D4 Rekayasa Keamanan Siber
Permanent URI for this collectionhttps://repository.polibatam.ac.id/handle/PL029/1769
Browse
11 results
Search Results
Item Analisis Pengaruh Capture The Flag Jeopardy-Style Dalam Memperkenalkan Pendidikan Digital Forensik Menggunakan Metode User Experience Questionnaire(2024-06-24) Meirasari, Mudjrika; Resda, Dodi Prima; Haikal, AntoniThe importance of cybersecurity education in the digitalization era is a big concern. One of them is through the concept of gamification, which is a technique of using games by applying educational principles. Based on this, Capture The Flag (CTF) is used as a set of challenges to improve the basics of cybersecurity which includes several questions with the primary goal of finding the flag. CTF has several fields, one of which will be discussed specifically in this paper regarding the CTF Jeopardy-Style platform especially digital forensics which has been created to introduce digital forensics education especially for beginners. digital forensics is used to identify and analyze digital evidence. In the concept of CTF, participants are required to gather information, analyze files, and solve the challenge of the question using digital forensic techniques, either using tools or manually, to get flags as evidence of successful completion of the challenge. The interrelation between CTF and digital forensics provides an important foundation in the development of skills needed to fight digital crime. Additionally, UEQ is used as a tool to test the learning platform to determine if it is fulfilling the user's expectations based on their experience while playing.Item Respon Mahasiswa Pada Pemahaman Penetration Testing Melalui Gamifikasi Capture The Flag (Studi Kasus Program Studi Rekayasa Keamanan Siber Politeknik Negeri Batam)(2024-06-21) Indriani, Yunita Tri; Resda, Dodi Prima; Haikal, AntoniThe increase in cybercrime is one of the triggers for knowledge about cybersecurity. The ever-evolving cyber knowledge is the task of teachers in finding solutions on how to keep up with the knowledge that continues to evolve every time. Cybersecurity knowledge has been applied in various ways, one of which is in the form of gamification capture the flag. Gamification of capture the flag has become the choice of many students to learn the understanding of penetration testing. This solution requires the support of student responses in its implementation in the Batam State Polytechnic Cybersecurity Engineering Study Program. This study program has supported learning with capture the flag gamification and collaborated with project-based learning penetration testing so that the respondents taken meet the requirements in this study. This research aims to help teachers determine the right learning techniques and get responses related to the implementation of gamification capture the flag with an understanding of penetration testing. In this study, the method used is a quantitative method with descriptive statistical analysis with three factors analyzed, namely theoretical understanding, practical understanding, and awareness of the importance of penetration testing. The results of this study resulted in a good response from students regarding the understanding of penetration testing through gamification capture the flag, both in theoretical understanding, practical understanding, and awareness of the importance of penetration testing.Item Memory DumpAnalysis in Capture The Flag: Using Volatility 3 to Extract Hidden Files(Politeknik Negeri Batam, 2024-06-12) Yusriyah, Isnaeni Hari; Arapenta, Joy Gilbert; Tambunan, Jean Tirstan; Arif, HamdaniThe field of study that examines how to uncover, collect, analyze, and present digital evidence from electronic devices is called computer forensics. This research focuses on the analysis of memory dumps in the Capture The Flag (CTF) cybersecurity competition with the aim of uncovering hidden files that may be concealed in memory by an attacker. Conducting analysis on memory dumps is an important technique in digital forensics and security incident investigation to uncover suspicious activities and hidden evidence that is not available on storage media. The Volatility Framework is utilized as the main framework for analyzing memory dumps. The analysis process adopts the general stages of the computer forensics investigation model, including acquisition, analysis, and extraction. Various Volatility plugins and modules, such as imageinfo, pslist, cmdline, filescan, grep, and dumpfiles, are optimized to identify suspicious processes, locations of hidden files, and passwords required to open encrypted files. This research shows that the Volatility Framework is an effective memory forensics tool for extracting important information from memory dumps, including hidden files, which is highly useful in the context of cybersecurity competitions such as Capture The Flag (CTF).Item Analysis of Cyber Security Knowledge and Skills for Capture the Flag Competition(Jurnal Integrasi, 2022-04-12) Gilbert,Joy; Tirstan,Jean; ., NelmiawatiCTF (Capture The Flag) competitions have emerged as a pivotal instrument in development of cyber security education over the past six years. It is imperative to ensure that the CTF competitions continue to develop to facilitate growth of cyber security education. To achieve the desired growth, it is necessary to analyze the progress achieved in the last six years the program has been implemented. This research collects and analyzes approximately 500 CTF solutions from the CTFtime platform. From the results of this analysis, we have identified that skills and techniques are needed in each category of CTF questions. We use the results of this analysis as a reference for questions on the CTF Platform that we created during PCT (Polibatam Cyber Team) regeneration. PCT consists of a group of students from the Cyber Security Engineering study program who are prepared to be at the forefront in participating in various activities related to Cyber Security.The method we use is different from other CTFs, in thatwe use a skill-based and technique-based approach. We found that this approach was able to attract 80% of participants in solving and improving their skills in Cyber Security towards any challenges in a competitive environment.Item Analisis Kesadaran Keamanan Dengan Model Kruger & Kearney Dalam Penggunaan E-Wallet Pada Generasi Z (Gen-Z) Di Indonesia(Politeknik Negeri Batam, 2024-07-08) Nur, Muhammad Abdul Razak; Arif, HamdaniIn recent years, e-wallets, sometimes known as digital wallets, have gained popularity in Indonesia. Under all the