https://proceedings.sgu.ac.id/acmit/index.php/acmit/issue/feed ACMIT Proceedings 2021-08-24T14:50:38+00:00 Eka Budiarto, S.T., M.Sc. [email protected] Open Journal Systems https://proceedings.sgu.ac.id/acmit/index.php/acmit/article/view/102 Implementation of Meltdown Attack Simulation for Cybersecurity Awareness Material 2021-07-13T15:31:55+00:00 Eka Chattra [email protected] Obrin Candra Brillyant [email protected] <p>One of the rising risk in cybersecurity is an attack on cyber physical system. Today’s computer systems has evolve through the development of processor technology, namely by the use of optimization techniques such as out-of-order execution. Using this technique, processors can improve computing system performance without sacrificing manufacture processes. However, the use of these optimization techniques has vulnerabilities, especially on Intel processors. The vulnerability is in the form of data exfiltration in the cache memory that can be exploit by an attack. Meltdown is an exploit attack that takes advantage of such vulnerabilities in modern Intel processors. This vulnerability can be used to extract data that is processed on that specific computer device using said processors, such as passwords, messages, or other credentials. In this paper, we use qualitative research which aims to describe a simulation approach with experience meltdown attack in a safe environment with applied a known meltdown attack scheme and source code to simulate the attack on an Intel Core i7 platform running Linux OS. Then we modified the source code to prove the concept that the Meltdown attack can extract data on devices using Intel processors without consent from the authorized user.</p> 2021-07-07T00:00:00+00:00 ##submission.copyrightStatement## https://proceedings.sgu.ac.id/acmit/index.php/acmit/article/view/103 Medical Gases Cylinder Risk Evaluation To Prevent Risk 2021-07-13T15:31:54+00:00 Ivan Ivan [email protected] <p>Medical gases for medical treatment, are used to give gas therapy to the patient. They are widely used in hospitals, clinics, dental clinics, homes, and other healthcare facilities. They are essential and request zero faults. Because of the impact of medical gases fault, may could someone injury or even death. The incidents of using medical gases are still founding in several countries, including Indonesia. This research paper was conducted to give a perspective of risk evaluation, so medical gases cylinder management could get attention. Normally the incidents in using medical gases are caused by human error and fraud. Human error in using medical gases could make somebody death, and fraud could make financially lost which could affect operational cost. The explanation will be shown on the risk heat map and also the risk scorecard. This is facilitating to make it easier to take a decision for the priority of risk that should be mitigated or manage.</p> 2021-07-07T00:00:00+00:00 ##submission.copyrightStatement## https://proceedings.sgu.ac.id/acmit/index.php/acmit/article/view/104 Risk Management In Protecting Banking Sensitive Information at XYZ Bank Using COBIT5 Framework 2021-07-13T15:31:21+00:00 Maulid Ibnu Adhi Purwono [email protected] <p>POJK No.18 / POJK.03 / 2016 concerning the Implementation of Risk Management for Commercial Banks is addressed to the management and board of directors of Banks to improve provisions regarding compromised customer information disclosure to the public, and breaches of customer information have led to the need for risk management practices in the use of Information Technology (IT). Risk Control Assessment (RCA) is based on the COBIT 5 framework to assess risks associated with the use of Information Technology Asset in XYZ Bank. By mapping the RCA and the provisions of POJK No.18 / POJK.03 / 2016, it can help management obtain information on the level of compliance of the Bank with provisions relating to Banking sensitive information.</p> 2021-07-07T00:00:00+00:00 ##submission.copyrightStatement## https://proceedings.sgu.ac.id/acmit/index.php/acmit/article/view/105 Analysis correlation of the Implementation Framework COBIT 5, ITIL V3 and ISO 27001 for ISO 10002 Customer satisfaction 2021-07-13T15:31:20+00:00 Marastika Wicaksono Aji Bawono [email protected] Mohammad Amin Soetomo [email protected] Thata Apriatin [email protected] <p>This study aims to determine and provide information about the corellation of COBIT 5, ITILV3 ,and ISO 27001 for customer satisfaction. This study uses a causal associative method with a quantitative approach. The population of this research is all customers of company Quota Broadband Internet. The sampling technique in this research is probability sampling technique through simple random sampling. The research sample was 135 customers. The results showed that there was an corellation of COBIT 5 (6.Customer-oriented service culture ), ITIL V3 (Service Operation 4.2 Incident management), and ISO 27001 (A.16 Information security incident management) for 10002 (3.4 customer satisfaction). The biggest influence is COBIT 5 on ISO 27001 with a T statistic of 6,960 and a P value of 0,000.