cover
Contact Name
Miftahul Huda
Contact Email
hudablue11@gmail.com
Phone
+6282273233495
Journal Mail Official
aguspw.amcs@gmail.com
Editorial Address
Sekretariat KESATRIA: Jurnal Penerapan Sistem Informasi (Komputer & Manajemen) Jln. Jendral Sudirman Blok A No. 1/2/3 Kota Pematang Siantar, Sumatera Utara 21127
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen)
ISSN : -     EISSN : 2720992X     DOI : 10.30645
KESATRIA: Jurnal Penerapan Sistem Informasi (Komputer & Manajemen) adalah sebuah jurnal peer-review secara online yang diterbitkan bertujuan sebagai sebuah forum penerbitan tingkat nasional di Indonesia bagi para peneliti, profesional, Mahasiswa dan praktisi dari industri dalam bidang Ilmu Kecerdasan Buatan. KESATRIA: Jurnal Penerapan Sistem Informasi (Komputer & Manajemen) menerbitkan hasil karya asli dari penelitian terunggul dan termaju pada semua topik yang berkaitan dengan sistem informasi. KESATRIA: Jurnal Penerapan Sistem Informasi (Komputer & Manajemen) terbit 4 (empat) nomor dalam setahun. Artikel yang telah dinyatakan diterima akan diterbitkan dalam nomor In-Press sebelum nomor regular terbit.
Articles 40 Documents
Search results for , issue "Vol 5, No 2 (2024): Edisi April" : 40 Documents clear
Implementing a Web-enabled Security Management Information System: Opportunities and Challenges David Jumpa Malem Sembiring; Devita Permata Sari Br Ginting; Sinek Mehuli Br Perangin-angin; Asprina Br Surbakti
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 5, No 2 (2024): Edisi April
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v5i2.377

Abstract

Information systems are computer applications that support an organization's operations. They include the installation and maintenance of computers, software, and data. Management Information Systems focus on financial and personnel management. Sales Information Systems are designed to generate, analyze, disseminate, and retrieve information to support sales-related decisions. The collection, preparation, storage, and distribution of information to facilitate decision-making and monitoring in an enterprise. There are two types of information systems: manual information systems and computer-based information systems (CBIS). CBIS, or computerized web-based security service management information system, is a type of information system used in service companies. This system provides possibilities and opportunities for managing security services.
Teknologi Blockchain dalam Keamanan Sertifikat Menggunakan Smart Contracts dan Distributed Ledger pada Platfrom Edutech Seni Oknora Firza; Y Yuhandri; S Sumijan
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 5, No 2 (2024): Edisi April
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v5i2.368

Abstract

The ever-increasing development of the digital environment means that educational certificates are often vulnerable to forgery, manipulation, or even loss of integrity. Blockchain is a technology that allows for a distributed database that can only be accessed by a certain number of computer network nodes. Distributed Ledger Technology (DLT) is a system that captures and distributes data over multiple data stores (Ledgers), where each storage has identical data records. Smart Contracts is a Blockchain protocol that allows developers to create and execute financial agreement codes on the Blockchain. This contract will be activated by all parties involved. This research aims to improve the security of certificate authenticity on the edutech platform at Inatechno. The methods applied are Smart Contract and Distributed Ledger. The dataset processed in this research comes from Inatechno. The dataset consists of 48 data on certificate participants who have taken part in training activities at Inatechno. The results of this research are that Blockchain technology can increase certificate security on the Edutech platform. The resulting system can automate the verification process and reduce the risk of counterfeiting. Therefore, this research can be a reference that Blockchain technology using Smart Contracts and Distributed Ledger can be an effective solution in increasing certificate security on the Edutech platform. This implementation can provide significant benefits in supporting the need for security and integrity of certificate data, opening up the potential for further development in the context of digital education.
Penerapan Algoritma Fuzzy C-Means untuk Clustering Penilaian Laporan Kinerja Dosen pada UIN Imam Bonjol Padang Alvi Dwi Wahyuni; Sarjon Defit; Gunadi Widi Nurcahyo
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 5, No 2 (2024): Edisi April
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v5i2.359

Abstract

-
Penilaian Manajemen Risiko Menggunakan Octave Allegro Pada Data Center Perguruan Tinggi Fitriadi Nurdin
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 5, No 2 (2024): Edisi April
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v5i2.350

