Adityas Widjajarto's research while affiliated with Telkom University and other places

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (12)


Service Level Agreement (SLAs) Model for Disaster Recovery Center (DRC) Based on Computational Resource Model of Virtual Machine
  • Article
  • Full-text available

January 2024

·

5 Reads

Procedia Computer Science

Adityas Widjajarto

·

·

Download
Share

Fig. 2. Gambaran IPTEK Penelitian ini diharapkan dapat memberikan wawasan mendalam tentang transformasi digital dalam Pilkades di Desa Sukadana dan dapat menjadi panduan berharga bagi daerah lain yang ingin mengadopsi teknologi serupa dalam pemilihan kepala desa mereka. Fig. 2 menggambarkan konsep penelitian dan kerangka kerja yang akan kami gunakan untuk menganalisis dampak teknologi berbasis database dalam Pilkades.
From Ballots to Bytes A Digital Revolution in Village Head Elections - A Case Study from Sukadana, Indonesia

November 2023

·

135 Reads

·

3 Citations

SEIKO Journal of Management & Business

This paper explores the digital transformation of village head elections in Sukadana, Indonesia, with a focus on the implementation of database-driven technology. We examine the transition from traditional paper-based voting methods to electronic voting systems and the impact on voter participation, transparency, and the overall electoral process. We also analyze the results of this transformation, identify challenges encountered during the process, and draw lessons from this case study. Furthermore, we provide recommendations for other rural areas considering a similar digital shift. Our findings highlight a significant increase in voter participation, improved process transparency, and the potential for enhancing democracy at the village level. The success of this digital revolution in a rural context underscores the importance of a tailored approach to technology adoption in such settings, considering local needs and addressing security concerns.



Analisis Kerentanan Keamanan Terhadap Website Pemerintahan Daerah XYZ Menggunakan Penetration Testing Execution Standard (PTES) (EC00202394436)

October 2023

·

22 Reads

The rapid advancement of technology can influence every individual, organization, and even government in the accurate, effective, and efficient delivery of information. The XYZ local government is a governmental institution that serves the community in the field of trade. Information related to the XYZ regional government is directly managed by the XYZ Regional Communication and Information Office (Diskominfo), an institution specializing in technology and informatics. Diskominfo leverages technological progress to disseminate information to the community of the XYZ region, particularly those involved in trade, through their website, with the goal of facilitating the acquisition of accurate, precise, and reliable data directly. With the evolution of technology, the security of a website assumes increasing importance, as it can prevent attacks from irresponsible entities that may disrupt the system and harm the website owner. During the analysis process, the author simulates the role of an attacker to identify security vulnerabilities and weaknesses present on the XYZ local government website. This entails an analysis of security gaps aimed at determining the level of risk and confidence in the website. In the examination of security vulnerabilities, the author identifies 42 alerts, categorized into four risk levels: 9 vulnerabilities with a high-risk level, 13 with a medium-risk level, 11 with a low-risk level, and 9 with an informational risk level.


Figure 4: Information System Research Framework
Figure 5: Test DNS lookups
Security Vulnerability Analysis using Penetration Testing Execution Standard (PTES): Case Study of Government's Website

August 2023

·

559 Reads

·

16 Citations

The rapid development of technology has impacted various aspects of life, including the way individuals, organizations, and governments deliver accurate, effective, and efficient information. XYZ local government, which is responsible for serving the community in the trade field, manages its information through the Communication and Information Agency (Diskominfo) of the XYZ region. Diskominfo employs technological advancements to provide the people of the XYZ region with direct access to accurate, precise, and reliable data through their website. However, the security of the website has become a crucial aspect to prevent attacks from malicious individuals that can cause damage to the system and harm the website owner. To analyze the website's security loopholes and vulnerabilities, the author performed a simulation of an attacker. The analysis aimed to evaluate the level of risk and confidence in the website. The results showed 42 alerts categorized into four risk levels: 9 vulnerabilities with a high-risk level, 13 vulnerabilities with a medium-risk level, 11 vulnerabilities with a low-risk level, and 9 vulnerabilities with an informational-risk level.


Designing Data Centre Building Facilities Based on Humidity & Temperature Monitoring System in Hospital Using TIA-942 Standard with PPDIOO Life-Cycle Approach

December 2021

·

238 Reads

·

1 Citation

Internetworking Indonesia Journal

·

adityas widjajarto

·

R. R. Fahlevi

·

[...]

