cover
Contact Name
M. Miftach Fakhri
Contact Email
fakhri@diginus.id
Phone
+6282348761241
Journal Mail Official
fajarb@diginus.id
Editorial Address
Antang, Makassar, South Sulawesi, Indonesia
Location
Kota makassar,
Sulawesi selatan
INDONESIA
Journal of Progressive Information, Security, Computer and Embedded System
ISSN : 2986724X     EISSN : 29867258     DOI : https://doi.org/10.61255/pisces
Focus and Scope, PISCES scientific journal encompasses all aspects of the latest outstanding research and developments in the field of Computer science including: Artificial intelligence, Data science, Databases, Computer performance analysis, Computer security and cryptography, Computer networks, Parallel and distributed systems, Microcontroller, Internet of Things, Software engineering.
Articles 32 Documents
Spyware-Based Keylogger Design for Monitoring Smartphone User Activities Using the Smart Keylogger Application: Perancangan Keylogger Berbasis Spyware untuk Memonitoring Aktivitas Pengguna Smartphone Menggunakan Aplikasi Smart keylogger Sari Wulandari
Progressive Information, Security, Computer, and Embedded System Vol. 2, No. 1 Maret (2024)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i2.98

Abstract

The era of growing information technology has led to increasing threats to the security and privacy of computer and mobile device users, such as data theft and unauthorized use. In addition, the use of the internet by children and adolescents also requires special supervision. Therefore this research contributes to the use of the smart keylogger application as an effective solution for monitoring smartphone user activity and protecting user data security and privacy, especially in use by children and adolescents. The research method used is experimental research, in which a smart keylogger application is installed on a user's smartphone to monitor user activity over a certain period. The results of the study show that the smart keylogger application runs well in the background of the device, recording every keystroke the user makes, including internet browsing history and other activities. Overall, this spyware-based smart keylogger application is an effective solution for monitoring smartphone user activity, protecting data security and privacy, and providing more effective monitoring of internet use by children and adolescents.
Implementation Implementation of a File Security System Using the AES Algorithm to Secure Personal Files: Implementasi Sistem Keamanan File Menggunakan Algoritma AES untuk Mengamankan File Pribadi Saripa, Saripa
Progressive Information, Security, Computer, and Embedded System Vol. 2, No. 1 Maret (2024)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i2.100

Abstract

In this growing digital age, data security is becoming increasingly important as more and more information is stored in digital files which are vulnerable to attacks and unauthorized access. To protect the privacy and confidentiality of personal information, an effective and reliable file security system is required. One effective way is to use cryptographic algorithms such as Advanced Encryption Standard (AES) which have been widely used in various applications that require a high level of security. Implementation of a file security system using the AES algorithm can be an effective and reliable solution for securing personal document files from attacks and unauthorized access and maintaining the privacy and confidentiality of personal information. This study uses the method of Literature Study, Design & Analysis, Implementation, and Testing to analyze and implement the AES algorithm using the PHP programming language and MySQL database. The results showed that the AES algorithm can guarantee the security of the six types of files tested, namely images, Word documents, PDF, Excel and PowerPoint. The AES algorithm can be an effective choice for securing document and image data safely and reliably.
Deteksi Serangan SQL Injection pada Website dengan Menggunakan Metode Reguler Expression: Deteksi Serangan SQL Injection pada Website dengan Menggunakan Metode Reguler Expression Supartini, Reni
Progressive Information, Security, Computer, and Embedded System Vol. 1, No. 2 September (2023)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i2.101

Abstract

Along with current technological developments, security for data information residing on websites is very vulnerable to crimes in the internet world such as attacks on security holes in the database layer or often known as SQL Injection. SQL Injection attack is a method to insert SQL commands as input through an application in order to gain access to the database. This attack can find out usernames, passwords, and other data that is in the database. So that the SQL Injection attack is one of the most popular attacks and is often used to take advantage of security holes in the system because of how easy it is to use it. If the website database can be accessed, then a hacker can easily steal various confidential data, can even manipulate or damage data on the website. This article aims to test the effectiveness of SQL Injection attacks using the regular expression method. The results of research on effectiveness in SQL Injection are the accuracy of database search time and the accuracy of information from the database.
Pengembangan Sistem Otentikasi Dokumen Digital Jurusan Teknik Informatika Dan Komputer Fakultas Teknik UNM Berbasis Digital Signature Mahgafhira, Iin; Wahid, Abdul; Parenreng, Jumadi Mabe
Progressive Information, Security, Computer, and Embedded System Vol. 1, No. 2 September (2023)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i2.151

