D4 Rekayasa Keamanan Siber

Permanent URI for this collectionhttps://repository.polibatam.ac.id/handle/PL029/1769

Browse

Search Results

Now showing 1 - 6 of 6
  • Item
    Analisis Pengaruh Capture The Flag Jeopardy-Style Dalam Memperkenalkan Pendidikan Digital Forensik Menggunakan Metode User Experience Questionnaire
    (2024-06-24) Meirasari, Mudjrika; Resda, Dodi Prima; Haikal, Antoni
    The importance of cybersecurity education in the digitalization era is a big concern. One of them is through the concept of gamification, which is a technique of using games by applying educational principles. Based on this, Capture The Flag (CTF) is used as a set of challenges to improve the basics of cybersecurity which includes several questions with the primary goal of finding the flag. CTF has several fields, one of which will be discussed specifically in this paper regarding the CTF Jeopardy-Style platform especially digital forensics which has been created to introduce digital forensics education especially for beginners. digital forensics is used to identify and analyze digital evidence. In the concept of CTF, participants are required to gather information, analyze files, and solve the challenge of the question using digital forensic techniques, either using tools or manually, to get flags as evidence of successful completion of the challenge. The interrelation between CTF and digital forensics provides an important foundation in the development of skills needed to fight digital crime. Additionally, UEQ is used as a tool to test the learning platform to determine if it is fulfilling the user's expectations based on their experience while playing.
  • Item
    Respon Mahasiswa Pada Pemahaman Penetration Testing Melalui Gamifikasi Capture The Flag (Studi Kasus Program Studi Rekayasa Keamanan Siber Politeknik Negeri Batam)
    (2024-06-21) Indriani, Yunita Tri; Resda, Dodi Prima; Haikal, Antoni
    The increase in cybercrime is one of the triggers for knowledge about cybersecurity. The ever-evolving cyber knowledge is the task of teachers in finding solutions on how to keep up with the knowledge that continues to evolve every time. Cybersecurity knowledge has been applied in various ways, one of which is in the form of gamification capture the flag. Gamification of capture the flag has become the choice of many students to learn the understanding of penetration testing. This solution requires the support of student responses in its implementation in the Batam State Polytechnic Cybersecurity Engineering Study Program. This study program has supported learning with capture the flag gamification and collaborated with project-based learning penetration testing so that the respondents taken meet the requirements in this study. This research aims to help teachers determine the right learning techniques and get responses related to the implementation of gamification capture the flag with an understanding of penetration testing. In this study, the method used is a quantitative method with descriptive statistical analysis with three factors analyzed, namely theoretical understanding, practical understanding, and awareness of the importance of penetration testing. The results of this study resulted in a good response from students regarding the understanding of penetration testing through gamification capture the flag, both in theoretical understanding, practical understanding, and awareness of the importance of penetration testing.
  • Item
    Memory DumpAnalysis in Capture The Flag: Using Volatility 3 to Extract Hidden Files
    (Politeknik Negeri Batam, 2024-06-12) Yusriyah, Isnaeni Hari; Arapenta, Joy Gilbert; Tambunan, Jean Tirstan; Arif, Hamdani
    The field of study that examines how to uncover, collect, analyze, and present digital evidence from electronic devices is called computer forensics. This research focuses on the analysis of memory dumps in the Capture The Flag (CTF) cybersecurity competition with the aim of uncovering hidden files that may be concealed in memory by an attacker. Conducting analysis on memory dumps is an important technique in digital forensics and security incident investigation to uncover suspicious activities and hidden evidence that is not available on storage media. The Volatility Framework is utilized as the main framework for analyzing memory dumps. The analysis process adopts the general stages of the computer forensics investigation model, including acquisition, analysis, and extraction. Various Volatility plugins and modules, such as imageinfo, pslist, cmdline, filescan, grep, and dumpfiles, are optimized to identify suspicious processes, locations of hidden files, and passwords required to open encrypted files. This research shows that the Volatility Framework is an effective memory forensics tool for extracting important information from memory dumps, including hidden files, which is highly useful in the context of cybersecurity competitions such as Capture The Flag (CTF).