</p> 2021-07-07T00:00:00+00:00 ##submission.copyrightStatement## https://proceedings.sgu.ac.id/acmit/index.php/acmit/article/view/106 Identification of Positive Clandestine Intelligence Threats In Cyber Terrorism For National Security 2021-07-13T15:31:19+00:00 Yudha Fernando [email protected] Mohammad Amin Soetomo [email protected] <p>This study is motivated by the vigilance towards the development of cyberspace technology that is so fast that it causes dependence on it in almost all fields. This condition poses a potential threat to our national resilience in various fields, especially in the national security sector. Researchers try to identify the threat of Positive Clandestin Intelligence (PCI) in the form of cyber terrorism on national security, so that it can bring stakeholders to a better level of knowledge. Theories and concepts used are related to threats, national security, positive clandestine intelligence, terrorism and cyber terrorism (CT). This study is a qualitative method and the type of research is descriptive qualitative. Interview and literature review are used in primary and secondary data collection. Data is evaluated and analyzed with an interactive analysis model. Researchers also validate by measuring the degree of accuracy between the data that occurs in the object of research with data that can be reported by researchers. This study succeeded in identifying the types of PCI CT targets, forms of PCI CT attacks, psychological motivations of PCI CT perpetrators and the position of PCI CT threats in the taxonomy of Rogers M.K.'s cybercrime behavior.</p> 2021-07-07T00:00:00+00:00 ##submission.copyrightStatement## https://proceedings.sgu.ac.id/acmit/index.php/acmit/article/view/107 The Impact of Knowledge Management on Service Quality of News Researcher in XYZ Television 2021-07-13T15:31:17+00:00 Jhoni Marcos [email protected] Mulya R. Mashudi [email protected] <p>The main objective of this research is to find out whether there is an impact of the implementation of knowledge management (KM) on the service quality of the news researcher (NR) work unit in the news divisions at XYZ Television. The positive influence of KM is expected to improve the service quality provided to news producers as users. So that it also has a positive or increasing impact on the quality of the news produced. This type of research is applied research, with experimental research methods. According to the level of exploration, this study uses a comparative method by comparing the results before and after the implementation of KM. According to the type of data, this study uses qualitative data. For this reason, a survey was conducted using a questionnaire before and after the implementation of KM to 28 news producers as respondents. These respondents were the total population of users who are received NR services. The rating scale used is a Likert scale. The statistical test used for this study used paired sample t-test using IBM SPSS 25, which tests the hypothesis whether there is a significant impact of KM implementation. This study has proven that the application of KM can improve the service quality of NR. This increase is indicated by the significance value of the service before and after the implementation of KM. So that this research is expected to contribute to the improvement of service quality in each work unit of news researchers in television media in Indonesia, especially in the news division.</p> 2021-07-07T00:00:00+00:00 ##submission.copyrightStatement## https://proceedings.sgu.ac.id/acmit/index.php/acmit/article/view/108 Free Open-Source High – Availability Solution for Java Web Application Using Tomcat And MySQL 2021-07-13T15:31:16+00:00 Dhanny Dhanny [email protected] Sandi Badiwibowo Atiim [email protected] <p>With the growth of the internet, the number of web applications is also growing. Many web applications are becoming more important to the stakeholders that they cannot afford downtime which can cause loss of revenue, loss of productivity, etc. In the past, only big organizations with deep pocket could afford implement high-availability for their web application, but nowadays there are free open-source software programs that support high-availability feature available to everyone. This research studied the feasibility of implementing high-availability for Java web application system without using commercial software. This research compared the capability of proprietary and free open-source high-availability solution for Java web application based on a simple high-availability design, where a test Java web application was deployed into the environment based on proprietary and free open-source solutions, and tested how well each solution perform when problem occurs. The result showed that the free open-source high-availability solution worked, but not as well as proprietary one. However, the proprietary high-availability solution for database did not perform well, and neither did the open-source one. This research concludes that the free open-source high-availability solution works and thus made high-availability become much more affordable, especially for individual or small organizations with budget constraints.</p> 2021-07-07T00:00:00+00:00 ##submission.copyrightStatement## https://proceedings.sgu.ac.id/acmit/index.php/acmit/article/view/115 Adatable Industrial 4.0 : An Improvement detected obsolete bushing condition on Rubber Curing Machine Industry 2021-08-24T14:50:38+00:00 admin admin [email protected] <p>dfsffdsaf</p> 2021-08-24T14:50:38+00:00 ##submission.copyrightStatement##