cover
Contact Name
Purwanto
Contact Email
garuda@apji.org
Phone
+6285642100292
Journal Mail Official
fatqurizki@apji.org
Editorial Address
Perum Cluster G11 Nomor 17 Jl. Plamongan Indah, Kadungwringin, Pedurungan, Semarang, Provinsi Jawa Tengah, 50195
Location
Kota semarang,
Jawa tengah
INDONESIA
International Journal of Computer Technology and Science
ISSN : 30481899     EISSN : 30481961     DOI : 10.62951
Core Subject : Science,
This Journal accepts manuscripts based on empirical research, both quantitative and qualitative. The scope of the this Journal covers the fields of Computer Technology and Science. This journal is a means of publication and a place to share research and development work in the field of technology.
Articles 4 Documents
Search results for , issue "Vol. 1 No. 4 (2024): October: International Journal of Computer Technology and Science" : 4 Documents clear
Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain Technology Rebecca Ling Ze Siew; Brendan Chan Kah Le; Lee Kai Yue; Nuri Nazirah Binti Ismail; Xavier Liong Zhi Hao; Muhammad Faisal
International Journal of Computer Technology and Science Vol. 1 No. 4 (2024): October: International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i3.29

Abstract

The rapid advancement of Industrial Internet of Things (IIoT) technology necessitates robust authentication solutions to ensure security, scalability, and efficiency. This project, titled "Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain," examines various blockchain-based authentication methods for IIoT and identifies their strengths and weaknesses. Despite the enhanced security and decentralized nature of blockchain, issues such as scalability, high latency, and computational load persist. To address these challenges, we propose the integration of Multi-Factor Authentication (MFA) as a supplementary solution. MFA can distribute the authentication load, enhance flexibility and security, and reduce latency by utilizing quick-to-verify factors. Moreover, MFA ensures high availability and scalable storage and processing through cloud services, seamlessly integrating with existing systems to provide a superior user experience. This comprehensive approach not only mitigates the inherent limitations of blockchain technology in IIoT but also reinforces the overall security framework, ensuring resilient and efficient authentication mechanisms. The results demonstrate significant improvements in system performance and user satisfaction, establishing MFA as a viable enhancement to blockchain-based IIoT security solutions.
Preparation of Information Technology (IT) Master Plan of SMK Ma’arif 1 Metro Using the Open Group Architecture Framework (TOGAF) Method Risa Ayuna; Sutedi Sutedi
International Journal of Computer Technology and Science Vol. 1 No. 4 (2024): October: International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i4.47

Abstract

This study aims to compile an Information Technology (IT) Master Plan for SMK Ma'arif 1 Metro using The Open Group Architecture Framework (TOGAF) method. This method is applied to design a structured and integrated information technology infrastructure to support operations and learning in schools. The results of the study indicate that the main business processes in schools, such as student registration, curriculum management, and financial administration, are still carried out manually, making them prone to errors and inefficiencies. Through TOGAF, an information system architecture is designed that includes the development of the Academic Information System (SIAKAD) and other school management applications. In addition, improving network infrastructure and cybersecurity are priorities in the proposed technology architecture. Implementation strategies and change management are also formulated to ensure the success of the digital transformation. This IT Master Plan is expected to improve the efficiency of school operations and the quality of learning, as well as support the achievement of more optimal educational goals in the digital era.
Design GiggleGate as Desktop Virtual Assistant with Face and Speech Recognition Authentication System Jasmine Aulia Mumtaz; Kinaya Khairunnisa Komariansyah; Wildan Holik; Reza Pratama; Muhammad Galuh Gumelar; Endang Purnama Giri; Gema Parasti Mindara
International Journal of Computer Technology and Science Vol. 1 No. 4 (2024): October: International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i4.113

Abstract

In recent years, virtual assistants have become an integral part of everyday life, simplifying routine tasks and allowing users to focus on more important matters. This research aiming to design GiggleGate, a virtual desktop assistant integrated with both face and speech recognition technology to enhance authentication security. The objective is to develop an authentication system that not only verifies user identity but also provides a more intuitive experience and seamless interaction. The research employs a development methodology to create and implement the system, which integrates face recognition via OpenCV and speech recognition via a Python library. The findings indicate that the integration of these technologies enhances security and user experience by offering dual-factor authentication. The system is expected to contribute to more secure and accessible virtual assistant applications, offering both a practical and efficient solution for users. The implications of this study suggest that the combination of face and speech recognition can provide an effective means to protect user privacy and improve the overall functionality of desktop assistants.
Systematic Literature Review on the Application of Blockchain in Enhancing Server Security: Research Methods for Mitigating Ransomware and Malware Attacks Danang Danang; Maya Utami Dewi; Widya Aryani
International Journal of Computer Technology and Science Vol. 1 No. 4 (2024): October: International Journal of Computer Technology and Science
Publisher : Asosiasi Riset Teknik Elektro dan Infomatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/ijcts.v1i4.186

Abstract

This study aims to explore the application of blockchain in enhancing server security to mitigate ransomware and malware attacks in critical infrastructures such as healthcare, finance, and government sectors. Using a systematic literature review (SLR) approach, the research collects articles from four major databases (IEEE Xplore, Scopus, ScienceDirect, and SpringerLink) published between 2020 and 2024. The search focuses on keywords related to blockchain, server security, ransomware, malware, and attack mitigation. The results indicate that blockchain enhances data integrity, transaction security, and strengthens access control to protect sensitive data. Moreover, integrating blockchain with intrusion detection systems (IDS) and using smart contracts accelerates threat detection and response, allowing for automatic blocking and data recovery from attacks. This technology reduces reliance on manual intervention and increases operational efficiency. However, the main challenges in its implementation include high implementation costs, scalability, and technical complexity. Nevertheless, blockchain offers significant solutions for mitigating ransomware and malware attacks while enhancing the reliability and efficiency of systems. In conclusion, blockchain provides an effective solution for server security and cyber threat mitigation, although challenges related to cost and scalability need to be addressed. Further research is required to develop more efficient blockchain protocols and integrate them with other technologies to enhance threat detection and response speed.

Page 1 of 1 | Total Record : 4