Journal of Applied Information, Communication and Technology最新文献

筛选
英文 中文
Improving Cyber Security of Internet Web Gateway using NIST Framework 利用NIST框架提高互联网Web网关的网络安全
Journal of Applied Information, Communication and Technology Pub Date : 2019-04-25 DOI: 10.33555/ejaict.v6i1.63
Azzam Fahmy
{"title":"Improving Cyber Security of Internet Web Gateway using NIST Framework","authors":"Azzam Fahmy","doi":"10.33555/ejaict.v6i1.63","DOIUrl":"https://doi.org/10.33555/ejaict.v6i1.63","url":null,"abstract":"The internet utilization is become more growth for every years where the cyber-attack also taking part into risk in the organization. The existing cyber security infrastructure (Web gateway) shall be  replacing to answer adequate of respond to threat, Vulnerabilities or viruses. Therefore company using NIST Framework [1] to improving Infrastructure Cyber Security thru identification of risk. The framework will help Company to identify, asses and managing cyber security risk in regards with replacing the old Web Gateway. And future outcomes of the replacement of Internet web gateway shall address the current and future profile and managed security program base on risk evaluation.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126147051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Collecting Malware in Swiss German University with Low Energy and Cost Computer 利用低能耗低成本计算机收集瑞士-德国大学恶意软件
Journal of Applied Information, Communication and Technology Pub Date : 2018-10-28 DOI: 10.33555/ejaict.v5i2.57
Mario Marcello
{"title":"Collecting Malware in Swiss German University with Low Energy and Cost Computer","authors":"Mario Marcello","doi":"10.33555/ejaict.v5i2.57","DOIUrl":"https://doi.org/10.33555/ejaict.v5i2.57","url":null,"abstract":"The malware spreads massively in Indonesia. The security in Information Technology doesn’t seem to become a top priority for Indonesian. The use of pirated software is still high, although it is the biggest threat and entrance for the malwares to attacks. This paper shows how to collect a spreading malware in a system to know the malware trends that exist. So, the owner may know the malware trends inside his system and he can countermeasure the attacks. To collect the malwares, I use the Dionaea, the honeypot to collect malware and implement it to Raspberry Pi. Raspberry Pi is a small, low cost and low energy consumption computer. By using Raspberry Pi to collect malware, we can minimize budget, save the energy and space.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131588994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strategies to Reduce Rework in Software Development on IT Organization Case Study of: PT. XYZ IT组织中减少软件开发返工的策略案例研究:PT. XYZ
Journal of Applied Information, Communication and Technology Pub Date : 2018-10-28 DOI: 10.33555/ejaict.v5i2.58
Nurul Kholis Kurniawan
{"title":"Strategies to Reduce Rework in Software Development on IT Organization Case Study of: PT. XYZ","authors":"Nurul Kholis Kurniawan","doi":"10.33555/ejaict.v5i2.58","DOIUrl":"https://doi.org/10.33555/ejaict.v5i2.58","url":null,"abstract":"Today’s world, developing an application that meets exactly the need of organizational business is getting tougher and more challenging, with the additional complexity of business flow and the increasing and diversity of the data that an organization has. In addition, the customers are more demanding than before in term of using an information system or software application and within an instant result which gives an extra pressure for those who work as an application developer. Rework of the software application tends to contain very negative impact to the company because it is impacting the cost for the organization. This paper is trying to resolve the problem that causes a lot of rework occurred in the case study provided. By finding out the root cause of the problem, the literature study is conducted in order to have some recommendations to be applied to the case study given. After having a discussion by conducting interview session with the expert, the result in form of a recommendation is then defined. As the final result, it is decided that the best and most appropriate recommendation to be applied is by implementing System Configuration Management (SCM) and the SMC tools chosen is Team Foundation Server or usually called as TFS.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114423728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gamification: Classification of the Users Based on Player Types and Motivations 游戏化:基于玩家类型和动机的用户分类
Journal of Applied Information, Communication and Technology Pub Date : 2018-10-28 DOI: 10.33555/ejaict.v5i2.48
Edwin Tunggawan
{"title":"Gamification: Classification of the Users Based on Player Types and Motivations","authors":"Edwin Tunggawan","doi":"10.33555/ejaict.v5i2.48","DOIUrl":"https://doi.org/10.33555/ejaict.v5i2.48","url":null,"abstract":"A comparison between two methods to understand the players’ behavior in games. The first one is the player types model by Richard Bartle, and the second is the motivations model by Nick Yee. It’s concluded that Yee’s model is better when the developers need a more detailed understanding on their users, while Bartle’s model is better to use when the developers need to classify the users in a quicker and simpler way.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114811561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensic Analysis of Artifacts of Giant Instant Messaging “WhatsApp” in Android Smartphone Android智能手机中巨型即时通讯软件“WhatsApp”的取证分析
Journal of Applied Information, Communication and Technology Pub Date : 2018-10-28 DOI: 10.33555/ejaict.v5i2.55
Hussein Abed Ghannam
{"title":"Forensic Analysis of Artifacts of Giant Instant Messaging “WhatsApp” in Android Smartphone","authors":"Hussein Abed Ghannam","doi":"10.33555/ejaict.v5i2.55","DOIUrl":"https://doi.org/10.33555/ejaict.v5i2.55","url":null,"abstract":"WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129644123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research of Web Real-Time Communication - the Unified Communication Platform using Node.js Signaling Server Web实时通信的研究——基于Node.js信令服务器的统一通信平台
Journal of Applied Information, Communication and Technology Pub Date : 2018-10-28 DOI: 10.33555/ejaict.v5i2.54
Florensia Unggul Damayanti
{"title":"Research of Web Real-Time Communication - the Unified Communication Platform using Node.js Signaling Server","authors":"Florensia Unggul Damayanti","doi":"10.33555/ejaict.v5i2.54","DOIUrl":"https://doi.org/10.33555/ejaict.v5i2.54","url":null,"abstract":"The way of people communicate has been changed from generation. With rapid innovation of technology and the improvement of computer technology, smartphone, tablet and etc., the traditional communication is confronted. However, unified communication born and Web Real-Time Communication as a part of the innovation of communication technology, enhance the way peoples share their thought, feeling and information, in real-time and different place. This research offers an educational foundation and applied research of WebRTC, to leverage unified communication, through WebSocket node.js as the signalling protocol. A system of web real-time communication developed at the end of research to give an understanding and view of the opportunity given by WebRTC technology, such as leverage online distance-learning with a real-time communication, healthcare video conferencing, online video conference, self-service customer care and corporate online meeting.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130753402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信