comforts offered, patrons are exposed to a multitude of security hazards. Similar to how the human factor is crucial to cybersecurity and information, security awareness is necessary. This study used primary data to analyze variations in security awareness according to the demographic features of the 207 E-Wallet users in Indonesia who took part in an online survey. The study aimed to measure the consumers' degree of security awareness. Indonesian E-Wallet users have a generally high level of security awareness, according to the measurement results based on the Kruger and Kearney model. However, there is still room for improvement in terms of knowledge, attitudes, and behaviors regarding software, the internet, and PINs/passwords, all of which are lower than in the hardware focus area. Additionally, this survey found that the two main factors influencing Indonesian E-Wallet users' level of security awareness are age and gender (generation Z). The study's findings can be utilized to develop a variety of targeted policies or interventions aimed at raising security awareness among all Indonesian e-wallet users.Item Analisis Pengaruh Kesadaran Keamanan Siber Terhadap Perilaku Pemilihan Kata Sandi Pengguna Mobile Banking di Batam Menggunakan Metode Regresi(2024) Panjaitan, Monita Cisilia; Haikal, AntoniThis research examines the influence between cyber security awareness and password selection behavior of mobile banking users of Batam residents or residents aged 17-65 years. The method used to process the data is simple linear regression using SPSS 25. This research shows that cyber security awareness positively influences the password selection behavior of mobile banking users. With an R Square value of 0.275, the independent variable's ability to explain the dependent variable is small and limited to 27.5%. The findings from this study will help academics expand their research to include additional potential factors.Item Analisis Risiko Keamanan Informasi Berdasarkan ISO 27001 dengan Menggunakan Metodologi FMEA pada Perusahaan XYZ(2024) Abidin, Ismail Wafi Khoerul Abidin; Arif, Hamdani; Arif, HamdaniRisiko merupakan potensi yang dapat mengakibatkan kerugian atau gangguan terhadap aset atau informasi dalam suatu sistem. Penelitian ini difokuskan pada analisis risiko keamanan informasi pada perusahaan XYZ menggunakan metode FMEA dengan mengacu standar ISO 27001:2022. Adanya penelitian ini, diharapkan mampu memberikan pemahaman yang komprehensif mengenai risiko keamanan informasi dan memberikan rekomendasi untuk meningkatkan keamanan informasi perusahaan XYZ. Melalui pendekatan kualitatif dan kuantitatif, penelitian ini akan mengidentifikasi potensi risiko keamanan informasi dan mengembangkan rencana tindakan untuk mencegah atau mengurangi risiko tersebut.Item AUDIT TATA KELOLA TEKNOLOGI INFORMASI DI PT SMOE INDONESIA MENGGUNAKAN FRAMEWORK COBIT 2019(Journal of Applied Informations and Computing (JAIC), 2024-06-24) Al Mouf, Depri; Sari, Festy WindaInformation technology governance is an important part of the Company. Every Company that has implemented information technology in its activities must have good IT governance so that the company's business goals can be achieved with optimal utilization of information technology. This study examines the implementation of information technology governance at PT. SMOE Indonesia with the aim of improving information security. In this context, the information technology governance audit uses the COBIT 2019 framework. The audit was conducted to determine the domains and processes that exist at PT. SMOE Indonesia, the domains and processes used are APO13 and DSS05. The audit was conducted to determine the level of capability of each IT process running at PT. SMOE Indonesia.Item Analysis of Cyber Security Knowledge and Skills for Capture the Flag Competition(Jurnal Integrasi, 2022-04-22) Tambunan, Jean; Arapenta, Joy; ., NelmiawatiCTF (Capture The Flag) competitions have emerged as a pivotal instrument in development of cyber securityeducation over the past six years. It is imperative to ensure that the CTF competitions continue to develop tofacilitate growth of cyber security education. To achieve the desired growth, it is necessary to analyze the progressachieved in the last six years the program has been implemented. This research collects and analyzes approximately500 CTF solutions from the CTFtime platform. From the results of this analysis, we have identified that skills andtechniques are needed in each category of CTF questions. We use the results of this analysis as a reference forquestions on the CTF Platform that we created during PCT (Polibatam Cyber Team) regeneration. PCT consistsof a group of students from the Cyber Security Engineering study program who are prepared to be at the forefrontin participating in various activities related to Cyber Security. The method we use is different from other CTFs, inthat we use a skill-based and technique-based approach. We found that this approach was able to attract 80% ofparticipants in solving and improving their skills in Cyber Security towards any challenges in a competitiveenvironment.Item Analisis Sistem Keamanan Akses Fisik Ruang Perangkat Next Generation Network Berdasarkan Standar Sni 8799 Tahun 2019 Di PT.Telkom Indonesia(Politeknik Negeri Batam, 2024-07-12) Rahman, Mhd.Rafid; TRIWINARKO, ANDYPhysical security of Next Generation Network (NGN) equipment rooms at PT.Telkom Indonesia is crucial to maintain the integrity and reliability of the national telecommunications network. This study aims to analyze the current level of physical access security, observe the conditions of NGN equipment rooms, and propose improvements in accordance with the SNI 8799:2019 security standards. Through analysis and observation methodologies, it was found that while the existing physical security systems adequately protect most areas, there are vulnerabilities that need immediate attention. One such issue is the use of conventional keys at access points, which are inadequate, along with the need to increase the number of CCTV cameras to monitor critical areas more effectively. Recommended improvements include enhancing security systems with biometric technology for tighter access control, augmenting surveillance infrastructure such as CCTV, and implementing comprehensive standard regulations to ensure compliance with physical security arrangements. These steps are expected to enhance protection of NGN equipment from physical threats, ensuring optimal system performance for PT Telkom Indonesia in delivering reliable and secure telecommunications services.