·

Information technology (IT) has been widely applied in various aspects of life, one of them through the IT implementations in hospitals to carry out administrative activities that aim to facilitate data processing and make existing operational activities run more effectively and efficiently. In this case of Muhammadiyah Sumberrejo Islamic Hospital, which requires a server room that is useful as a data center for IT management. It has a long-term plan to develop fair distribution of service in the form of the room heating, ventilation, air conditioning (HVAC) system based on humidity and temperature standard. Thus, it is necessary to design a monitoring system to align with the contextual setting and requirements. In this study, a data center for the Hospital will be designed using the standard of TIA-942 humidity and temperature while the PPDIOO Network Life-Cycle Approach method used for the development process. The result will be in accordance with the HVAC arrangement within the room.


Vulnerability and risk assessment for operating system (OS) with framework STRIDE: Comparison between VulnOS and Vulnix

September 2021

·

1,324 Reads

·

5 Citations

Indonesian Journal of Electrical Engineering and Computer Science

p> The rapid development of information technology has made security become extremely. Apart from easy access, there are also threats to vulnerabilities, with the number of cyber-attacks in 2019 showed a total of 1,494,281 around the world issued by the national cyber and crypto agency (BSSN) honeynet project. Thus, vulnerability analysis should be conducted to prepare worst case scenario by anticipating with proper strategy for responding the attacks. Actually, vulnerability is a system or design weakness that is used when an intruder executes commands, accesses unauthorized data, and carries out denial of service attacks. The study was performed using the AlienVault software as the vulnerability assessment. The results were analysed by the formula of risk estimation equal to the number of vulnerability found related to the threat. Meanwhile, threat is obtained from analysis of sample walkthroughs, as a reference for frequent exploitation. The risk estimation result indicate the 73 (seventy three) for the highest score of 5 (five) type risks identified while later on, it is used for re-analyzing based on the spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of prvilege (STRIDE) framework that indicated the network function does not accommodate the existing types of risk namely spoofing. </p


The difference of the accessed file in live migration process
System processes which uses TCP protocol in live migration
Live migration using checkpoint and restore in userspace (CRIU): Usage analysis of network, memory and CPU

April 2021

·

1,023 Reads

·

8 Citations

Bulletin of Electrical Engineering and Informatics

Currently, cloud service providers have used a variety of operational mechanisms to support the company's business processes. Therefore, the services are stored on the company's server, which presents in the form of infrastructure, platform, software, and function. There are several vulnerabilities that have been faced in the implementation such as system failure, natural disasters, human errors, or attacks from unauthorized parties. In addition, the time of unavailability of services can be minimized by doing an LM, in which many servers have been used the containers to behave like a service provider. Actually, its existence replaces the virtual machine that requires more resources although the process only can be done through docker with checkpoint and restore in userspace (CRIU). In this research, LM processes are done to the docker container using CRIU by analyzing the quality of service (QoS), memory, and CPU usage. Thus, the simulation is carried out by establishing the LM using 2 (two) different platforms through scenarios with one and three containers respectively. The performance analysis results aim to examine several indicators in comparison with the achievable result to reduce problems that occurred in the cloud service.


Fig. 4: Result of Analysis
Fig. 9. Manual and Automation CPU Usage Testing
Fig.10. Manual and Automation Memory Usage Testing
Fig.11. Manual and Automation Bandwidth Usage Testing
Configuration and Performance Management of Ansible to Deploy CMS Platform and Development of Odoo Server Automation Engine

January 2021

·

294 Reads

Internetworking Indonesia Journal

In container technology, the deployment process becomes more complicated, time-consuming, and has extensive resources, hence, there is a necessity for a faster and more practical process. A very familiar one used among IT engineers and technicians is Kubernetes. Meanwhile, the configuration management tool for deployment that widely known is Ansible, as an innovation machine that enables automation for cloud availability, configuration management, application deployment, intra-service orchestration, and other IT needs. This study analyses the performance of Ansible configuration management tools to deploy a Content Management System (CMS) platform that is WordPress and MySQL using Ubuntu 16.04 LTS as a management node and target deployment. The parameters used in this test are measured in terms of the time interval, CPU usage, memory usage, and configuration management. It also analyzed the deployment of the Ansible automation engine to develop Odoo Server using the Google Cloud Platform (GCP). The measurements of the Ansible configuration showed that nodes do not affect the time interval. On CPU usage, the more the number of nodes, the smaller the CPU usage. The memory (RAM) usage on the number of different nodes indicates that the results are unstable. Meanwhile, this study also compares the Ansible automation engine between manual and automation development.


