cover
Contact Name
Dirja Nur Ilham
Contact Email
dirja.poltas@gmail.com
Phone
+6285261233288
Journal Mail Official
dirja.poltas@gmail.com
Editorial Address
Kampus Politeknik Aceh Selatan, Jl. Merdeka Komplek Reklamasi Pantai
Location
Kota banda aceh,
Aceh
INDONESIA
JIKUM: Jurnal Ilmu Komputer
ISSN : -     EISSN : 3090739X     DOI : https://doi.org/10.62671/jikum.v1i2
Core Subject : Science,
JIKUM: Jurnal Ilmu Komputer menerbitkan artikel dalam Bahasa Indonesia yang akan diterbitkan 2 kali setahun yaitu periode Mei dan Nopember. Penulis yang mengirimkan naskah pada JIKUM: Jurnal Ilmu Komputer harus mengikuti pedoman penulisan, fokus dan ruang lingkup jurnal, serta template jurnal. Apabila naskah yang dikirim tidak sesuai dengan ketentuan tersebut, maka artikel akan ditolak.
Articles 64 Documents
Evaluasi Sistem Keamanan Komputer: Analisis Ancaman, Kriptografi, dan Perlindungan Data Modern Fadly, Zul; Lubis, Zulkarnaen; Alwisyah, Dendy Rivaldo; Munandar, Dedy; Afriyansyah, Muhammad Riski
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.138

Abstract

Computer security plays a crucial role in protecting the confidentiality, integrity, and availability of digital information in modern computing environments. This study evaluates key computer security components through an analysis of threat models, operating system security mechanisms, cryptographic approaches, and modern data protection techniques. The research reviews user management, firewall configuration, system updates, and layered defense strategies, as well as the characteristics and propagation of contemporary malware such as ransomware, spyware, and network-based attacks. Classical and modern cryptographic methods, hashing functions, digital signatures, and steganography are also examined as essential elements in ensuring secure information processing. Using a descriptive qualitative method supported by literature studies and system observations, the findings indicate that effective computer security requires a multilayered approach supported by consistent system maintenance and increased user awareness to mitigate evolving cyber threats.
Analisis Keamanan Layanan, Sistem Operasi, Kriptografi, dan Steganografi dalam Pengelolaan Informasi Modern Siregar , Akhsanul Khairi; Pasha , M. Rifqy; Asrovi , Alif; Rahmadayani , Fanni; Azhari, Muhammad Raihan
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.139

Abstract

The rapid advancement of digital technology has significantly increased the need for stronger information security systems, particularly in digital services, operating systems, and data protection mechanisms such as cryptography and steganography. This study aims to analyze the role of service security, operating system security, cryptographic techniques, and steganographic methods in maintaining the confidentiality, integrity, and availability of information in the modern digital environment. The methodology used in this research is a literature review by examining scientific journals, reference books, and international security standards published between 2018 and 2024. The results indicate that service security protects communication processes and data exchange through authentication, authorization, and encryption. Operating system security supports access control management and minimizes exploitation risks through system hardening and regular security updates. Cryptography safeguards the confidentiality and integrity of data using symmetric and asymmetric algorithms, while steganography adds an extra layer of protection by concealing information within digital media. The study concludes that integrating these four security components can create a multilayered defense system that is more effective in mitigating cyber threats and ensuring comprehensive information protection.
Perkembangan Teknik Kriptografi Modern: Dari Substitusi Klasik hingga Public-Key Encryption Putri, Diva Nadya; Sari, Divia Permata; Maulidayana, Maulidayana; Muksalmina, Muksalmina; Lubis, Muhammad Raihan Syafiq
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.140

Abstract

The rapid development of digital technology has increased the need for secure information exchange, making cryptography a fundamental component of modern information security systems. In the early stages, cryptographic techniques were dominated by classical substitution ciphers, which are simple but vulnerable to various cryptanalysis attacks. This study aims to analyze the development of cryptographic techniques, from classical substitution ciphers to modern public-key encryption schemes. The research method used is a literature review by reviewing books, national journals, and international journals that discuss classical and modern cryptography. The results show that classical cryptographic methods are no longer adequate to meet current security needs because they have a limited key space and are vulnerable to attacks. In contrast, the emergence of modern cryptography, especially public-key encryption such as RSA and Diffie–Hellman, offers stronger security mechanisms, especially in the process of key distribution and secure communication over open networks. Based on these results, it can be concluded that public-key encryption plays a very important role in supporting the security of digital communications and has become the basis for various modern security applications.
Keamanan Informasi dalam Sistem Informasi Modern: Analisis Ancaman dan Upaya Pengamanan Berdasarkan Studi Literatur Nurmadani, Sucia; Ceria, Nada Amal; Khalil, Munawar; Riski, Muhammad Fariz; Rasyad, Muhammad Ramzy
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.141