Abstract

This study aims to determine the development of a digital document authentication system in the informatics and computer engineering department, Faculty of Engineering, UNM based on digital signatures and the results of testing software quality standards using ISO25010 by implementing 3 aspects, namely functional suitability, performance efficiency and portability. Maintain document authenticity using the MD5 algorithm as a Hash function to produce a message digest and the RSA algorithm as a public key algorithm. This research uses research and development (R&D) with a prototype design model. Testing using ISO25010 by implementing 3 aspects produces a system that is acceptable and feasible to use. As for the results of testing the RSA and MD5 algorithms, it was found that the results of this digital signature-based digital document authentication system can ensure the authenticity and integrity of documents so that they can prevent falsification and manipulation of documents by unauthorized persons.
Pengembangan Aplikasi E-Commerce Potensi Unggulan Desa untuk Masyarakat Pataro Berbasis Android Mabe Parenreng, Jumadi; S. Lamada, Mustari; Jusniar, Jusniar
Progressive Information, Security, Computer, and Embedded System Vol. 1, No. 2 September (2023)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i2.158

Abstract

This research is a software development that aims to determine the results of testing, effectiveness, development of the E-Commerce application. maintenance, portability. The development model used is the waterfall with the stages of needs analysis, concept design, system coding, system testing, and program implementation, and uses Research and Development (R&D) research methods. Data collected using interview techniques, observation, questionnaires, documentation. The application was validated by two system experts and evaluated by 30 respondents. The data analysis technique used is quantitative descriptive analysis in the form of proportions. Research results obtained based on ISO 25010 testing: (1) suitability of the functionality of the test specifications is worth 1 and has fulfilled the Testing aspect; (2) testing the performance efficiency aspect using Android Studio software, Visual Studio Code with the acquisition of raster max 231.4 ms/frame and avg 26.7 ms/frame and UI max 85.1 ms/frame and avg 4.5 ms/ frame; (3) testing the compatibility aspects of several applications that are run simultaneously to obtain results that can run well; (4) testing the usability aspect to 30 respondents with a score of 90.17%, very good category; (5) testing the reliability aspect with the test results of 200 tests in the dropped statement, namely keys, pointers, trackballs, flips, and rotations worth 0; (6) testing the security aspects with a score (52/100); (7) aspects of maintability testing get notification results if there is an error; (8) testing aspects of portability on several types of smartphones with different Android versions can run well without any problems.
Rancang Bangun Sistem Penilaian Tes Essai Berbasis Web Di Testing Center UNM Nur Fadilah; Zain, Satria Gunawan
Progressive Information, Security, Computer, and Embedded System Vol. 2, No. 1 Maret (2024)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v2i1.296

Abstract

This research is a web-based assessment system design that aims to build a web essay grading system at the UNM Testing Center. This study utilizes Research and Development (RnD) methods in the field of software engineering and uses  the Prototype model  in the system development process, as well as conducting software quality checks based on ISO 9126 standards involving four main aspects, namely functionality, reliability, portability, and usability. The result of this study is a web-based essay test scoring system at the UNM Testing Center. The results of the examination of the sub-characteristics of the accessory  and suitability functions  showed a conformity rate of 85%. For part security characteristics, the system has been tested and free of malware, website blacklisting, injected SPAM, defacement, and SQLInjection. In terms of reliability, the system is considered feasible with a feasibility percentage of 98.87%. The portability test  showed a feasibility rate of 96.33%, while the usability test  showed a feasibility rate of 81.43%.
Perancangan Sistem Informasi Berbasis Web untuk Objek Pariwisata di Kabupaten Pinrang Zulvita; Sanatang, Sanatang; Wahid, Abdul
Progressive Information, Security, Computer, and Embedded System Vol. 2, No. 1 Maret (2024)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v2i1.330

