cover
Contact Name
Dirja Nur Ilham
Contact Email
dirja.poltas@gmail.com
Phone
+6285261233288
Journal Mail Official
dirja.poltas@gmail.com
Editorial Address
Kampus Politeknik Aceh Selatan, Jl. Merdeka Komplek Reklamasi Pantai
Location
Kota banda aceh,
Aceh
INDONESIA
JIKUM: Jurnal Ilmu Komputer
ISSN : -     EISSN : 3090739X     DOI : https://doi.org/10.62671/jikum.v1i2
Core Subject : Science,
JIKUM: Jurnal Ilmu Komputer menerbitkan artikel dalam Bahasa Indonesia yang akan diterbitkan 2 kali setahun yaitu periode Mei dan Nopember. Penulis yang mengirimkan naskah pada JIKUM: Jurnal Ilmu Komputer harus mengikuti pedoman penulisan, fokus dan ruang lingkup jurnal, serta template jurnal. Apabila naskah yang dikirim tidak sesuai dengan ketentuan tersebut, maka artikel akan ditolak.
Articles 64 Documents
Penerapan Steganografi Pada File Gambar Dengan Menggunakan Metode Lsb Rahmatunnisa, Puan; Ryenfi, Fawwaz Dzaki; Rizkynda, Awwalul; Hafiz, Qobul; Khairunisha, Ade
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.151

Abstract

Keamanan informasi merupakan aspek kritis dalam pertukaran data digital. Steganografi menjadi teknik alternatif untuk melindungi kerahasiaan informasi dengan menyembunyikan pesan dalam media digital. Penelitian ini mengimplementasikan metode Least Significant Bit (LSB) untuk menyisipkan pesan rahasia pada citra digital RGB. Metode LSB bekerja dengan memodifikasi bit terendah nilai piksel tanpa menimbulkan perubahan visual signifikan. Pengujian dilakukan pada lima citra berukuran 512×512 piksel dengan variasi panjang pesan 100-300 karakter. Kualitas citra dianalisis menggunakan parameter Mean Square Error (MSE) dan Peak Signal to Noise Ratio (PSNR). Hasil menunjukkan nilai MSE berkisar 0,52-1,56 dan PSNR 46,20-51,02 dB, mengindikasikan kualitas sangat baik dengan perbedaan visual yang tidak terdeteksi mata manusia. Metode LSB terbukti efektif untuk penyisipan pesan teks dengan kapasitas hingga 96 KB pada citra RGB 512×512 piksel.
Mitigasi Serangan Ransomware Pada Sistem Operasi Windows Menggunakan Manajemen Patch Dan Firewall Duta, Arya Mahisa; Gunawan, Muslim; Haikal, Muhammad; Syaf, Ramza Nadra; Aulia, Afkar
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.152

Abstract

Ancaman siber terus berevolusi seiring perkembangan teknologi, salah satunya adalah serangan Ransomware yang menyebabkan kerugian finansial yang signifikan dan mengganggu  operasi  bisnis  serta  individu. Kasus-kasus  ransomware  terkenal  seperti  WannaCry,  NotPetya, GandCrab,  Ryuk,  dan  REvil/Sodinokibi  telah  menunjukkan  dampak  negatif  dari  serangan  tersebut. Insiden global WannaCry membuktikan bahwa celah keamanan sekecil apapun pada sistem operasi dapat berakibat fatal jika diabaikan. Penelitian ini bertujuan untuk meninjau kembali mekanisme serangan tersebut dan merumuskan langkah pertahanan praktis yang bisa diterapkan oleh pengguna Windows. Melalui pendekatan studi kasus dan kajian literatur teknis, ditemukan bahwa mayoritas infeksi terjadi akibat kelalaian dalam pemeliharaan sistem. Oleh karena itu, penerapan disiplin Manajemen Patch untuk menutup celah keamanan (vulnerability) dan konfigurasi Firewall untuk membatasi akses jaringan, terbukti menjadi metode mitigasi yang paling efektif dalam mencegah masuknya malware.
Analisis Pola Penyebaran dan Dampak Virus Trojan Horse terhadap Keamanan Sistem Komputer Hadikosyah, Gilang Akbar; Zannah, Nurul Firzatul; Yulistia, Sara; Febrian, M Rizky; Maulana, Fhadli; Sulthan, Rianda
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.153