Abstract

Information security is a critical aspect of modern information systems, as information assets are vulnerable to various cyber threats that may compromise confidentiality, integrity, and availability. Attacks such as phishing, malware, ransomware, data breaches, and network-based attacks continue to increase and pose serious risks to organizations and individuals. This study aims to examine the concepts, threats, and protection strategies in information security based on scientific literature. The research method used is a literature review by analyzing 20 references published between 2020 and 2025 related to information security, information system security, network security, cryptography, and risk management. The results indicate that effective information security requires an integrated approach involving technical controls, security policies, risk management, and user awareness.
Evaluasi Teknik Steganografi dan Efektivitasnya dalam Perlindungan Informasi Fahmi, Rizal; Rizky, Baihaki; Mubaraq, M. Zakki; Sahara, Rahmi; Panjaitan, Indah Sari
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.142

Abstract

Information security is a critical issue in the digital era, particularly in the exchange of confidential data over public networks. Steganography offers a solution by hiding information within digital media so that its existence is not detected. This study aims to evaluate the effectiveness of two popular steganography techniques: Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) in terms of imperceptibility and robustness. The method used involves embedding text messages into image media and measuring quality using Mean Squared Error (MSE) and Peak Signal- to-Noise Ratio (PSNR). The results show that the LSB technique offers better imperceptibility with a higher average PSNR value (55 dB) compared to DCT (42 dB). However, DCT demonstrates superior robustness against compression attacks and noise addition. This research concludes that the selection of steganography techniques must be adjusted to specific needs, balancing hiding capacity and resistance to manipulation.
Analisis Perbandingan Enkripsi dan Dekripsi Menggunakan Algoritma Simetris AES dan Hybrid (AES + RSA) Pada File Video Pranata, Alam Fahlevi; Saragih, Arlin Fajar; Fikri, Radika; Rahmadani, Khairiah; Aulia, Nazwa Putri
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.143

Abstract

This study compares the performance of video file encryption using the symmetric Advanced Encryption Standard (AES) and a hybrid scheme combining AES with Rivest–Shamir–Adleman (RSA). The research aims to evaluate efficiency and security trade-offs between the two approaches. Experimental tests were conducted on video files of different sizes, measuring encryption time, decryption time, and file size overhead. Results show that AES achieves faster processing, with average encryption time of 0.0773 seconds and decryption time of 0.1097 seconds. In contrast, the hybrid AES–RSA scheme is slower, with encryption time of 0.0854 seconds (10.4% slower) and decryption time of 0.1405 seconds (28.1% slower), due to additional RSA key operations. While AES is more efficient for real-time applications, the hybrid method provides stronger key distribution security These findings highlight the importance of selecting encryption methods based on application requirements.
Studi Literatur Terhadap Evolusi Virus Komputer: Mekanisme Penyebaran, Investigasi Forensik, dan Strategi Deteksi Berbasis Kecerdasan Buatan Addari, Muhammad Ausid; Siregar , Ghanda Ramadhan; Lubis , Afriza Briliansyah; Ariestia, Cut Intan; Zatalini, Zatalini
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.145

Abstract

The escalation of post-pandemic malware threats has surpassed the capacity of conventional defenses, as social engineering techniques and code manipulation have become primary infiltration instruments exploiting vulnerabilities in user behavior and system structures. This study aims to analyze the evolution of malware propagation techniques, evaluate the effectiveness of digital forensic investigations, and test the robustness of artificial intelligence-based detection methods. Employing a Systematic Literature Review (SLR) approach toward case studies and algorithmic experiments from the 2023–2025 period, this research synthesizes data from real-world attack investigations and machine learning model performances. The results indicate that while algorithms such as Decision Trees and Ensemble Learning offer high accuracy, their effectiveness is increasingly compromised by adversarial attacks capable of deceiving AI logic. Furthermore, forensic findings in ransomware cases confirm that aggressive encryption speeds necessitate a shift in mitigation strategies from post-incident analysis to proactive hybrid defenses. This study concludes that the integration of behavioral detection technology and systemic resilience through data backup management is the primary key to countering the mutation of contemporary cyber threats.
Analisis Efektivitas Kebijakan Manajemen User dan Firewall pada Sistem Operasi dalam Mencegah Akses Ilegal Anisah, Anisah; Efrina, Cut Intan; Hakim, Muhammad Lukmanul; Siregar, Nadhirah Adzra Afifah; Maulida, Yusra Putri
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.146

