cover
Contact Name
Dirja Nur Ilham
Contact Email
dirja.poltas@gmail.com
Phone
+6285261233288
Journal Mail Official
dirja.poltas@gmail.com
Editorial Address
Kampus Politeknik Aceh Selatan, Jl. Merdeka Komplek Reklamasi Pantai
Location
Kota banda aceh,
Aceh
INDONESIA
JIKUM: Jurnal Ilmu Komputer
ISSN : -     EISSN : 3090739X     DOI : https://doi.org/10.62671/jikum.v1i2
Core Subject : Science,
JIKUM: Jurnal Ilmu Komputer menerbitkan artikel dalam Bahasa Indonesia yang akan diterbitkan 2 kali setahun yaitu periode Mei dan Nopember. Penulis yang mengirimkan naskah pada JIKUM: Jurnal Ilmu Komputer harus mengikuti pedoman penulisan, fokus dan ruang lingkup jurnal, serta template jurnal. Apabila naskah yang dikirim tidak sesuai dengan ketentuan tersebut, maka artikel akan ditolak.
Articles 64 Documents
Teknik Penyembunyian Data Non-Destruktif pada Citra Digital Menggunakan Metode End-of-File (EOF) dan Enkripsi AES-256 Farhan, Muhammad Ulya; Akbar, Fathul Barri; Fatin, Ammar; Harahap, Ariifah Yaasir
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.172

Abstract

Conventional cryptography and LSB steganography often suffer from detectability and visual distortion. This study proposes a non-destructive solution integrating End-of-File (EOF) steganography with AES-256 encryption to ensure data security without compromising carrier media quality. The method functions by appending encrypted data after the image file terminator, leaving the original pixel structure intact. Security is reinforced using AES-256 (CBC mode) and PBKDF2-HMAC-SHA256 with 100,000 iterations. Experimental results using the "PrivaSel" interface demonstrate perfect visual integrity, evidenced by identical histograms between original and stego images. Validation via Hex Editor confirms data insertion through a unique "AES-EOF" marker. Consequently, this system achieves an optimal balance between confidentiality and invisibility, preserving 100% of carrier media integrity for secure digital exchange.
Kerangka Konseptual Keamanan Layanan Sistem dalam Ekosistem Platform Digital Multilapis Dalimunthe, Fadli; Maulana, Arif; Situmeang , Muhammad Partua Langka; Alfarisi, Muhammad Rasyya; Harahap, Jakbar Ali
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.173

Abstract

The rapid growth of digital services and API utilization in multi-layered platform ecosystems has expanded attack surfaces, increasing systemic security risks. Traditional security approaches focusing on individual components are insufficient to address cross-layer vulnerabilities, especially in cloud-native, microservices-based architectures. This study aims to develop a holistic conceptual framework for system service security in multi-layered digital platforms by identifying key layers, analyzing interdependencies, and mapping risks and controls across infrastructure, platform/middleware, applications, and governance layers. Using a qualitative literature review of publications since 2020, thematic and conceptual analyses were conducted to synthesize existing technical and governance practices. The proposed framework integrates defense-in-depth mechanisms, including network segmentation, API hardening, service mesh with mutual TLS, secure software development lifecycle, identity and access management, and governance policies, highlighting cross-layer dependencies and systemic risk propagation. Additionally, it addresses the trade-off between security and system performance, proposing adaptive and contextual strategies such as lightweight cryptography, selective protection, and orchestrated controls. The results suggest that security must be designed end-to-end, considering technical, operational, and governance dimensions, to ensure resilience, service availability, and user trust in complex digital platform ecosystems. This framework provides a theoretical and practical reference for designing robust, adaptive, and measurable security architectures.
Analisis Keamanan Data Pengguna pada Platform E-commerce: Studi Kasus Kebocoran Data Tokopedia 2020 Zafira, Naila; Aisyahara, Nabila; Safriana, Cut Aidila; Rofli, Rofli; Hafizatunnisa, Hafizatunnisa
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.174

