{"title":"Improving Cyber Security of Internet Web Gateway using NIST Framework","authors":"Azzam Fahmy","doi":"10.33555/ejaict.v6i1.63","DOIUrl":"https://doi.org/10.33555/ejaict.v6i1.63","url":null,"abstract":"The internet utilization is become more growth for every years where the cyber-attack also taking part into risk in the organization. The existing cyber security infrastructure (Web gateway) shall be replacing to answer adequate of respond to threat, Vulnerabilities or viruses. Therefore company using NIST Framework [1] to improving Infrastructure Cyber Security thru identification of risk. The framework will help Company to identify, asses and managing cyber security risk in regards with replacing the old Web Gateway. And future outcomes of the replacement of Internet web gateway shall address the current and future profile and managed security program base on risk evaluation.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126147051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collecting Malware in Swiss German University with Low Energy and Cost Computer","authors":"Mario Marcello","doi":"10.33555/ejaict.v5i2.57","DOIUrl":"https://doi.org/10.33555/ejaict.v5i2.57","url":null,"abstract":"The malware spreads massively in Indonesia. The security in Information Technology doesn’t seem to become a top priority for Indonesian. The use of pirated software is still high, although it is the biggest threat and entrance for the malwares to attacks. This paper shows how to collect a spreading malware in a system to know the malware trends that exist. So, the owner may know the malware trends inside his system and he can countermeasure the attacks. To collect the malwares, I use the Dionaea, the honeypot to collect malware and implement it to Raspberry Pi. Raspberry Pi is a small, low cost and low energy consumption computer. By using Raspberry Pi to collect malware, we can minimize budget, save the energy and space.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131588994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strategies to Reduce Rework in Software Development on IT Organization Case Study of: PT. XYZ","authors":"Nurul Kholis Kurniawan","doi":"10.33555/ejaict.v5i2.58","DOIUrl":"https://doi.org/10.33555/ejaict.v5i2.58","url":null,"abstract":"Today’s world, developing an application that meets exactly the need of organizational business is getting tougher and more challenging, with the additional complexity of business flow and the increasing and diversity of the data that an organization has. In addition, the customers are more demanding than before in term of using an information system or software application and within an instant result which gives an extra pressure for those who work as an application developer. Rework of the software application tends to contain very negative impact to the company because it is impacting the cost for the organization. This paper is trying to resolve the problem that causes a lot of rework occurred in the case study provided. By finding out the root cause of the problem, the literature study is conducted in order to have some recommendations to be applied to the case study given. After having a discussion by conducting interview session with the expert, the result in form of a recommendation is then defined. As the final result, it is decided that the best and most appropriate recommendation to be applied is by implementing System Configuration Management (SCM) and the SMC tools chosen is Team Foundation Server or usually called as TFS.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114423728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gamification: Classification of the Users Based on Player Types and Motivations","authors":"Edwin Tunggawan","doi":"10.33555/ejaict.v5i2.48","DOIUrl":"https://doi.org/10.33555/ejaict.v5i2.48","url":null,"abstract":"A comparison between two methods to understand the players’ behavior in games. The first one is the player types model by Richard Bartle, and the second is the motivations model by Nick Yee. It’s concluded that Yee’s model is better when the developers need a more detailed understanding on their users, while Bartle’s model is better to use when the developers need to classify the users in a quicker and simpler way.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114811561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forensic Analysis of Artifacts of Giant Instant Messaging “WhatsApp” in Android Smartphone","authors":"Hussein Abed Ghannam","doi":"10.33555/ejaict.v5i2.55","DOIUrl":"https://doi.org/10.33555/ejaict.v5i2.55","url":null,"abstract":"WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129644123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Web Real-Time Communication - the Unified Communication Platform using Node.js Signaling Server","authors":"Florensia Unggul Damayanti","doi":"10.33555/ejaict.v5i2.54","DOIUrl":"https://doi.org/10.33555/ejaict.v5i2.54","url":null,"abstract":"The way of people communicate has been changed from generation. With rapid innovation of technology and the improvement of computer technology, smartphone, tablet and etc., the traditional communication is confronted. However, unified communication born and Web Real-Time Communication as a part of the innovation of communication technology, enhance the way peoples share their thought, feeling and information, in real-time and different place. This research offers an educational foundation and applied research of WebRTC, to leverage unified communication, through WebSocket node.js as the signalling protocol. A system of web real-time communication developed at the end of research to give an understanding and view of the opportunity given by WebRTC technology, such as leverage online distance-learning with a real-time communication, healthcare video conferencing, online video conference, self-service customer care and corporate online meeting.","PeriodicalId":144274,"journal":{"name":"Journal of Applied Information, Communication and Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130753402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}