Optimalisasi dan Evaluasi Keamanan pada Siakad Nobel Indonesia
DOI:
https://doi.org/10.37476/smartlock.v2i1.4087Keywords:
informationsystem, siakad, security, wiresharkAbstract
The information system is the main key in providing information at an institution or educational institution. This gives an important role to the information needs of users. Information systems are systems within organizations that have institutions in higher education, such as Siakad Nobel Indonesia. Siakad Nobel Indonesia is an Academic Information System for the Indonesian Nobel Institute of Technology and Business. Siakad can be used by lecturers and students who aim to provide academic information to students and familiarize students with accessing lectures electronically and anywhere. Siakad Nobel has administrative services such as doing krs, viewing grades, accessing materials, submitting assignments, etc. This service is used to facilitate the work of lecturers and students. This information system can be said to be a Learning Management System (LMS) because LMS can provide online teaching and learning services that are in accordance with the uses of Siakad Nobel. To serve users the system must always be safe. So testing is done to test the system. The tools used are Wireshark
References
A. I. Hidayat, Nurani, and N. I. Darwin, “SISTEM INFORMASI TERBITAN DAN PENJUALAN BUKU PADA NOBEL PRESS,” Jurnal Ilmiah Ilmu Komputer Fakultas Ilmu Komputer Universitas Al Asyariah Mandar, vol. 9, no. 1, Art. no. 1, May 2023, doi: 10.35329/jiik.v9i2.261.
R. Marpaung, “IMPLEMENTASI PADA SISTEM INFORMASI PENYIMPANAN DATA PRIBADI DENGAN METODE ENKRIPSI AES,” vol. 2, no. 11, Art. no. 11, 2022, Accessed: Jul. 05, 2023. [Online]. Available: http://uti.teknokrat.ac.id/index.php/cyberarea/article/view/274
D. Perwita, “Literasi Media Digital Mahasiswa Universitas Jenderal Soedirman,” EQUILIBRIUM : Jurnal Ilmiah Ekonomi dan Pembelajarannya, vol. 9, no. 1, Art. no. 1, Jan. 2021, doi: 10.25273/equilibrium.v9i1.8515.
M. B. Yel and M. K. Nasution, “KEAMANAN INFORMASI DATA PRIBADI PADA MEDIA SOSIAL,” Jurnal Informatika Kaputama (JIK), vol. 6, no. 1, Art. no. 1, Jan. 2022.
I. Riadi, Herman, and A. Z. Ifani, “Optimasi Keamanan Web Server terhadap Serangan Broken Authentication Menggunakan Teknologi Blockchain,” JISKA (Jurnal Informatika Sunan Kalijaga), vol. 6, no. 3, Art. no. 3, Sep. 2021, doi: 10.14421/jiska.2021.6.3.139-148.
I. Riadi, H. Herman, and A. Z. Ifani, “Prototype Pengembangan Aplikasi Login menggunakan Teknologi Blockchain,” Journal of Applied Informatics and Computing, vol. 5, no. 1, Art. no. 1, Feb. 2021, doi: 10.30871/jaic.v5i1.2411.
W. Stallings, Cryptography and network security: principles and practice, 4th ed. Upper Saddle River, N.J: Pearson/Prentice Hall, 2006.