Abstract

An organization can prevent a risk from occurring by taking planning or mitigation steps that must be taken if an error occurs so that it does not have a negative impact on the organization's activities. The data center is the heart of the information technology infrastructure owned by XYZ University because there needs to be risk management in place if a threat occurs whether from within or from outside. Three security factors that must be protected in an information security system are confidentiality, integrity and availability. The absence of a risk analysis made by XYZ University has resulted in the absence of mitigation steps that must be taken if a threat or failure occurs in the Data Center. Based on the results of risk management research using OCTAVE Allegro carried out at XYZ University, 9 important information assets were produced, of which 5 assets must be mitigated, namely errors during network maintenance in the server room, service interruption due to power failure, internet connection disruption, damage to server hardware, Natural disasters that result in damage to related devices, and 4 information assets must be postponed, namely leaking of access rights such as administrator username and password, server space being accessed by unauthorized parties, bugs/errors during system updates, exploitation of system security gaps in the server from outside parties. and in the.
Analisis Manajemen Risiko Sistem Informasi Manajemen Rumah Sakit (SIMRS) dengan ISO 31000 Pada Rumah Sakit XYZ PEKANBARU Dwi Erlangga; Mona Fronita; Eki Saputra; M Megawati; Arif Marsal
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 5, No 2 (2024): Edisi April
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v5i2.382

Abstract

This research aims to find out what risks may occur at xyz hospital Pekan Baru and how big the probability is and the impact on xyz hospital, by using ISO 31000 and determining the RACI Chart. The first step is risk assessment. It consists of the phases of risk identification, risk analysis, and risk assessment. In the second stage, risk treatment is used. In this phase, we will solve any solutions that will reduce or even prevent all the consequences and potential damage that may occur due to the risk. The findings of this research are that there are 10 risks, 2 of which are in the High category and 8 of which are in the Medium category, the risk treatment for the High category needs to be taken seriously where the risk treatment for power outages has a UPS (backs up computer power when the power goes out) and then connected to generators, and risk treatment for fire. Providing fire extinguishers at every point in the hospital, and there is a code red team (front guard team in case of fire). 2 risks, namely fire and power outages, which are classified in the high category and require serious action to handle them, and there are 8 medium risk categories, at the medium level the number that appears the most is number 12 where there are 4 risks, namely server down, human error , lightning, and corrupt data which has the number 12 and the number 12 also needs to take serious action to deal with it because it is almost classified as High.
Sistem Pakar Identifikasi Jurusan Yang Sesuai Dengan Minat Bakat Siswa Nella Novrina Doni; S Sumijan; Billy Hendrik
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 5, No 2 (2024): Edisi April
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v5i2.373

Abstract

The Certainty Factor method can help overcome this complexity by providing a level of confidence regarding major recommendations. Certainty Factor allows an expert system to measure the level of confidence or uncertainty associated with each knowledge rule or fact used. Each rule contributes to the overall confidence level, and this can provide an idea of the extent to which the system is confident in the recommendations it produces. In complex decision making, various knowledge rules can influence each other. The Certainty Factor method allows the integration of belief values from interrelated rules, providing a holistic picture of the extent to which evidence supports a conclusion. In some cases, knowledge rules may provide contradictory or conflicting information. Certainty Factor can be used to handle information conflicts by assigning a weight or level of confidence to each piece of information, so that the system can produce more accurate recommendations. Certainty Factor provides a mechanism for measuring the level of uncertainty in a decision. This is important when the available information is incomplete or there is uncertainty in the values used in the knowledge rules. By taking into account the level of uncertainty, the system can provide recommendations that are more realistic and appropriate to complex situations. The Certainty Factor method can be applied dynamically, allowing the system to adjust confidence levels over time or with the addition of new information. This is useful when students experience changes in interest or talent, so the system can provide more accurate and relevant recommendations..
Analisis Perbandingan Optimalisasi Port Knocking Dan Honeypot dengan Iptables Pada Server Untuk Keamanan Jaringan Anjun Dermawan; Y Yuhandri; S Sumijan
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 5, No 2 (2024): Edisi April
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v5i2.364

