cover
Contact Name
Dirja Nur Ilham
Contact Email
dirja.poltas@gmail.com
Phone
+6285261233288
Journal Mail Official
dirja.poltas@gmail.com
Editorial Address
Kampus Politeknik Aceh Selatan, Jl. Merdeka Komplek Reklamasi Pantai
Location
Kota banda aceh,
Aceh
INDONESIA
JIKUM: Jurnal Ilmu Komputer
ISSN : -     EISSN : 3090739X     DOI : https://doi.org/10.62671/jikum.v1i2
Core Subject : Science,
JIKUM: Jurnal Ilmu Komputer menerbitkan artikel dalam Bahasa Indonesia yang akan diterbitkan 2 kali setahun yaitu periode Mei dan Nopember. Penulis yang mengirimkan naskah pada JIKUM: Jurnal Ilmu Komputer harus mengikuti pedoman penulisan, fokus dan ruang lingkup jurnal, serta template jurnal. Apabila naskah yang dikirim tidak sesuai dengan ketentuan tersebut, maka artikel akan ditolak.
Articles 64 Documents
Analisis Mekanisme Pertahanan Sistem Operasi Terhadap Berbagai Variasi Virus Komputer Modern Al-Qudsyi , Habib Habsyi; Qalbi, Syifa Ul; Sofiyani , Nur Amelia; Matondang, Ahmat Fahri; Harahap, Ariifah Yaasir; Sandria, Vanes Jaya
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.222

Abstract

Evolusi ancaman siber yang pesat telah mengubah virus komputer sederhana menjadi entitas yang sangat canggih, seperti malware polimorfik dan serangan tanpa file (fileless). Penelitian ini bertujuan untuk memberikan analisis mendalam mengenai mekanisme pertahanan internal pada sistem operasi (OS) modern. Metodologi penelitian melibatkan evaluasi teknis terhadap beberapa lapis perlindungan, termasuk integritas memori, keamanan berbasis virtualisasi, dan integrasi algoritma pembelajaran mesin untuk deteksi perilaku. Hasil penelitian menunjukkan bahwa meskipun deteksi berbasis tanda tangan (signature) tradisional mulai usang, kombinasi antara keamanan berbasis perangkat keras (TPM) dan analisis heuristik dinamis menawarkan perlindungan yang kokoh terhadap eksploitasi zero-day. Penelitian ini menyimpulkan bahwa sinergi antara isolasi tingkat kernel dan kecerdasan berbasis awan (cloud) sangat penting untuk menjaga integritas sistem di era ancaman yang terus berkembang secara persisten
Pengembangan Sistem Steganografi Berbasis Web Menggunakan Metode Least Significant Bit (LSB) Fawwaz, Aiman; Rahman, Alifmulya; Akbar , Muhammad; Damanik , Rahmad Hidayah
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.223

Abstract

Concealing digital information within images has become increasingly important with the growing demand for data security in the digital era. This research develops a web-based steganography system using the Least Significant Bit (LSB) method to hide secret messages within digital images. The system is designed with a user-friendly web interface featuring two main functions: (1) "Hide Message" feature to embed secret messages into images and (2) "Extract Message" feature to extract hidden messages from stego-images. The implementation includes optional security features with password protection, enabling users to perform encoding and decoding processes without requiring specialized technical expertise. Modern web technologies are utilized to ensure accessibility, fast processing speed, and preservation of image quality after message embedding. System testing includes functionality evaluation, image quality analysis using Peak Signal-to-Noise Ratio (PSNR) and Mean Squared Error (MSE) metrics, and user experience testing. Research results demonstrate that the system successfully extracts messages with perfect accuracy ("yok kerja yok") while maintaining image visual quality. The system can be applied in secret communication applications, digital watermarking, and intellectual property protection. In conclusion, the development of this web-based steganography system provides a practical and accessible solution to protect digital information privacy through a user-friendly interface suitable for all user levels.
Implementasi Algoritma Least Significant Bit (LSB) untuk Penyembunyian Pesan Teks pada Media Citra Digital dan Audio Berbasis Python Akbar, Zulfathan; Nafis, Muhammad; Hakim, Daniel El; Faqih, Muhammad Ichsan
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.225

Abstract

Information security is a crucial aspect of modern digital data exchange. Conventional security techniques, such as cryptography, often raise suspicion from third parties due to the production of unreadable encrypted data. Therefore, steganography techniques are required to conceal the very existence of secret messages within other media. This study aims to design and build a Python-based steganography application capable of embedding text messages into PNG digital images and WAV audio formats. The method employed is the Least Significant Bit (LSB), which works by manipulating the rightmost bit of image pixel data or audio samples. The application is built using the Tkinter library for the interface, alongside Pillow and Wave for media processing. Black Box testing results indicate that the application successfully performs message encoding and decoding processes accurately without compromising data integrity. Perceptually, both visually and auditorily, the resulting steganographic media suffer no significant quality degradation, making it effective in deceiving human senses and maintaining information confidentiality.
Uji penetrasi jaringan wireless dan IoT dengan tools open - source pada lingkungan virtual Fadhillah, Hafiz; Nura, Faris An; Aurelsosa, Langlang Soeltanul Aulia; Damiri, Teuku Farhan; Subhan, Muhammad; Zayyan, Muhammad Zada
JIKUM: Jurnal Ilmu Komputer Vol. 2 No. 2 (2026): JIKUM: Jurnal Ilmu Komputer, November 2026
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jikum.v2i2.226

Abstract

Wireless network security and Internet of Things (IoT) device vulnerabilities have become critical issues in the digital era, especially with the growing reliance on smart devices in household, industrial, and urban environments. Many IoT devices and Wi-Fi networks currently in use remain susceptible to various attacks such as sniffing, spoofing, and brute-force, which can be exploited by malicious actors to steal sensitive information or gain unauthorized control of devices remotely. This study aims to conduct penetration testing on wireless systems and IoT devices within a safe and controlled virtual environment to identify potential security loopholes. The methodology involves setting up a virtual testbed using VirtualBox and the Kali Linux operating system, employing open-source tools such as Aircrack-ng, Nmap, Bettercap, and Wireshark. Attack simulations were carried out on wireless network configurations and virtual IoT devices under common scenarios such as credential theft, traffic surveillance, and denial-of-service (DoS) attempts. The test results indicate that several IoT devices remain highly vulnerable to basic attacks such as sniffing and brute-force login attempts, while wireless networks using WPA2 encryption are also exploitable under certain conditions. These findings highlight the urgent need to improve network security through stronger encryption standards, network segmentation, and device hardening. This study is expected to serve as a reference for developing open-source-based cybersecurity defense systems to protect IoT ecosystems from increasingly sophisticated threats.