Abstract

The rapid growth of e-commerce platforms has increased the collection and processing of users’ personal data, which consequently raises security risks. One of the most significant incidents in Indonesia was the Tokopedia data breach in 2020. This study aims to analyze user data security issues on e-commerce platforms through a case study of the Tokopedia data breach. The research method uses a descriptive qualitative approach based on literature review and secondary data analysis. The results indicate that data breaches are influenced not only by technical vulnerabilities but also by weaknesses in data governance and security management. This study also reviews the incident from a legal perspective based on Indonesia’s Personal Data Protection Law. The findings are expected to contribute to improving data security practices on e-commerce platforms.
Analisis Sistem Autentikasi Dua Faktor (2FA) Dan Efektivitasnya Dalam Meningkatkan Keamanan Akses Azkiya, Azkal; Ichsan, Muhammad Budi Prayoga; Hasibuan, Nabil Azhari Putra Finula; Andrianti, Reva; Maulana, Intan
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.175

Abstract

The rapid development of information technology has led to an increase in security threats to digital systems, particularly in user authentication mechanisms. Single-factor authentication based solely on passwords is no longer sufficient to protect system access from attacks such as phishing, brute force, and credential stuffing. Therefore, two-factor authentication (2fa) has emerged as a solution by adding an additional layer of security. This study aims to analyze the concept of 2fa and evaluate its effectiveness in improving system access security. The research method used is a literature study of various studies and implementations of 2fa in modern information systems. The results indicate that the implementation of 2fa significantly reduces the risk of unauthorized access and increases user trust in system security, despite challenges related to usability and technical implementation.
Analisis Penerapan Keamanan Berlapis melalui Autentikasi Dua Faktor dalam Melindungi Privasi Komunikasi Digital pada Platform Media Sosial Instagram Akmal, Safarul; Andari, Zhahira Dwi; Dahlawi, Muhammad Wahyu; Salsabila, Misbah; Ramadhan, Royyan
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.176

Abstract

Perkembangan pesat komunikasi digital melalui platform media sosial, khususnya Instagram, telah meningkatkan potensi ancaman terhadap privasi pengguna di Indonesia, seperti phishing, credential stuffing, dan akses tidak sah. Penelitian ini bertujuan menganalisis efektivitas penerapan autentikasi dua faktor (Two-Factor Authentication/2FA) sebagai mekanisme keamanan berlapis dalam melindungi privasi komunikasi digital pada Instagram. Metode penelitian yang digunakan adalah mixed methods dengan mengombinasikan survei kuantitatif terhadap 200 pengguna aktif Instagram berusia 18–35 tahun di wilayah Aceh dan Jawa, serta analisis kualitatif melalui simulasi serangan keamanan pada 50 akun uji dengan variasi konfigurasi 2FA, meliputi OTP berbasis SMS, aplikasi autentikator, dan autentikasi biometrik. Pengumpulan data dilakukan menggunakan kuesioner berskala Likert untuk mengukur persepsi keamanan pengguna, serta pemanfaatan tools OWASP ZAP dalam mensimulasikan serangan brute-force dan man-in-the-middle. Hasil penelitian menunjukkan bahwa penerapan 2FA mampu menurunkan tingkat keberhasilan intrusi sebesar 85–92%, dengan kombinasi OTP SMS dan autentikasi berbasis aplikasi sebagai metode paling efektif dengan tingkat efikasi mencapai 91% dibandingkan autentikasi satu faktor. Meskipun demikian, masih ditemukan beberapa kendala, seperti risiko SIM swapping dan kelelahan pengguna dalam pengelolaan kode OTP, yang dilaporkan oleh 32% responden. Oleh karena itu, penelitian ini menekankan pentingnya penerapan model keamanan defense-in-depth melalui integrasi enkripsi end-to-end dan verifikasi biometrik. Temuan penelitian ini diharapkan dapat menjadi dasar rekomendasi bagi pengembang platform dan regulator dalam merumuskan kebijakan keamanan digital serta meningkatkan literasi keamanan siber di Indonesia.
Analisis Serangan Phising Dan Upaya Pencegahannya Pada Sistem Informasi Alwan, Fiqri; Pasha , Ramzi Al; Kaspandiri , Eka Prasetya; Fariz, Muhammad Dzaky Al
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.177

