIE untuk menghasilkan multimedia cerdas interaktif step by step. Analisis data dilakukan dengan menggunakan teknik kuantitatif dan kualitatif. Hasil kajian menunjukkan bahwa multimedia interaktif yang dihasilkan secara umum memenuhi penilaian ahli materi, media dan ahli bahasa yang berkualifikasi tinggi. Studi ini mengungkapkan bahwa animator dapat digunakan oleh 82% ahli bahasa, 86% ahli konten, dan 85% profesional media. Multimedia interaktif ini dapat digunakan dalam pembelajaran matematika, khususnya bagi siswa kelas dua sekolah dasar.
Implementasi Keamanan Aset Sekolah Angkasa Berbasis Website
Nasution , Adnan Buyung;
Aulia, Hasypa;
Audiansyah, Wanda;
Raihan, Muhammad Syafiq
Jurnal Sains dan Teknologi (JSIT) Vol. 3 No. 1 (2023): January-April
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47233/jsit.v3i1.495
Sekolah Angkasa Medan Polonia, Merupakan salah satu Sekolah yang terkenal dan tervaforit. Karena beberapa prestasi yang di dapat, tentunya sekolah ini mempunyai aset yang cukup banyak. Namun dalam pengelolaan aset yang ada, sekolah ini masi menggunakan cara pembukuan atau masi menggunakan cara yang manual yang mempunyai resiko yang cukup besar dalam keamanannya dan masih belum memiliki sistem yang berbasis teknologi. Impelementasi pengembangan sistem dalam bentuk website ini akan mempermudah dalam pendataan serta keaman, Dengan adanya penggunaan bantuan teknologi ini akan membantu sekolah dalam sistem data keamanannya sehingga pelaporan aset sekolah yang didata dengan aset bentuk fisik sama.
Penilaian Kapabilitas Tata Kelola Keamanan Informasi Menggunakan Cobit5 Pada PT.Denya
Ikhwan, Ali;
Ardiyansyah, Agung;
Rayhannur, Muhammad Jaffar;
Hidayat, Riyan
Jurnal Sains dan Teknologi (JSIT) Vol. 3 No. 1 (2023): January-April
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47233/jsit.v3i1.496
This research assesses the copability of asset and information security governance using the COBIT5 framewort. The study aims to evaluate the current state of security goverenance in an organization and identify areas of improvement using the COBIT5 framework. The research will analyze the processes and controls in place for managing and protecting information and assets, and assess their aligmnment with the COBIT5 giudelines. The result of the study will procide valuable insights for ornganizations looking to improve their security governance and compliance with industry standards.
Kajian Kebijakan Keamanan Sistem Informasi Sebagai Bentuk Perlindungan Kerahasiaan Pribadi Karyawan Perusahaan BFI Finance
Hafizd, Daffa Al;
Asnawi, Azi;
Assidiqie, Muhammad Fikri
Jurnal Sains dan Teknologi (JSIT) Vol. 3 No. 1 (2023): January-April
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47233/jsit.v3i1.497
Technology that connects computers around the world makes it possible to exchange information and data and even communicate with each other in the form of images and videos. The more valuable information is, the more security standards are needed to protect that information. The goal of computer security, among others, is to protect information. The higher the security standards provided, the higher the privacy protection of information. Protection of employee privacy in a company is one of the factors that must be considered in the implementation of information systems. Information system security policies include: System maintenance, risk management, setting access rights and human resources, security and control of information assets and server security policies. The policies that have been reviewed will not only be a form of protection for company information, but also a form of protection for the personal privacy of employees of BFI Finance Company..
