Two Factor Authentication Sistem Inventarisasi Barang dan Manajemen Dana Bantuan Operasional Sekolah Dinas Pendidikan Nasional


  • Neneng Nuryati Politeknik Negeri Bandung, Indonesia
  • Carolina Magdalena Lasambouw Politeknik Negeri Bandung, Indonesia
  • Djoni Djatnika Politeknik Negeri Bandung, Indonesia
  • Linda Lina Meilinda Politeknik Negeri Bandung, Indonesia
  • Farida Agoes Jurusan Bahasa Inggris, Politeknik Negeri Bandung, Bandung, Indonesia, Indonesia
  • Muhammad Rizqi Sholahuddin Politeknik Negeri Bandung, Indonesia
  • Maisevli Harika * Mail Politeknik Negeri Bandung, Indonesia
  • (*) Corresponding Author
Keywords: Two Factor Authentication; Information System; DISDIKNAS; Inventory of Goods; School Operational Assistance

Abstract

Inventory of goods at large institutions is a complicated activity; one solution is to create a structured web application system that can be accessed anywhere. At the National Education Office, it is not only inventory management that is a problem but also the management of the School Operational Assistance Fund (BOS). Data security must be a priority because it involves significant funds and can be misused by irresponsible parties. This study aims to apply Two Factor Authentication to the Goods Inventory System and BOS Fund Management. The first stage is verification by the DISDIKNAS admin at each level of education. Next, a verification email will be sent to the registrant for verification. The results showed that the use of 2FA did not interfere with the performance of the web-based application or its users. The approval rate for the system is 97.4%. This research contributes to the implementation of website security and can be applied to similar systems

Downloads

Download data is not yet available.

References

N. Nuryati, C. M. Lasambouw, D. Djatnika, and ..., “Sistem Inventarisasi Barang Dinas Pendidikan Nasional Kuningan Jawa Barat,” JURIKOM (Jurnal …, vol. 8, no. 6, pp. 392–400, 2021, doi: 10.30865/jurikom.v8i6.3574.

G. Blokdyk, Rational Unified Process A Complete Guide, 2020 Editi. 5STARCooks, 2020.

M. Sudarma, S. Ariyani, and P. A. Wicaksana, “Implementation of the Rational Unified Process (RUP) Model in Design Planning of Sales Order Management System,” INTENSIF J. Ilm. Penelit. dan Penerapan Teknol. Sist. Inf., vol. 5, no. 2, pp. 249–265, 2021, doi: 10.29407/intensif.v5i2.15543.

Kominfo, “50 Persen Situs Pemerintah Diserang Hacker!,” Kominfo.Go.Id, p. 1, 2012. [Online]. Available: https://kominfo.go.id/content/detail/1493/50-persen-situs-pemerintah-diserang-hacker/0/berita

Can/fjr, “Situs Pemerintah Mudah Diretas, Data Warga Dijual Bebas,” cnnindonesia.com, 2021. [Online]. Available: https://www.cnnindonesia.com/teknologi/20211122123922-185-724359/bssn-ungkap-sebab-situs-pemerintah-rentan-diretas

A. Al Faqir, “Situs Pemerintah Sering Diretas, Sri Mulyani: Tingkatkan Cyber Security,” merdeka.com, 2022. [Online]. Available: https://www.merdeka.com/uang/situs-pemerintah-sering-diretas-sri-mulyani-tingkatkan-cyber-security.html

A. Q. Chen and W. Goh, Two factor authentication made easy, vol. 9114. 2015. doi: 10.1007/978-3-319-19890-3_29.

M. Stanivlav, Two-Factor Authentication. O’Reilly, 2015.

J. M. Kizza, Guide to Computer Network Security, vol. 39, no. 1. 2015. [Online]. Available: http://dx.doi.org/10.1016/j.compeleceng.2012.04.015%0Ahttp://link.springer.com/10.1007/978-1-4471-6654-2%0Ahttp://link.springer.com/10.1007/978-1-4471-6654-2

F. Alkhudhayr, S. Alfarraj, B. Aljameeli, and S. Elkhdiri, “Information Security:A Review of Information Security Issues and Techniques,” 2nd Int. Conf. Comput. Appl. Inf. Secur. ICCAIS 2019, 2019, doi: 10.1109/CAIS.2019.8769504.