Abstract

Computer network systems are designed to share resources together, so that the security of resources on the server must be maintained and the resources used must be optimized. The aim of this research is to analyze the comparative level of optimization of Port knocking and Honeypot using the IPTables method for network security on servers with different CPU and memory resources. The security methods used in this research are Port knocking, Honeypot and IPTables. The data used includes ports that were successfully attacked as well as resource usage before and after IPTables implementation on a server with 2 CPU resources and 1507284KiB memory obtained from previous research. The results of this research show that 80% of ports cannot be attacked while 20% of ports, namely port 22, are designed to be attacked. The server CPU and Memory resource usage graph shows a decrease after implementing IPTables from Denial of Service (DoS) and Brute force testing. On a server with 1 CPU and 1015852KiB of memory resources, CPU usage decreased by 36%, and memory usage decreased by 41%. Meanwhile, on a server with 4 CPU resources and 6036624 KiB of memory, CPU usage decreased by 41%, and memory usage decreased by 46%. This shows increased effectiveness compared to using just the Port knocking and Honeypot methods. It is hoped that this research can be a guide in measuring server optimization in overcoming Denial of Service (DoS) and Brute force attacks
Sistem Informasi Desa Pagarjati Kabupaten Lahat Berbasis Website Deni Erlansyah; Ranti Yusnita
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 5, No 2 (2024): Edisi April
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v5i2.355

Abstract

Technological developments have occurred so rapidly and have encouraged various innovations in the field of information and communication technology, which have changed the way people interact and obtain information. Website-based information systems in villages have an important role in supporting transparency and easy access to information, as well as opening up new economic opportunities by promoting agricultural products. Pagarjati Village still uses manual methods to share information, by attaching it to the notice board in the village hall, and Pagarjati Village also does not have information media to introduce and promote the activities and agricultural products of Pagarjati Village. The method used in this research is Rational Unified Process (RUP), this research was conducted in Pagarjati village, Lahat Regency. The aim of this research is to design and build a website-based information system in Pagarjati village and introduce and promote the activities and agricultural products of Pagarjati village. The existence of this information system helps Pagarjati village officials to support transparency and ease of information, as well as efforts to improve the economy by promoting agricultural products from Pagarjati village
Faktor Yang Mempengaruhi Keputusan Partisipasi Pemilu Dengan Metode TOPSIS S Sefrika
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 5, No 2 (2024): Edisi April
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v5i2.387

Abstract

Citizen participation in general elections has different trends every year. February 2024 Indonesia will hold presidential and legislative elections. The research aims to investigate the factors that influence general election participation in Indonesia. The research population was 189 citizens who had the right to vote. The research uses the TOPSIS method. (Technique For Others Reference by Similarity to Ideal Solution) is a method used to calculate several alternative criteria offered. The research obtained results of a value of 0.89 for C1, and a value of 0.83 for C4, a value of 0.44 for C2 and a value of 0.32 for C3. The results of this analysis show that the factors influencing active participation in general elections are sociological aspects, followed by economic aspects, political and geographical awareness.
Adopsi Cobit 2019 Untuk Mengukur Tingkat Kematangan Tata Kelola Teknologi Informasi Pada Dinas Kependudukan Dan Pencatatan Sipil Ridho Adilaksana; Muhamad Ariandi; Fitri Purwaningtias; Maria Ulfa
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 5, No 2 (2024): Edisi April
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v5i2.378

Abstract

Information Technology Governance (IT Governance) is an important concept in managing information technology infrastructure in organizations, including the Department of Population and Civil Registration (DISDUKCAPIL). This research aims to measure the maturity level of information technology governance at DUKCAPIL using the COBIT 2019 framework with a focus on the APO12 (Risk Management), APO13 (Security Management), and BAI10 (Configuration Management) domains at the capability level. This research method involves a case study at the Department of Population and Civil Registration (DISDUKCAPIL), where data is collected through interviews with information technology staff, analysis of policy and procedure documents, as well as direct observation of the existing information technology environment. The data is then analyzed by referring to the COBIT 2019 framework, especially the APO12, APO13 and BAI10 domains by considering the level of capability measured using the COBIT scale, the objects to be evaluated are APO12 – Managed Risk, APO13 – Managed Security and BAI1 0– managed Configuration evaluates with capability level. Capability level objectives can be increased by carrying out activities that have not been carried out by DISDUKCAPIL until they reach the full value for each level.

Page 3 of 4 | Total Record : 40