Many web applications in indonesia are built not based on security in mind. Most of them do not have awareness about security and it reflected on their work as the developer of the web application.…
Nowadays, the development of mobile phone has increased and popular in the world. Because of that, everybody have mobile phone for their activity. With the mobile phone we can do the activity where…
The purpose of research for this thesis is to explain the impact of a smart card system to the university. The methodologies used to draw conclusion is by analyzing the performance of similar syste…
The growth of malicious software raised over decades, all of them could bring harmful to the system. The threats growth forms viruses into network-aware worms, Trojans, DDoS agents, IRC Controlled …
The increasing of malware that are exploiting the Internet daily has become a serious threat. The manual heuristic inspection of malware analysis is no longer considered effective and efficient com…
Some companies and researches around the world have used honeypot for certain purpose. Especially in the malware research, honeypot can be used to collect malware samples. Malwares that can be coll…
The understanding and predict threats to the security of information systems become really important in order to protect critical systems. Protection against the threat of computer threats have bee…
Videos uploaded by the users need to be encoded before going to public. The encodedrnprocess reduce the video file bandwidth. To manage those new jobs created by thernusers need a scheduling algori…
E-KTP (Indonesian: Kartu Penduduk Elektronik) was introduced by IndonesianrnInterior Ministry to replace the existing identity card. With the contactless smart cardrntechnology, e-KTP obligates eve…
During the development of ?E-KTP search? web application, the programmer did notrntake security into consideration. There are no vulnerability assessments, mitigationrnstrategies and penetration te…