Evaluasi Manajemen Keamanan Sistem Informasi Pada Perusahaan PT.Wook Tecnology
Wahyu Sofianda;
Taufiqurrahman;
Satria Habibi Ritonga;
Adnan Buyung Nasution
Jurnal Sains dan Teknologi (JSIT) Vol. 3 No. 1 (2023): January-April
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47233/jsit.v3i1.498
PT WOOK TECNOLOGY adalah salah satu perusahaan besar yang bergerak dibidang jasa logistiks di Indonesia.Manajemen keamanan informasi sangat diperlukan sebagai upaya untuk meminimalkan resiko dalam meningkatnya ancaman data dan informasi. Keamanan Sistem informasi terdiri atas perlindungan harian, yang disebut keamanan informasi (information security) dan persiapan-persiapan operasional. Pengolahan data merupakan bagian dari operasional bisnis perusahaan. standard ISO 27001:2005 adalah yang digunakan dalam penelitian ini. menyesuaikan dengan instrumen penelitian pada kebutuhan organisasi yang dikembangkan dan fokus pada manajemen keamanan informasi adalah standard ISO 27001:2005. Dikugnakannya standard ISO 27001:2005 agar dapat mengurangi resiko tingkat keamanan, dan meningkatkan control keamanan yang direkomendasikan pada PT.WOOK TECNOLOGY, serta melakukan evaluasi secara berkesinambungan.
Media Pembelajaran Interaktif Mengetik 10 Jari Berbasis Multimedia SD IT TPI
Audiansyah, Wanda;
Atsil, Rayhan Alfatih;
Sofianda, Wahyu;
., Taufiqurrahman;
Asnawi, Azi;
Ikhwan, Ali
Jurnal Sains dan Teknologi (JSIT) Vol. 3 No. 1 (2023): January-April
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47233/jsit.v3i1.499
Interactive multimedia-based media trains students to change a learning process from manual learning methods to interactive methods. In addition to teaching students to be more active, this application is expected to help teachers teach more effectively and efficiently. Based on these problems, explaining information on system weaknesses, how to overcome them and finding the right references about interactive teaching methods. The results of the analysis at SDIT TPI (Islamic Education Park) found that this learning method is still manual. The process of delivering material manually creates an ineffective and efficient teaching and learning system at SDIT TPI (Islamic Education Park) so that students are still dependent on the teacher. Therefore, this media is made as an interactive media based on multimedia teaching and learning activities so that the learning process is not limited by the classroom learning process. Students are expected to study independently outside the classroom.
Implementasi Keamanan di Cloud Storage Menggunakan Algoritma Key Public Berdasarkan Block Cipher
Manik, Hazizah W.S;
Utama, Huzefah;
Irawan, Muhammad Dedi;
Hafizd, Sefian Habil
Jurnal Sains dan Teknologi (JSIT) Vol. 3 No. 1 (2023): January-April
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47233/jsit.v3i1.500
Cloud computing is a new era of the modern world. It is an emerging paradigm and has become one of the hottest research to date, because of its ability to reduce the costs associated with computing. The main issues associated with cloud computing are data privacy, security and authenticity. The aim of the researcher is to find out how the model of cloud data storage and data security of cloud computing systems. In this research, researchers propose an efficient method for providing data storage. Security in cloud computing uses a new public key algorithm based on a linear block cipher. This algorithm has been proven by previous studies such as Data encryption, E-commerce, Digital signature. In research, researchers apply the same algorithm, namely cloud computing. In this algorithm several important security services are included such as key generation, encryption and decryption provided in the cloud computing system. The scope of this research is to solve security problems in cloud provisioning and cloud consumers by using new cryptographic methods.
Rancang Bangun Alat Penyiraman Dan Pembasmi Hama Otomatis Pada Tanaman Bayam Dengan Monitoring Berbasis Website
Thooriq, Muhammad Ath;
Sujatmika , Arif Rahman;
Umami , Izzatul
Jurnal Sains dan Teknologi (JSIT) Vol. 3 No. 1 (2023): January-April
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47233/jsit.v3i1.554
Spinach is one type of plant whose leaves can be consumed, because it contains iron which is useful for the body, people often use it for their daily vegetable needs. Spinach plants cannot grow properly if the water content in the soil does not meet the needs of the plants. In addition, spinach plants are susceptible to pest attacks that can damage the leaves. From these two problems, we need a system of automatic watering and pest control devices that can monitor plants. To make it easier to plant spinach, a monitoring system is needed using a website, because its use which can be accessed anywhere for 24 hours can make it easier to monitor the condition of spinach plants. The website will display soil moisture and PIR sensor data readings sent via the NodeMCU ESP8266 microcontroller to a database in the form of soil percentage, soil status, and plant conditions.