Fig. 1 Three stages of access control.
The Development of Information System Security Operation Centre (SOC): Case Study of Auto Repair Company

December 2020

·

188 Reads

·

5 Citations

Auto repair is a series of activities that engage in the field of body repair and painting services of car and motorcycle. The ultimate goal is to provide the best service and quality standards to customers by running the proper response processes, which lead the increased customer satisfaction to be achieved. Importantly, every company required the security system and mechanism to maintain the existing system as an effort to protect and overcome problems related to data privacy, transactions and communication. This study explores the problem and challenges faced by the respected company to generate an access control matrix for logical and physical assets as well as service operation procedure. The focus primarily in the development of Security Operation Center (SOC) as the front gate of the company to offer various services to the customers. SOC is a key enabler for operators who aspire to differentiate themselves based on customer experience and demand. A successful SOC application can help operators to reduce the pressure and improve operational efficiency.


Citations (7)


... This ensures that the processes in operation are transparent and comprehensible to each functional dimension of the process flow chart and the procedures outlined within it. Phase 3, Streamlining goal is to increase the efficiency, effectiveness, and adaptability of ongoing business operations by streamlining procedures by shortening processing times, standardising procedures, or upgrading procedures [28][29][30][31][32]. Phase 4, Measurements, and controls business processes involves looking at and measuring anticipated organisational goals to influence the direction of those processes [33][34][35]. Phase 5, Continuous improvement is carried out in the stages below with the aim of achieving the implementation of the next improvement process with various processes such as changing, deleting, adding processes, and so on. [36][37][38][39][40]. ...

Reference:

Business Process Design for Gerakan Bangkit Desa in MSMEs Using E-BPI
From Ballots to Bytes A Digital Revolution in Village Head Elections - A Case Study from Sukadana, Indonesia

SEIKO Journal of Management & Business

... Advances in information [1] and communication [2] technology continue to grow over time [3]. This has led to significant changes in social [4], economic and political conditions [5]. ...

Security Vulnerability Analysis using Penetration Testing Execution Standard (PTES): Case Study of Government's Website

... This model categorizes unknown binary samples as benign files or ransomware. The evaluation utilized a personal computer with a Core i5 CPU and 12GB RAM, testing on Windows 10 (64-bit) across two distinct operating systems [30]. ...

Vulnerability and risk assessment for operating system (OS) with framework STRIDE: Comparison between VulnOS and Vulnix

Indonesian Journal of Electrical Engineering and Computer Science

... CRIU (Checkpoint Restore in Userspace, pronounced kree-oo) is a tool for checkpointing and restoring applications in GNU/Linux environments [11,9]. With CRIU, it is possible to stop an application, save the working memory on disk, and restore the state later. ...

Live migration using checkpoint and restore in userspace (CRIU): Usage analysis of network, memory and CPU

Bulletin of Electrical Engineering and Informatics

... Currently, the dangers related to digital security are increasingly real and disturbing. Valuable data and information can be easily accessed by unauthorized parties or interfered with by malicious actors [1]. According to NCSI, the condition of cyber security in Indonesia is in 84th position out of the total countries that have been audited by NCSI [2] . ...

The Development of Information System Security Operation Centre (SOC): Case Study of Auto Repair Company

... Table 3 above highlights the value of integrating digital kecerdasan into a business that places a strong emphasis on technology. This integration has several positive effects that are significant for an organization's productivity and capacity to react to the continuously changing business environment [21][22][23][24][25][26][27][28][29][30][31][32][33][34]. ...

Architecture Model of Information Technology Infrastructure based on Service Quality at Government Institution

Procedia Computer Science

... The backup and restore model in the relationship between DC and DRC that provides redundancy services for clients via the Internet (WAN) can be used to construct Cloud service parameters. The main challenge faced today by organization is how to make better use of accumulated knowledge and experience in developing the execution plan and implementation through real policy formulation, along with how to achieve optimal social impact with relatively limited public resources [44]. It is always best to have point of view derived from the network engineers and the emergency teams to avoid dropping data packets with reasonable latency, especially in the event of a disaster [45]. ...

Optimization performance management with FCAPS and ITILv3: opportunities and obstacles

Indonesian Journal of Electrical Engineering and Computer Science