cover
Contact Name
Fata Nidaul Khasanah
Contact Email
lppmp@ubharajaya.ac.id
Phone
+6285647212938
Journal Mail Official
jiforty.tif@ubharajaya.ac.id
Editorial Address
Jl. Perjuangan No.81, Marga Mulya, Kec. Bekasi Utara, Kota Bks, Jawa Barat 17143
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
Journal of Informatics and Information Security
ISSN : -     EISSN : 27224058     DOI : https://doi.org/10.31599
Core Subject : Science,
Jurnal ini berisi tentang karya ilmiah hasil penelitian bidang ilmu komputer yang bertemakan: Artificial Intelligence, Blockchain Technology, Business Intelligence, Cloud Computing, Computer Architecture, Computer Vision, Database Systems, Deep Learning, Human Computer Interaction, Digital Forensic, Internet of Things, IT Security, Machine Learning, Networking, Semantic Web, Sistem Terdistribusi, Systems Engineering, Wireless Network.
Articles 111 Documents
Strategi Efektif Untuk Implementasi Keamanan Siber di Era Digital Muhamad Febrian Aska; Deo Pratama Putra; Sinambela, Caroline Julyana Magdalena
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Special Issue (Manajemen Sekuriti)
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/fzg80847

Abstract

In today's rapidly developing digital era, cyber security has become an urgent need for organizations to protect their data and information systems from increasingly complex threats. Universities are no different; in order to make their educational offerings more competitive, they must raise the caliber of their offerings. competitive. One way that institutions use information technology. The Academic Information System (AIS) is used. SIA was created to fulfill the learning process's goals, which are a component of fulfilling the college's vision and mission. fulfillment of higher education's goal and mission. Technological advances enable various cyber attacks that can result in significant losses, both in terms of finances and organizational reputation. In this context, a layered security approach and increasing awareness and competence of human resources (HR) are important strategies to achieve optimal levels of protection. This research aims to identify and analyze effective strategies that can be applied in implementing cyber security to protect organizations from various digital threats. The research method used is qualitative, which collects and analyzes interview results and related literature to understand the best approaches in cyber security. The research results show that the combination of layered security technologies such as firewalls, intrusion detection systems and data encryption, as well as security awareness training for employees, can increase an organization's resilience to cyber attacks. This approach is not only effective in resisting technical attacks but also strengthens the security culture at all levels of the organization.
Strategi Dan Praktik Terbaik Untuk Melindungi Data Di Universitas Bhayangkara Jakarta Raya Arya Radithya; Iqbal Mahdi Bisyafaa; Gilang Gs Putra
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Special Issue (Manajemen Sekuriti)
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/3y7xp128

Abstract

Cybersecurity is a crucial aspect in protecting important data at universities, including Universitas Bhayangkara Jakarta Raya, which handles student, staff, and financial data. This article discusses strategies as well as best techniques that can be employed to strengthen the university's data security. The research covers risk assessment, security training, secure authentication, data backup, system maintenance, network security, security policies, threat monitoring, encryption, and external collaboration. By adopting these strategies, Universitas Bhayangkara Jakarta Raya can minimize risks and enhance the security of their digital information. The research findings indicate that implementing a layered security system can improve the effectiveness of data protection at the university.
Keamanan File dalam Sistem Manajemen pada Mahasiswa Universitas Bhayangkara Jakarta Raya: Resiko dan Solusi Eka Dharma Putra; Ezra Hafiz Zachary; M Thariq Izaz; Nauval Arif Fadilah
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Special Issue (Manajemen Sekuriti)
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/zwfaje13

Abstract

Keamanan file dalam sistem manajemen informasi sangat penting untuk melindungi data dari risiko kebocoran, pencurian, atau manipulasi. Universitas Bhayangkara sebagai institusi pendidikan memiliki sistem manajemen yang menyimpan data akademik, keuangan, dan administrasi lainnya. Penelitian ini bertujuan untuk mengidentifikasi risiko keamanan file pada sistem manajemen Universitas Bhayangkara serta menawarkan solusi yang tepat. Dengan menggunakan metode deskriptif dan pendekatan studi kasus, penelitian ini menemukan beberapa risiko utama seperti akses tidak sah, serangan malware, dan kelalaian pengguna. Solusi yang diusulkan meliputi penerapan enkripsi data, sistem otentikasi berlapis, serta pelatihan pengguna. Implementasi strategi ini diharapkan dapat meningkatkan keamanan sistem secara keseluruhan.
Strategi Penanganan Keamanan Siber Di Indonesia Tedi Ramadhan; Risky Pujianto; Fahrul Bagus Santoso
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Special Issue (Manajemen Sekuriti)
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/v0xr7273

