Sienna

The Journal of Information Systems and Technology (SIENNA) has been published by the Faculty of Engineering and Computer Science (FTIK), University of Muhammadiyah Kotabumi (UMKO) since July 2020. SIENNA contains manuscripts of research results in the fields of Information Systems, Information Technology, and Computer Science. SIENNA (P-ISSN: 2745-987X and E-ISSN: 2745-9861) is committed to publishing quality articles in Indonesian so that they can become the main reference for researchers in the fields of Informa... Readmore

The Journal of Information Systems and Technology (SIENNA) has been published by the Faculty of Engineering and Computer Science (FTIK), University of Muhammadiyah Kotabumi (UMKO) since July 2020. SIENNA contains manuscripts of research results in the fields of Information Systems, Information Technology, and Computer Science. SIENNA (P-ISSN: 2745-987X and E-ISSN: 2745-9861) is committed to publishing quality articles in Indonesian so that they can become the main reference for researchers in the fields of Information Systems, Information Technology and Computer Science.

ISSN
2745-987X (printed) | 2745-9861 (online)
Published
2022-07-30

Articles

MENERAPKAN KERANGKA KERJA COBIT 5 (DOMAIN EDM) PADA ANALISA TATA KELOLA SISTEM INFORMASI UNIVERSITAS MUHAMMADIYAH KOTABUMI

Abstrak: Teknologi informasi ialah bagian dari suatu sistem yang selalu bertumbuh sesuai dengan keperluan. Penggunaannya dalam kehidupan tiap hari menunjang bermacam peranan manusia, serta mempermudah seluruh kegiatan untuk semua pemakainya. Sistem merupakan suatu himpunan yang sama- sama berkaitan untuk mewujudkan satu kesatuan yang utuh. Sistem mengelola seluruh entitas dalam organisasi. Dengan terdapatnya sistem seluruh profesi bisa dikelola dengan baik, dengan begitu tata kelola jadi sangat berguna sebagai bagian dari manajemen sistem. Tata kelola TI ialah bagian dari tanggung jawab untuk membuat suatu gagasan atau ketentuan dalam sebuah perusahaan yang akan mendorong penggunaan teknologi informasi secara kontinu. Dalam penyusunan ini, kerangka kerja yang dipakai adalah COBIT 5 sebagai prosedur riset. COBIT 5 memakai prinsip, penerapan, perlengkapan, serta model analitis yang mengkombinasikan inovasi terkini dalam manajemen perusahaan serta teknologi manajemen, yang mempunyai standar kelas dunia guna menunjang peningkatkan kepercayaan serta nilai sistem informasi. Universitas Muhammadiyah Kotabumi sekarang belum mengaplikasikan tata kelola dengan memanfaatkan COBIT 5 pada sistem yang ada saat ini. Tujuan penggunaan COBIT 5 dalam riset ini yaitu untuk memberikan hasil berupa penyusunan prasarana TI yang bisa membantu meningkatkan, menentukan nilai kapasitas sistem dalam organisasi, serta mewujudkan sistem di UMKO lebih maksimal dalam penggunaannya, dan bisa menjadi inovasi untuk kedepannya, penggunaan COBIT 5 akan menyempurnakan sistem serta menunjang Universitas Muhammadiyah Kotabumi mencapai visi serta misinya.

PENENTUAN PENERIMA BANTUAN BEDAH RUMAH MENGGUNAKAN METODE SIMPLE ADDITIVE WEIGHTING (SAW) DAN TECHNIQUE FOR OTHERS REFERENCES BY SIMILARITY TO IDEAL SOLUTION (TOPSIS)

Bantuan bedah rumah pada Kelurahan Kampung Kaliawi Waykanan di mulai dari tiap-tiap RT, Selama ini lurah yang menentukan berhak dan tidaknya keluarga untuk mendapatkan bantuan bedah rumah sehingga proses penyeleksian ini berjalan sangat lambat dan dinilai kurang efektif. Metode yang digunakan dalam pengambilan keputusan adalah metode kombinasi Simple Additive Weighting (SAW) digunakan untuk mencari nilai matrik ternormalisasi R untuk setiap atribut, kemudian dilanjutkan dengan metode Technique For Others Refrences By Simillarity To Ideal Solution (TOPSIS) Hasil dari sistem pendukung keputusan penerimaan siswa baru pada Kelurahan Kampung Kaliawi Technique For Others Refrences By Simillarity To Ideal Solution digunakan untuk mencari nilai perankingan dengan 30 sampel calon warga kuputusan dengan hasil keputusan  >60 layak dan <60 tidak layak

Deteksi dan Mitigasi Serangan Backdoor Menggunakan Python Watchdog

The number of cyber attacks is increasing. This happens thoroughly, both at the international and national levels. Technology, techniques, and methods of carrying out cyber attacks are also increasingly sophisticated and up-to-date. Responding to this phenomenon, this research was conducted to implement an application for detecting and mitigating backdoor-based attacks using Python Watchdog. The method used in this study is the experimental method. This research is a case study of backdoor attacks that have been experienced by Universitas Muhammadiyah Kotabumi. In August – December 2021, one of the servers owned by Universitas Muhammadiyah Kotabumi received a significant backdoor-based attack. This research implements Python Watchdog to detect foreign files that are indicated as a backdoor, then sends notifications. Referring to the notification, the administrator can take further action. Based on the research that has been done, Python Watchdog is proven to overcome backdoor attacks. Once Python Watchdog is enabled, backdoor attacks are no longer possible.

IMPLEMENTASI MANAJEMEN BANDWIDTH MENGGUNAKAN QUEUE TREE ROUTER MIKROTIK

The development of information technology is currently developing very quickly, both software and hardware, in line with the needs of modern humans. The internet is one of the information technologies that has had a tremendous impact on many aspects of human life. with equipment and software for bandwidth management, computer networks can function properly. The world of education, government and private agencies, and all jobs in general require bandwidth management with Mikrotik routers to help overcome traffic congestion that can disrupt computer network connections. because computer networks can go down or have problems because there is no equal distribution of bandwidth for each user, therefore it is necessary to make large bandwidth distribution arrangements, with the aim of achieving optimal bandwidth capacity for each user. Other factors can also affect network throughput, such as packet loss, certain network protocols, and device networks. Queue trees can provide limits for specific IP addresses, subnets, protocols, ports, and other parameters. Queue trees limit peer-to-pee traffic. Prioritize some flow packets over others. Queue tree can be configured for download and upload traffic so web browsing can be faster. Apply different limits based on time. And share available traffic among users equally or depending on channel load. Function per queue connection. PCQ is one of the functions used for bandwidth management to improve system performance.

PENERAPAN FUZZY INFERENCE SYSTEM DENGAN METODE FUZZY TSUKAMOTO PADA SISTEM PENDUKUNG KEPUTUSAN PENERIMAAN KARYAWAN

Companies must pay attention to the criteria or standards that have been set to improve the quality of employee recruitment. however, atl PT. Sinarl Sosro KPBl Palembang, hiring is stilll subjective and can only be seen from the test results. lTherefore, itl is necessaryl to create al decision supportl system usingl the Tsukamotol fuzzy methodl which canl assist decisionl makers inl obtaining informationl for selecting prospectivel employees. The system development methodl used means Prototype. Thel programming languagel used isl Hypertext Preprocessorl (lPHP), andl the databasel uses lMySQL, and thel testing methodl uses Blackboxl testing.

Indexer Sites