Abstract

The rapid advancement of information technology has significantly increased the use of computer systems in daily activities. Alongside these developments, cyber threats have also grown, one of the most prevalent being the Trojan Horse virus. Trojan Horse is a type of malware that disguises itself as a legitimate program in order to deceive users and gain unauthorized access to computer systems. This study aims to analyze the patterns of Trojan Horse virus propagation, examine its impacts on computer system security, and identify effective prevention and mitigation strategies. The research method used is a literature review by analyzing books, scientific journals, and credible online sources related to Trojan Horse malware and information system security. The results show that Trojan Horse viruses commonly spread through email attachments, malicious downloads, fake software, and social engineering techniques. The impacts include data theft, system performance degradation, unauthorized remote access, and disruption of organizational operations. Therefore, comprehensive security measures combining technical controls and user awareness are essential to minimize Trojan Horse attacks.
Studi Literatur :  Perkembangan Teknologi Firewall Dan Strategi Pertahanan Jaringan Pada Sistem Komputer Tarina, Cut; Ismara , Nazwa; Mahara, Lili; Alysa, Alysa; Azimah, Nahwah
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.154

Abstract

The rapid advancement of information technology has significantly increased dependence on digital networks, making network security a critical concern amid the growing complexity of cyber threats. Traditional security mechanisms are no longer sufficient to address modern attacks such as malware, Distributed Denial of Service (DDoS), ransomware, and application-based intrusions(Bellamkonda, 2024; Patel, 2024). This study aims to systematically examine the development of firewall technologies from early generations to modern solutions and to analyze network defense strategies applied to mitigate contemporary cyber threats. This research employs a literature review method by analyzing scientific journals, textbooks, and international standards related to network security, firewall technologies, and defense strategies published between 2020 and 2025. The collected literature was analyzed using qualitative descriptive analysis to identify trends, characteristics, and challenges in firewall implementation. The results indicate that modern firewalls, particularly Next-Generation Firewalls (NGFW) and cloud-based firewalls, offer enhanced capabilities such as deep packet inspection, application control, and real-time threat prevention(George & George, 2021; Patel, 2024). However, their effectiveness largely depends on proper configuration and integration with layered security strategies, including defense in depth, Zero Trust Architecture, IDS/IPS, VPN, and SIEM(Bellamkonda, 2024; Rose et al., n.d.). Despite their advantages, challenges such as high implementation costs, system complexity, and performance impact remain significant considerations.
Kajian Ancaman Malware dan Upaya Pencegahan melalui Penguatan Keamanan Sistem Komputer Ulvi, Khaira; Rasikha, Garwita; Aulia, Raudatul; Rika, Shella; Hidayani, Maulida
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.155

Abstract

Malware is one of the most significant threats to computer system security and continues to evolve alongside rapid advances in information technology. The increasing reliance on digital systems in various sectors has made organizations and individuals more vulnerable to malware attacks, which can result in data breaches, system failures, financial losses, and operational disruptions. This study aims to examine the various types of malware threats and to analyze prevention strategies through strengthening computer system security. The research method employed is a systematic literature review by analyzing scientific journal articles, books, and official cybersecurity reports published between 2018 and 2024. The results indicate that malware such as viruses, worms, trojans, ransomware, and spyware exhibit different attack vectors, behaviors, and impacts. Effective prevention measures include the implementation of updated antivirus software, firewalls, regular system and application updates, data backup mechanisms, user awareness training, and the enforcement of organizational security policies. A comprehensive approach to strengthening computer system security is essential to reducing malware risks and enhancing overall information security resilience.
Analisis Keamanan Komputer dalam Melindungi Data dari Serangan Siber Ananta, Farras Ajeng; Wulandary, Airin; Rizka, Jumra; Hidayat, Wahyu Abdillah; Azkal, Muhammad
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.157

Abstract

The rapid advancement of information technology has made humans increasingly dependent on computer systems in various aspects of daily life. However, this situation is also accompanied by an increased risk of security threats, such as digital attacks that can disrupt system operations and cause data breaches. Computer security becomes a crucial element to maintain the confidentiality, integrity, and accessibility of information. This study aims to examine the concept of computer security, various types of common threats, and protection strategies that can be implemented to protect data from cyber threats. The research approach applied is a literature review through examination of academic journals, books, and articles related to computer security. The research findings reveal that the implementation of security mechanisms such as antivirus software, firewalls, data encryption, and increasing user awareness can reduce the risk of cyber attacks. The conclusion of this study is that computer security needs to be implemented comprehensively, both from technical and non-technical sides, so that the system is maximally protected.
Analisis Keamanan Sistem Akademik Berbasis Web terhadap Serangan SQL Injection Akbar, Fathul Barri; Sipayung, Ariq Fadhilah Pasya; Lisara, Afra Dhiya; Syakira, Nasyatha; Raisa, Devia
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.161