Abstract

This research aims to produce a web-based Information System website for tourism objects in Pinrang Regency and determine the results of system testing using ISO 25010 which consists of 8 aspects of testing. The type of research used in this study is Research and Development (R&D), with the System Development Life Cycle (SDLC) development model. Data collection techniques using observation, interviews, and questionnaires. The results of this study, namely: (1) Functional suitability on the system that has been made is 100% "very feasible" category. (2) Usability is 96.8% of the "very feasible" category. (3) Compatibility shows that the system made is compatible with the browser so that it is declared good without any problems. (4) Performance efficiency obtained grade B with a performance of 89%. (5) Reliability obtained results with a feasibility percentage of 100%. (6) Security obtained results with threat level 2 or medium with a total of 2 medium and low warnings. (7) Maintainability obtained results from instrumentation, consistency, and simplicity can be categorized as good and meet the standards. (8) Portability shows the system can be accessed in various different browsers. Based on the test results, the web-based information system for tourism objects in Pinrang Regency can be said to be feasible and acceptable for use. Keywords: Information System, Tourism, Pinrang Regency, ISO 25010
Perancangan Sistem Penunjang Keputusan Penerimaan Siswa Baru Madrasah Aliyah (MA) Darussalam Manuju Kab. Gowa Menggunakan Algoritma Fuzzy Logic Berbasis Web Wahid, Abdul; Lamada, Mustari; Titing, Titing
Progressive Information, Security, Computer, and Embedded System Vol. 2, No. 2 September (2024)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v2i2.469

Abstract

This study will use fuzzy logic algorithm with mamdani model for new student selection using several criteria. Based on the survey that has been conducted on schools that conduct student selection, several criteria were obtained, including diploma grades, report card grades, and distance from home. The design of this decision support system aims to increase efficiency and objectivity in the process of admitting new students at Madrasah Aliyah (MA) Darussalam Manuju, Gowa Regency. The system built using the Fuzzy Logic algorithm allows the integration of various assessment parameters such as report card grades and diploma grades.The overall system testing results were carried out using several methods, namely the black box test method which obtained overall functional suitability. Keywords: Fuzzy Logic, New Student Admissions, Decision Support Systems  
Investigasi Forensik Email dengan Berbagai Pendekatan dan Tools Anabelle, Zefanya Deianera; Lamada, Mustari; Zain, Satria Gunawan
Progressive Information, Security, Computer, and Embedded System Vol. 2, No. 2 September (2024)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v2i2.494

Abstract

Email  forensic investigation is one of the important areas in digital forensics that aims to uncover digital evidence through email  analysis. This study discusses various approaches and tools used in email  forensic investigations, with a focus on identifying and tracking suspicious activity, metadata analysis, and conversation reconstruction. The methods applied include header analysis, email  authentication checks, and the use of anomaly detection algorithms. The tools used in the study included open-source and commercial software designed specifically for digital forensics, such as EnCase, FTK, and Mail Xaminer. The case studies presented demonstrate the effectiveness of these various approaches and tools in detecting cybercrimes such as phishing, fraud, and the spread of malware via email . The results of this study provide practical guidance for forensic investigators in choosing the right approach and tools according to the characteristics of the case being handled, and emphasize the importance of an in-depth understanding of the structure and mechanism of email s to obtain accurate and accountable results in court.
Sistem Informasi Pelaksanaan KKN Berbasis Web di Universitas Negeri Makassar Kasim, Muh. Alwi Rizkyansyah; Agung, Muhammad; Parenreng, Jumadi Mabe; Lamada, Mustari S.; Wahid, Abdul
Progressive Information, Security, Computer, and Embedded System Vol. 2, No. 2 September (2024)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v2i2.533

Abstract

The research conducted is Research and Development (R&D). The aim of this study is to determine the results of the development of a web-based Community Service Program Implementation Information System using the prototyping development method. Additionally, the research aims to assess the quality of the developed software using the ISO 25010 standard. The data collection techniques used include questionnaires, interviews, observations, and documentation. This study resulted in a web-based Community Service Program Implementation Information System using the Laravel framework. The testing results indicated good quality, detailed across eight aspects: functional suitability scored 0.956 and 0.978 from the two functionality testers, both of which are categorized as "good"; usability received a score of 90.76%, categorized as "very feasible"; performance efficiency was graded A, indicating good quality; reliability showed a 99.93% score, categorized as good; security testing revealed level 1 vulnerability to password guessing attacks, while tests for SQL injection and cross-site scripting indicated that the system is secure from these attacks, overall indicating good security quality; maintainability scored 0.027 with an A grade from SonarQube tools, categorized as good; portability showed good quality after testing on four different operating systems and two different hardware types; and compatibility showed good quality after testing on five different browsers.

Page 2 of 4 | Total Record : 32