Abstract

This study continues previous research focused on cybersecurity issues in Indonesia. Its objective is to analyze cybersecurity challenges within the framework of strategies implemented by the Indonesian government. The evolution of cyber threats in the country is examined from the perspective of cybersecurity and national defense, which formed the basis of earlier research, and further expanded to explore relevant mitigation strategies.To provide a comprehensive understanding, this study adopts a three-perspective model that maps cyberspace into various logical layers. The research begins by highlighting the condition of Indonesian netizen and the challenges they face, then links these findings to the state’s perspective in the context of defense, as well as the connections with the public sector, private sector, and international community.
Analisis Sistem Manajemen Sekuriti : K3 dan Beban Kerja di PT.Bridgestone Daffa Khuzaimy Ghozali; Sheva Rafif Rabbani; Muhammad Fadli Absari; Muhammad Al Fikri Haikal; Jasson Arfian
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Special Issue (Manajemen Sekuriti)
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/63sm3x46

Abstract

This research aims to analyze the effectiveness of the security management system, Occupational Safety and Health (K3), as well as workload at PT Bridgestone. Three aspects This is an important pillar in maintaining smooth operations, employee safety, and security of company assets. As a large manufacturing company, PT Bridgestone facing complex challenges in implementing strict security management, effective K3 policies, and balanced workload arrangements for employees. This research method includes qualitative and quantitative approaches with techniques data collection through observation, interviews and questionnaires to employees and management. Data analysis was carried out to evaluate the extent of the management system security and K3 have been implemented, as well as to identify factors that affect employee workload. The research results show that still there are several areas that require improvement, such as procedural adjustments security, increased compliance with K3 standards, and workload management which is more regular. Recommendations resulting from this research include strengthening the management system security with supporting technology, regular K3 training for all employees, as well as adjusting workload to suit individual capacity. System implementation More integrated management is expected to be able to create a work environment which is safer, more productive and conducive at PT Bridgestone.
Analisis Dampak Pengamanan Manajemen File Mahasiswa Fakultas Ilmu Komputer Di Universitas Bhayangkara Jakarta Raya Agus Setiawan; Arrizal Bintang Ramadhan; Farid Ilham; Ihsan Ahmad Fauzan
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Special Issue (Manajemen Sekuriti)
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/9czgsm50

Abstract

This study was conducted to measure the level of compliance with file security policies among students of Bhayangkara University, Greater Jakarta. This study focused on the system and student data protection. The author investigated the factors that influence students' privacy policies. The author conducted research to determine the value of compliance with data security. The author conducted statistical data processing based on questionnaires filled out by students. The findings of this study provide an indication of the level of data security compliance among students in universities and the factors that influence it. The author tries to correlate compliance with factors that can affect the level of compliance in the implementation of data protection systems.
Meningkatkan Keamanan Jaringan Dalam Pendekatan Terhadapa Ancaman Siber Modern Muhammad Ryan Widianto; Fibril Acyuta Salsabitah; Muhammad Daffa Arifin; Mohammad Irsyad Suryanata
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Special Issue (Manajemen Sekuriti)
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/x6xzb308

