cover
Contact Name
Fata Nidaul Khasanah
Contact Email
lppmp@ubharajaya.ac.id
Phone
+6285647212938
Journal Mail Official
jiforty.tif@ubharajaya.ac.id
Editorial Address
Jl. Perjuangan No.81, Marga Mulya, Kec. Bekasi Utara, Kota Bks, Jawa Barat 17143
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
Journal of Informatics and Information Security
ISSN : -     EISSN : 27224058     DOI : https://doi.org/10.31599
Core Subject : Science,
Jurnal ini berisi tentang karya ilmiah hasil penelitian bidang ilmu komputer yang bertemakan: Artificial Intelligence, Blockchain Technology, Business Intelligence, Cloud Computing, Computer Architecture, Computer Vision, Database Systems, Deep Learning, Human Computer Interaction, Digital Forensic, Internet of Things, IT Security, Machine Learning, Networking, Semantic Web, Sistem Terdistribusi, Systems Engineering, Wireless Network.
Articles 5 Documents
Search results for , issue "Vol. 6 No. 2 (2025): Desember 2025" : 5 Documents clear
Pengaruh Penggunaan Firewall Generasi Terbaru (NGFW) terhadap Tingkat Keamanan Jaringan di Koperasi Sekolah Bina Mulia (KSBM) Ramdhani Mahbub, Asep; SRISULISTIOWATI, DWI BUDI
Journal of Informatic and Information Security Vol. 6 No. 2 (2025): Desember 2025
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/g16xkw05

Abstract

The rapid development of information technology has encouraged cooperatives to manage network and customer data digitally. Bina Mulia School Cooperative (KSBM) is one such cooperative that has intensive network activities, including savings and loan services and the sale of office supplies. The increase in traffic and variety of cyber threats such as malware, phishing, ransomware, as well as application-based attacks, has made traditional firewalls insufficient. Next-Generation Firewalls (NGFW) have emerged as a solution with capabilities such as deep packet inspection, intrusion detection, application control, and threat intelligence integration. This study aims to analyze the impact of using NGFW on the network security level at KSBM. The research uses a quantitative approach with a survey method involving 50 respondents from the IT unit, administrative staff, teachers, and students who use the cooperative's network services. The data were analyzed using simple linear regression to examine the effect of variable X (implementation of NGFW) on variable Y (network security level). The study results showed that the use of NGFW has a positive and significant impact on network security, with an R value of 0.812 and an R² value of 0.660. This indicates that 66% of the improvement in network security is influenced by the quality of NGFW implementation. Thus, NGFW has been proven to enhance threat detection, prevent attacks, and reduce the risk of data breaches at Bina Mulia School Cooperative (KSBM).
Penerapan Keamanan AES-256 Pada Sistem Kehadiran Karyawan Berbasis Kordinat Dani Yusuf; Uus Rusmawan
Journal of Informatic and Information Security Vol. 6 No. 2 (2025): Desember 2025
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/0kjq9s40

Abstract

The development of information technology has encouraged the implementation of coordinate-based employee attendance systems to improve accuracy and minimize fraud in attendance recording. However, this system poses security risks to sensitive data, such as employee identities, attendance timestamps, and location coordinates. Therefore, a reliable data security mechanism is required. This study aims to implement the Advanced Encryption Standard (AES) algorithm with a 256-bit key length in a coordinate-based employee attendance system to enhance data security. The research method used is an experimental method consisting of requirement analysis, system design, implementation of the AES-256 algorithm, and system testing stages. The results show that the implementation of AES-256 is able to encrypt attendance data effectively so that the data cannot be directly read without a decryption process. In addition, the encryption and decryption processes do not have a significant impact on system performance. Thus, the AES-256 algorithm can be effectively applied to improve security in coordinate-based employee attendance systems.
Studi Perbandingan Model Keamanan Data pada Cloud Computing Alexander, Allan Desi
Journal of Informatic and Information Security Vol. 6 No. 2 (2025): Desember 2025
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/01vjnj44