  • Item
    Analysis of Cyber Security Knowledge and Skills for Capture the Flag Competition
    (Jurnal Integrasi, 2022-04-12) Gilbert,Joy; Tirstan,Jean; ., Nelmiawati
    CTF (Capture The Flag) competitions have emerged as a pivotal instrument in development of cyber security education over the past six years. It is imperative to ensure that the CTF competitions continue to develop to facilitate growth of cyber security education. To achieve the desired growth, it is necessary to analyze the progress achieved in the last six years the program has been implemented. This research collects and analyzes approximately 500 CTF solutions from the CTFtime platform. From the results of this analysis, we have identified that skills and techniques are needed in each category of CTF questions. We use the results of this analysis as a reference for questions on the CTF Platform that we created during PCT (Polibatam Cyber Team) regeneration. PCT consists of a group of students from the Cyber Security Engineering study program who are prepared to be at the forefront in participating in various activities related to Cyber Security.The method we use is different from other CTFs, in thatwe use a skill-based and technique-based approach. We found that this approach was able to attract 80% of participants in solving and improving their skills in Cyber Security towards any challenges in a competitive environment.
  • Item
    Analisis Kesadaran Keamanan Dengan Model Kruger & Kearney Dalam Penggunaan E-Wallet Pada Generasi Z (Gen-Z) Di Indonesia
    (Politeknik Negeri Batam, 2024-07-08) Nur, Muhammad Abdul Razak; Arif, Hamdani
    In recent years, e-wallets, sometimes known as digital wallets, have gained popularity in Indonesia. Under all the comforts offered, patrons are exposed to a multitude of security hazards. Similar to how the human factor is crucial to cybersecurity and information, security awareness is necessary. This study used primary data to analyze variations in security awareness according to the demographic features of the 207 E-Wallet users in Indonesia who took part in an online survey. The study aimed to measure the consumers' degree of security awareness. Indonesian E-Wallet users have a generally high level of security awareness, according to the measurement results based on the Kruger and Kearney model. However, there is still room for improvement in terms of knowledge, attitudes, and behaviors regarding software, the internet, and PINs/passwords, all of which are lower than in the hardware focus area. Additionally, this survey found that the two main factors influencing Indonesian E-Wallet users' level of security awareness are age and gender (generation Z). The study's findings can be utilized to develop a variety of targeted policies or interventions aimed at raising security awareness among all Indonesian e-wallet users.
  • Item
    ANALISIS PENERAPAN FITUR UNIFIED THREAT MANAGEMENT (UTM) FORTIGATE SEBAGAI FIREWALL UNTUK MENINGKATKAN KINERJA JARINGAN DENGAN PEMBATASAN AKSES APLIKASI SOSIAL MEDIA DAN PLATFORM STREAMING PADA PT. SANIPAK INDONESIA
    (Politeknik Negeri Batam, 2024-06-10) Hastuti, Dessy Nur; Triwinarko, Andy
    In the era of open internet connectivity, enterprises are faced with increasing security threats in the digital world. Therefore, protecting sensitive data and network performance are top priorities to achieve optimal operational performance. By implementing policies to restrict access to social media applications and streaming platforms, companies can strengthen defenses against cyber attacks such as phishing and optimize network infrastructure performance more effectively. This research uses the features provided by Fortigate 80F to block unauthorized applications and streaming platforms, as well as to perform real-time network traffic monitoring. Network performance is measured by applying Quality of Service (QoS) calculations that include throughput, packet loss, and delay parameters, which use TIPHON standards. The results of the research conducted at PT Sanipak Indonesia show that network security has been successfully improved by blocking phishing activities and network performance has also improved significantly, as evidenced by reaching index 4 on the TIPHON scale which indicates a high level of satisfaction.