Abstract

The escalating complexity of digital threats has transformed the landscape of cybercrime, necessitating robust security frameworks to protect digital infrastructure. Indonesia faces an array of cybersecurity challenges, encompassing unauthorized system penetration, data compromise, digital infrastructure disruption, and malicious software deployment. The management of these risks encompasses systematic approaches to detection, evaluation, mitigation, and ongoing monitoring. Strategic defense initiatives include recruiting specialized digital security professionals to enhance national protection mechanisms and establishing dedicated cybersecurity operations facilities. As digital transformation accelerates, the protection of information assets and computing resources has become paramount. This research examines the multifaceted challenges of digital security, with particular emphasis on methodological approaches, empirical observations, and analytical discourse regarding Indonesia's cybersecurity landscape. The opening segment contextualizes the critical nature of digital defense mechanisms amid rising technological threats. The theoretical framework examines contemporary cybersecurity paradigms and relevant scholarly contributions. The investigation employs qualitative methodologies, utilizing targeted case analyses to thoroughly examine digital security challenges. The investigation reveals that while students demonstrate basic cybersecurity awareness, substantial improvements are needed in Indonesia's broader digital defense capabilities. The study identifies key protective measures against digital threats, including robust authentication protocols, critical information consumption practices, and enhanced security awareness programs. The analysis highlights the intricate nature of combating digital threats and emphasizes the need for strengthened institutional responses coupled with enhanced public understanding of digital safety protocols.
Efektivitas CCTV dan Teknologi Pengawasan Tidak Langsung Dalam Meningkatkan Keamanan Lalu Lintas Pasaribu, Alfredo Alusiyus Octavianus; Arief Surya Awangga; Batubara, Erikson Imanuel; Yana Herlingga
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Special Issue (Manajemen Sekuriti)
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/qdsb4k02

Abstract

 The use of Closed Circuit Television (CCTV) and indirect surveillance technology has become a key element in modern security strategies. This study aims to evaluate the effectiveness of CCTV in preventing security threats, focusing on its ability to reduce crime rates and provide legal evidence. Data indicates that the installation of CCTV can lower theft rates by up to 47.4%, making it a significant deterrent for criminals who are reluctant to act in monitored areas. CCTV not only serves as a preventive tool but also as a means of real-time monitoring, enabling swift responses to emergency situations. Advanced technologies, such as AI-based video analytics and motion detection, further enhance these systems' capabilities in identifying suspicious behavior and delivering automatic notifications to security personnel. Additionally, CCTV recordings serve as strong visual evidence in investigations, aiding authorities in identifying perpetrators and reconstructing the chronology of events.
Analisis Manajemen Sekuriti di Badan Pengembangan Sumber Daya Manusia (BPSDM) Provinsi Jawa Barat Rizky Hakiki; Ahmad Taufik Riyadi Sanusi; Muhammad Ardika Putra Maulana; Muhammad Akmal Dzulfikar; Muhammad Fahrel Aditya
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Special Issue (Manajemen Sekuriti)
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/3dkp1q89

Abstract

This report presents an analysis of security management at the West Java Province Human Resources Development Agency (BPSDM) with the aim of evaluating and improving the existing information security system. In the era of globalization and advances in information technology, information security has become an important part of the economy, especially in the field of natural resource management. This research will use qualitative and quantitative approaches to collect data through interviews, questionnaires, observations and document studies. The survey found that although employees have a good understanding of the information security policy, there are challenges in its implementation, including lack of resources, inadequate training and barriers to change. Suggested recommendations include enhancing information security training programs, better policy implementation, strengthening access controls, and periodic evaluation of security management practices. We hope this report can make a positive contribution to the sustainable and secure management of natural resources.
Perancangan dan Implementasi Fitur Pencairan Cepat pada Website Akademik Fakultas Arifin, Muhammad Khoirul; Sari, Rafika
Journal of Informatic and Information Security Vol. 5 No. 2 (2024): Desember 2024
Publisher : Program Studi Informatika, Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/dvqd2c53

Abstract

In the digital era, ease of information access plays a crucial role in the effectiveness of an academic website. The Faculty of Psychology at Universitas Bhayangkara Jakarta Raya faces challenges in providing quick and efficient access to information for users. This internship report aims to design and implement a quick search feature on the faculty’s website to enhance user experience. The methods used include observation, interviews, and literature studies to understand user needs and technical system development. The implementation of a JSON-based search feature allows for faster and more accurate information retrieval. Testing results show that this feature improves search efficiency by up to 90%, with high user satisfaction based on conducted surveys. Future development may include integration with a more complex database system and the addition of filtering features to improve search result relevance

Page 10 of 12 | Total Record : 111