N. Aviram et al., “Drown: Breaking TLS using SSLv2,” in Proceedings of the 25th USENIX Security Symposium, 2016, pp. 689–706.

“Heartbleed Bug,” 2014. https://heartbleed.com/ (accessed Jun. 22, 2022).

D. Adrian et al., “Imperfect forward secrecy: How diffie-hellman fails in practice,” in Proceedings of the ACM Conference on Computer and Communications Security, 2015, vol. 2015-Octob, pp. 5–17. doi: 10.1145/2810103.2813707.

B. Möller, T. Duong, and K. Kotowicz, “This POODLE Bites: Exploiting The SSL 3.0 Fallback,” Security Advisory, 2014. https://www.openssl.org/~bodo/ssl-poodle.pdf

B. Beurdouche et al., “A messy state of the union: Taming the composite state machines of TLS,” in Proceedings - IEEE Symposium on Security and Privacy, 2015, vol. 2015-July, pp. 535–552. doi: 10.1109/SP.2015.39.

“Apakah Bjorka Hacker atau Cuma Pengepul Data?,” cnnindonesia.com, 2022. https://www.cnnindonesia.com/teknologi/20220914154148-192-847818/apakah-bjorka-hacker-atau-cuma-pengepul-data (accessed Jun. 22, 2022).

Z. Ait and G. Illyes, “HTTPS as a ranking signal,” Google Search Central, 2014. https://developers.google.com/search/blog/2014/08/https-as-ranking-signal (accessed Jun. 22, 2022).

“Advanced sign-in security for your Google account,” 2011. https://gmail.googleblog.com/2011/02/advanced-sign-in-security-for-your.html (accessed Jun. 22, 2022).

Facebook, “Introducing Login Approvals,” 2011. https://www.facebook.com/notes/facebook-engineering/introducing-login-approvals/10150172618258920/ (accessed Jun. 22, 2022).

J. O’Leary, “Getting Started With Login Verification,” 2014. https://blog.twitter.com/2013/getting-started-login-verification.

K. Reese, T. Smith, J. Dutson, J. Armknecht, J. Cameron, and K. Seamons, “A usability study of five two-factor authentication methods,” in Proceedings of the 15th Symposium on Usable Privacy and Security, SOUPS 2019, 2019, pp. 357–370.

J. Poushter, “Mobile Fact Sheet,” 2017. [Online]. Available: http://www.pewinternet.org/fact-sheet/mobile/

I. Wigmore, “Google Authenticator.” https://play.google.com/store/search?q=google authenticator apps&c=apps (accessed Jun. 22, 2022).

Microsoft Corporation, “Microsoft Authenticator,” 2013. https://play.google.com/store/search?q=microsoft+authenticator+apps&c=apps (accessed Jun. 22, 2022).

R. Kohlman, User Acceptance Test (UAT) Planning Guide. Majik Moments, 2020.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Two Factor Authentication Sistem Inventarisasi Barang dan Manajemen Dana Bantuan Operasional Sekolah Dinas Pendidikan Nasional

Dimensions Badge
Article History
Submitted: 2022-09-23
Published: 2022-09-30
Abstract View: 715 times
PDF Download: 634 times
How to Cite
Nuryati, N., Lasambouw, C., Djatnika, D., Meilinda, L., Agoes, F., Sholahuddin, M., & Harika, M. (2022). Two Factor Authentication Sistem Inventarisasi Barang dan Manajemen Dana Bantuan Operasional Sekolah Dinas Pendidikan Nasional. Building of Informatics, Technology and Science (BITS), 4(2), 1129−1136. https://doi.org/10.47065/bits.v4i2.2297
Issue
Section
Articles