cover
Contact Name
M. Miftach Fakhri
Contact Email
fakhri@diginus.id
Phone
+6282348761241
Journal Mail Official
fajarb@diginus.id
Editorial Address
Antang, Makassar, South Sulawesi, Indonesia
Location
Kota makassar,
Sulawesi selatan
INDONESIA
Journal of Progressive Information, Security, Computer and Embedded System
ISSN : 2986724X     EISSN : 29867258     DOI : https://doi.org/10.61255/pisces
Focus and Scope, PISCES scientific journal encompasses all aspects of the latest outstanding research and developments in the field of Computer science including: Artificial intelligence, Data science, Databases, Computer performance analysis, Computer security and cryptography, Computer networks, Parallel and distributed systems, Microcontroller, Internet of Things, Software engineering.
Articles 5 Documents
Search results for , issue "Vol. 2, No. 1 Maret (2024)" : 5 Documents clear
Protokol Keamanan pada Wireless Sensor Network (WSN) Menggunakan Firewall Iptables dan Enkripsi Base64 Wahid, Abdul; Zain, Satria Gunawan; Parenreng, Jumadi Mabe; Juliady, Ilham
Progressive Information, Security, Computer, and Embedded System Vol. 2, No. 1 Maret (2024)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v2i1.91

Abstract

Currently, the era of technology is getting faster and more modern, such as the Internet of Things (IoT) system, most of which have been implemented in everyday life to facilitate every human activity. Such as the application of Wireless Sensor Network (WSN). Every public network service implementation has loopholes. This is very detrimental to companies that implement Wireless Sensor Network (WSN) system technology. If the server is hacked, the system data will be known by the hacker. For this reason, we need a way so that server security and data transfer processes are guaranteed. The method used is implementing an iptables firewall and encrypting data using Base64 encryption, where if this method is implemented then the server and any data sent in 2-way communication will be guaranteed safe from data reading and server hacking. So this method can be used to improve data security and server security.
Spyware-Based Keylogger Design for Monitoring Smartphone User Activities Using the Smart Keylogger Application: Perancangan Keylogger Berbasis Spyware untuk Memonitoring Aktivitas Pengguna Smartphone Menggunakan Aplikasi Smart keylogger Sari Wulandari
Progressive Information, Security, Computer, and Embedded System Vol. 2, No. 1 Maret (2024)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i2.98

Abstract

The era of growing information technology has led to increasing threats to the security and privacy of computer and mobile device users, such as data theft and unauthorized use. In addition, the use of the internet by children and adolescents also requires special supervision. Therefore this research contributes to the use of the smart keylogger application as an effective solution for monitoring smartphone user activity and protecting user data security and privacy, especially in use by children and adolescents. The research method used is experimental research, in which a smart keylogger application is installed on a user's smartphone to monitor user activity over a certain period. The results of the study show that the smart keylogger application runs well in the background of the device, recording every keystroke the user makes, including internet browsing history and other activities. Overall, this spyware-based smart keylogger application is an effective solution for monitoring smartphone user activity, protecting data security and privacy, and providing more effective monitoring of internet use by children and adolescents.
Implementation Implementation of a File Security System Using the AES Algorithm to Secure Personal Files: Implementasi Sistem Keamanan File Menggunakan Algoritma AES untuk Mengamankan File Pribadi Saripa, Saripa
Progressive Information, Security, Computer, and Embedded System Vol. 2, No. 1 Maret (2024)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i2.100

Abstract

In this growing digital age, data security is becoming increasingly important as more and more information is stored in digital files which are vulnerable to attacks and unauthorized access. To protect the privacy and confidentiality of personal information, an effective and reliable file security system is required. One effective way is to use cryptographic algorithms such as Advanced Encryption Standard (AES) which have been widely used in various applications that require a high level of security. Implementation of a file security system using the AES algorithm can be an effective and reliable solution for securing personal document files from attacks and unauthorized access and maintaining the privacy and confidentiality of personal information. This study uses the method of Literature Study, Design & Analysis, Implementation, and Testing to analyze and implement the AES algorithm using the PHP programming language and MySQL database. The results showed that the AES algorithm can guarantee the security of the six types of files tested, namely images, Word documents, PDF, Excel and PowerPoint. The AES algorithm can be an effective choice for securing document and image data safely and reliably.
Rancang Bangun Sistem Penilaian Tes Essai Berbasis Web Di Testing Center UNM Nur Fadilah; Zain, Satria Gunawan
Progressive Information, Security, Computer, and Embedded System Vol. 2, No. 1 Maret (2024)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v2i1.296

Abstract

This research is a web-based assessment system design that aims to build a web essay grading system at the UNM Testing Center. This study utilizes Research and Development (RnD) methods in the field of software engineering and uses  the Prototype model  in the system development process, as well as conducting software quality checks based on ISO 9126 standards involving four main aspects, namely functionality, reliability, portability, and usability. The result of this study is a web-based essay test scoring system at the UNM Testing Center. The results of the examination of the sub-characteristics of the accessory  and suitability functions  showed a conformity rate of 85%. For part security characteristics, the system has been tested and free of malware, website blacklisting, injected SPAM, defacement, and SQLInjection. In terms of reliability, the system is considered feasible with a feasibility percentage of 98.87%. The portability test  showed a feasibility rate of 96.33%, while the usability test  showed a feasibility rate of 81.43%.
Perancangan Sistem Informasi Berbasis Web untuk Objek Pariwisata di Kabupaten Pinrang Zulvita; Sanatang, Sanatang; Wahid, Abdul
Progressive Information, Security, Computer, and Embedded System Vol. 2, No. 1 Maret (2024)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v2i1.330

Abstract

This research aims to produce a web-based Information System website for tourism objects in Pinrang Regency and determine the results of system testing using ISO 25010 which consists of 8 aspects of testing. The type of research used in this study is Research and Development (R&D), with the System Development Life Cycle (SDLC) development model. Data collection techniques using observation, interviews, and questionnaires. The results of this study, namely: (1) Functional suitability on the system that has been made is 100% "very feasible" category. (2) Usability is 96.8% of the "very feasible" category. (3) Compatibility shows that the system made is compatible with the browser so that it is declared good without any problems. (4) Performance efficiency obtained grade B with a performance of 89%. (5) Reliability obtained results with a feasibility percentage of 100%. (6) Security obtained results with threat level 2 or medium with a total of 2 medium and low warnings. (7) Maintainability obtained results from instrumentation, consistency, and simplicity can be categorized as good and meet the standards. (8) Portability shows the system can be accessed in various different browsers. Based on the test results, the web-based information system for tourism objects in Pinrang Regency can be said to be feasible and acceptable for use. Keywords: Information System, Tourism, Pinrang Regency, ISO 25010

Page 1 of 1 | Total Record : 5