Abstract

Web-based academic systems have become an essential component in managing educational data, including student records, lecturer data, grades, class schedules, and other academic administration processes. The implementation of web technology enables educational institutions to improve efficiency, speed, and accuracy in processing academic information in an integrated manner, as well as providing easy access for users anytime and anywhere. However, this openness also introduces various security risks that may threaten data confidentiality and system reliability. One of the most common security threats in web applications is SQL Injection attacks, which exploit weaknesses in user input handling, particularly in applications connected to databases. Through this attack, malicious actors can insert harmful SQL commands to gain unauthorized access, modify data, or delete critical information. This study aims to analyze the vulnerability level of a web-based academic system to SQL Injection attacks and to identify appropriate prevention measures. The research method employs a case study approach and literature analysis with simulated attacks on login forms and data input features. The results indicate that systems lacking input validation, data sanitization, and prepared statements are highly vulnerable to SQL Injection attacks. Therefore, the implementation of proper security mechanisms is essential to protect academic data.
Audit Kerentanan Infrastruktur Siber Dan Korelasinya Terhadap Eskalasi Ketidakpercayaan Publik: Studi Kasus Layanan Digital Pemerintah Indonesia Farhan, Muhammad Ulya; Nadia, Rayyatun; Naziva, Muhammad Alzi; Idrisi, Muhammad Al; Kobat, Nicoiwan Adha
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.162

Abstract

Digital transformation in Indonesia's public sector faces a dual challenge: technical infrastructure vulnerabilities and a crisis of public trust due to recurring cyber incidents. This study aims to empirically test whether the level of technical vulnerability in government systems correlates linearly with the intensity of public negative sentiment (public distrust). Using a mixed-method approach, this research combines passive security audits (Passive Reconnaissance) based on Open Source Intelligence (OSINT) on 30 government domains (.go.id) and sentiment analysis based on Large Language Models (LLM) on 55,451 social media comments. The results reveal a counterintuitive finding of no significant correlation between technical vulnerability and public distrust (Pearson ). Data analysis uncovered a "Reputation Paradox," where agencies with critical vulnerability scores exhibited low negative sentiment, whereas agencies with seemingly secure technical profiles faced the highest levels of distrust. This study concludes that public perception of security is driven by service availability and User Experience (UX) rather than technical cybersecurity parameters.
Analisis Kinerja Algoritma Hash dan MAC terhadap Integritas dan Autentikasi Data Putri, Luthfiah; Khairunnisa, Zulfa; Senjani, Junita Rahma; Praramadani, Septia; Hasibuan, Yulandari
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.166

Abstract

In information systems, data security plays a crucial role, particularly in ensuring data integrity and authentication during storage and transmission processes. Hash algorithms and Message Authentication Codes (MAC) are two cryptographic techniques commonly employed for these purposes. Hash algorithms are primarily used to maintain data integrity, whereas MAC provides both data integrity and authentication through the use of a shared secret key. This study aims to analyze and compare the performance of hash algorithms and MAC in preserving data integrity and authentication. The research adopts a quantitative experimental method with a comparative analysis approach, using test data of varying sizes and evaluating performance based on specific operational parameters. The results indicate that hash algorithms are effective in detecting data modifications through hash value comparison, while MAC offers stronger guarantees by ensuring both data integrity and authentication using a shared secret key. These findings highlight the strengths and limitations of each mechanism and provide insights into their appropriate application in secure information systems. The findings further suggest that hash algorithms are more suitable for data integrity verification, whereas MAC is more appropriate for systems that require both data integrity and authentication simultaneously.
Implementasi Steganografi Multi-File Menggunakan Metode Metadata PNG untuk Keamanan Data Multimedia Ridha, Muhammad; Alfarizy, Renald; Mabrur, Muhammad Arif; Alfarisi, Salman
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.170

Abstract

The rapid growth of digital multimedia increases the risk of unauthorized access and data leakage, requiring effective techniques to enhance data security. Steganography is one approach that conceals information within digital media to prevent detection. This research aims to implement a multi-file steganography system using the PNG metadata method to secure multimedia data. The proposed approach embeds multiple files into the metadata section of PNG images without altering the visual quality of the carrier image, thereby maintaining imperceptibility. The methodology involves analyzing PNG metadata structures, designing an embedding and extraction mechanism for multiple files, and implementing the system using a software-based approach. Experimental results demonstrate that the proposed method is capable of securely embedding and extracting multiple files while preserving image integrity and file authenticity. The use of PNG metadata provides sufficient capacity and flexibility for multi-file steganography, making it suitable for secure multimedia data storage and transmission. Overall, the proposed implementation shows that metadata-based steganography can be an effective and efficient solution for enhancing multimedia data security.