Abstract

Phishing attacks continue to evolve into increasingly complex cyber threats, particularly with the emergence of Generative Artificial Intelligence (GenAI) technologies capable of producing realistic fraudulent content. This study highlights the ineffectiveness of traditional blacklist-based security methods in countering dynamic attacks that exploit both technical and psychological vulnerabilities of users. The objective of this research is to analyze the technical characteristics and masquerading patterns of current phishing attacks. Using a descriptive qualitative approach, this study examines 14 active phishing URL samples from the 2024-2025 period through URL Feature Analysis. The results indicate that 80% of the samples have adopted the HTTPS protocol to manipulate user trust. Furthermore, the study identifies a dominance of typosquatting techniques and the abuse of cheap Top-Level Domains (TLDs) that often bypass standard security detection. The research concludes that effective cyber defense requires the integration of adaptive strategies, combining intelligent Machine Learning-based detection systems with comprehensive security awareness training to mitigate risks associated with human error.
Analisis Dampak Human Error Terhadap Kebocoran Data Pribadi di Kalangan Pengguna Digital Humaira, Dian; Fazlasya, Nur Aza; Alwi, Sadhi; Tafonao, Putra Harapan
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.179

Abstract

The rapid development of digital technology has increased the risk of personal data leakage, which is often caused by human error rather than system technical failures. This study aims to analyze the impact of human error, such as the use of weak passwords, clicking on phishing links, and sharing excessive information on social media, on the security of personal data. The research method used is a qualitative approach through literature review and analysis of recent data leakage cases. The results indicate that low digital literacy is the main factor contributing to human error. This study concludes that an increase in digital security awareness and education is essential to minimize the risk of data leakage caused by human factors.
Analisis Penggunaan Hash Function dan Digital Signature pada Sistem Keamanan Informasi Saika, Arya Bagas; Fauzul , Muhammad; Rafsanjani, Alif Akbar; Nasution, Rizky Hajriani; Ramadhani, Marsha
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.183

Abstract

Information security is a critical issue in the development of modern information systems due to increasing threats such as data manipulation, forgery, and unauthorized access. This study aims to analyze the use of hash functions and digital signatures as cryptographic mechanisms to ensure data integrity, authentication, and non-repudiation in information security systems. The research method used is a literature review by analyzing scientific journals related to the implementation of hash functions and digital signature algorithms in various information systems. The results show that hash functions play an important role in maintaining data integrity, while digital signatures provide assurance of authenticity and accountability of data transmission. The combination of hash functions and digital signatures is proven to significantly enhance the security of information systems and reduce the risk of data tampering and security breaches.
Implementasi Keamanan Jaringan Menggunakan Firewall dan Intrusion Detection System (IDS) pada Infrastruktur Jaringan Skala Kecil–Menengah sihombing, Ferdi Ardiansyah; Zuhra, Naila Nafisa; Zahra, Lia; Alfarisyi, Rahul; Nisa, Hidayatun; Astiyanto, Rafi Alfarsi
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.184

Abstract

Network security plays a vital role in ensuring the confidentiality, integrity, and availability of data in small- to medium-scale network infrastructures. This study aims to implement and evaluate the effectiveness of a layered network security system using a Firewall and an Intrusion Detection System (IDS). The methods employed include system design, firewall rule configuration using iptables and pfSense, deployment of IDS Snort/Suricata, traffic monitoring, and performance evaluation. The testing scenarios involve normal traffic, port scanning, brute force attempts, and simulated Distributed Denial of Service (DDoS) attacks. The results indicate that the implementation of firewall and IDS significantly enhances network protection by filtering malicious traffic, improving attack detection accuracy, and maintaining network stability. These findings suggest that the integration of firewall and IDS provides an optimal and efficient security solution for small- to medium-scale network environments.
Implementasi Steganografi Least Significant Bit (LSB) untuk Penyembunyian File dalam Gambar Digital Berbasis CustomTkinter Fernanda, Muhammad Angga; Lathifurrahman, M.; Ardhana, Adhitya Wahyu; Gea, Dedi Sukhairi
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 1 (2026): JIKUM: Jurnal Ilmu Komputer, Mei 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i1.186

Abstract

Information security has become increasingly critical in the digital era, particularly concerning confidential data protection. Steganography is a method used to hide information within digital media without arousing suspicion. This research implements the Least Significant Bit (LSB) steganography technique for embedding secret files within digital images using Python with CustomTkinter framework. The system provides an intuitive graphical user interface for encryption and decryption processes with real-time capacity validation. The LSB method works by replacing the least significant bits of image pixels with secret file bits, maintaining visual quality while securing hidden data. Testing demonstrates that the system successfully embeds and extracts various file types with capacity validation to prevent overflow errors. The system supports multiple file formats with output saved in PNG format to preserve data integrity. This implementation provides a practical solution for secure data transmission through digital images with user-friendly interface suitable for various users.