Abstract

Layanan komputasi awan (cloud computing) telah menjadi tulang punggung transformasi digital global, menawarkan skalabilitas, efisiensi biaya, dan fleksibilitas yang belum pernah ada sebelumnya. Namun, perpindahan data dari infrastruktur lokal ke lingkungan pihak ketiga yang bersifat multi-tenant menimbulkan kekhawatiran serius terhadap keamanan dan privasi data. Laporan penelitian ini menyajikan analisis komprehensif mengenai perbandingan model keamanan data dalam ekosistem cloud, mencakup aspek kriptografi, mekanisme kontrol akses, dan strategi manajemen risiko. Melalui tinjauan literatur sistematis terhadap studi yang terindeks Scopus dan SINTA antara tahun 2013 hingga 2025, penelitian ini mengevaluasi kinerja algoritma enkripsi seperti AES, RSA, dan ECC, serta membandingkan efektivitas model Role-Based Access Control (RBAC) dan Attribute-Based Access Control (ABAC). Temuan utama menunjukkan bahwa algoritma simetris seperti AES unggul dalam kecepatan dan efisiensi memori untuk data massal, sementara model asimetris seperti RSA lebih optimal untuk manajemen kunci. Dalam hal kontrol akses, ABAC menawarkan fleksibilitas yang lebih tinggi untuk lingkungan dinamis dibandingkan RBAC yang bersifat statis, meskipun memiliki kompleksitas implementasi yang lebih besar. Penelitian ini juga menyoroti peran teknologi mutakhir seperti blockchain, machine learning, dan federated learning dalam memperkuat postur keamanan cloud serta memberikan kerangka kerja manajemen risiko bagi organisasi yang melakukan migrasi data..  
Perancangan Platform Internet of Things sebagai Sistem Komunikasi Dua Arah untuk Pemantauan pH Air Joniwarta; Ridwan; Kustanto, Prio
Journal of Informatic and Information Security Vol. 6 No. 2 (2025): Desember 2025
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/x78gac94

Abstract

Water quality monitoring is a critical component in ensuring environmental sustainability and public health. The degree of acidity (pH) is one of the key parameters used to assess water quality, as it directly affects the suitability of water for domestic and industrial applications. Conventional water pH measurement systems are typically local and rely on manual data recording, resulting in limited data accessibility, susceptibility to human error, and the absence of structured historical records. This study presents the design of an Internet of Things (IoT) platform as a two-way communication system between water pH sensing hardware and a cloud-based digital platform. The proposed system consists of a pH sensor, a network-enabled microcontroller, a cloud platform for centralized data management, and a web-based dashboard as the user interface. Two-way communication enables the system not only to transmit real-time measurement data but also to receive configuration commands from users. Experimental results indicate that the proposed IoT platform improves the efficiency of water pH monitoring, reduces reliance on manual data recording, and provides structured historical data to support long-term analysis.  
Implementasi Forward Chaining pada Sistem Pakar Diagnosa Kerusakan Laptop Berbasis Web: Studi Kasus Layanan Servis Laptop Permadi, Dimas; Kustanto, Prio; Yasir, Muhammad; Noeman, Achmad; Hidayat, Agus; Handayani, Dwipa
Journal of Informatic and Information Security Vol. 6 No. 2 (2025): Desember 2025
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/paw2f574

Abstract

Laptop damage diagnosis at PT Tsurtech Solution is currently carried out manually, which can take more time and requires the technician's experience to identify problems accurately. This research aims to design and implement a web-based expert system to assist in diagnosing laptop damage based on symptoms inputted by users. The system is developed using the Forward Chaining algorithm, a data-driven reasoning method that matches facts (symptoms) with a set of predefined rules to conclude the type of damage. The system is built using the Waterfall development method, assisted by UML diagrams, and implemented with PHP programming language and MySQL database. Blackbox Testing is used to evaluate the system’s functionality. The results show that the system can be used as a supporting tool to help both users and technicians perform initial laptop damage diagnosis more quickly and efficiently.    

Page 1 of 1 | Total Record : 5