Abstract

Information system security is a crucial aspect in managing modern operating systems as the threat of unauthorized access to information systems increases. Therefore, effective protection strategies such as user access management policies and firewall implementation are needed in operating systems. This study aims to analyze the effectiveness of user management and firewall policies in preventing unauthorized access to operating systems by comparing their implementations in Windows and Linux. The method used in this study is a qualitative approach through literature studies of various relevant research and case studies. The findings show that user management plays a role in controlling internal access rights by implementing the principle of least privilege, while firewalls function as an effective external defense layer in controlling network traffic. Both complement each other in maintaining system security. However, their success is highly dependent on the implementation of stable rules, accurate settings, and the competence of system administrators. By combining good policies and proper firewall configuration, operating systems can be more robust against various unauthorized access risks, thus maintaining data and infrastructure security.
Eksplorasi Keamanan Ganda melalui Verifikasi Dua Langkah dalam Menjaga Kerahasiaan Komunikasi Digital pada Aplikasi WhatsApp Maulidan, Maulidan; Akbar, Safarul; Mauliyani, Amanda; Alma, Ristia; Hasibuan, Muhammad Fadhil
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.147

Abstract

Tingginya ketergantungan global pada platform komunikasi digital, khususnya melalui aplikasi terkemuka seperti WhatsApp, telah menjadikan perlindungan dan kerahasiaan data pengguna sebagai isu krusial dalam keamanan siber. Meskipun WhatsApp telah mengadopsi enkripsi end-to-end secara default untuk menjamin privasi isi pesan —sejalan dengan konsep dasar Kerahasiaan (Confidentiality) dalam kriptografi— kerentanan serius masih terdeteksi pada lapisan Autentikasi akun. Ancaman modern seperti upaya pengambilalihan akun secara paksa, serangan phishing, hingga eksploitasi SIM Swap memungkinkan pihak yang tidak berwenang untuk mendaftarkan ulang nomor telepon pengguna, yang berpotensi menyebabkan penyalahgunaan sistem dan pencurian data, Penelitian ini bertujuan untuk melakukan eksplorasi komprehensif terhadap mekanisme Verifikasi Dua Langkah (Two-Step Verification/2FA) yang diimplementasikan pada aplikasi WhatsApp sebagai lapisan keamanan ganda. Mekanisme 2FA ini berfungsi sebagai benteng pertahanan kritis kedua, mewajibkan pengguna memasukkan Kode Identifikasi Pribadi (PIN) rahasia yang bersifat independen dari kode verifikasi SMS. Dalam konteks ilmu kriptografi, penerapan 2FA merupakan solusi kriptografi modern yang mengalihkan penekanan keamanan dari kerahasiaan algoritma ke kerahasiaan kunci (PIN) yang digunakan, memungkinkan sistem yang terbuka namun tetap andal terhadap serangan, Metode yang digunakan dalam studi ini melibatkan dua pendekatan: (1) Analisis sistematis terhadap arsitektur 2FA WhatsApp dan dampaknya terhadap proses verifikasi ulang akun, serta (2) Studi kualitatif/kuantitatif (misalnya: survei pengguna) untuk mengevaluasi tingkat adopsi dan kemudahan penggunaan (usabilitas) fitur ini di kalangan pengguna awam. Hasil penelitian ini diharapkan dapat menunjukkan sejauh mana penerapan 2FA efektif dalam melindungi akun dari upaya pengambilalihan yang tidak sah. Studi ini menyimpulkan bahwa 2FA tidak hanya secara signifikan memperkuat aspek Autentikasi sebagai pilar keamanan informasi, tetapi juga berhasil mencapai keseimbangan antara keamanan yang kuat dan antarmuka yang sederhana, menjadikannya kunci untuk menjaga keamanan data dengan kuat dan andal bagi masyarakat luas.
Implementasi Steganografi Audio dan Gambar untuk Pengamanan Informasi Harahap, Faizah Amirah; Hasibuan, Nadiyah Haaniyah; Asthalariq, Luthan; Sohaimi, Soty; Valzoe, Dhimas Hadi
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.148

Abstract

The rapid advancement of information technology has increased the risk of cyberattacks on sensitive data, creating a strong demand for advanced security techniques. Steganography complements cryptography by concealing messages within digital media so that their existence is not easily detected by unauthorized parties. This study focuses on hiding text messages in audio and image files to support secure information exchange. The research aims to implement audio and image steganography using the Least Significant Bit (LSB) method. Text messages are embedded into WAV audio files and PNG image files while maintaining media quality, minimizing detectability, and preserving file size efficiency. An experimental prototyping methodology was applied, involving system design, implementation, and testing. The LSB technique embeds messages by modifying the least significant bits of audio samples or image pixels. Data were obtained through literature review and experimental embedding and extraction procedures. The results show that text messages were successfully embedded and extracted from both audio and image files without noticeable visual or auditory degradation. File sizes remained largely unchanged, and the stego media was indistinguishable from the original as long as no compression or manipulation occurred. In conclusion, LSB-based steganography is an effective approach for information security and future enhancement research.