Two Factor Authentication Sistem Inventarisasi Barang dan Manajemen Dana Bantuan Operasional Sekolah Dinas Pendidikan Nasional
Abstract
Inventory of goods at large institutions is a complicated activity; one solution is to create a structured web application system that can be accessed anywhere. At the National Education Office, it is not only inventory management that is a problem but also the management of the School Operational Assistance Fund (BOS). Data security must be a priority because it involves significant funds and can be misused by irresponsible parties. This study aims to apply Two Factor Authentication to the Goods Inventory System and BOS Fund Management. The first stage is verification by the DISDIKNAS admin at each level of education. Next, a verification email will be sent to the registrant for verification. The results showed that the use of 2FA did not interfere with the performance of the web-based application or its users. The approval rate for the system is 97.4%. This research contributes to the implementation of website security and can be applied to similar systems
Downloads
References
N. Nuryati, C. M. Lasambouw, D. Djatnika, and ..., “Sistem Inventarisasi Barang Dinas Pendidikan Nasional Kuningan Jawa Barat,” JURIKOM (Jurnal …, vol. 8, no. 6, pp. 392–400, 2021, doi: 10.30865/jurikom.v8i6.3574.
G. Blokdyk, Rational Unified Process A Complete Guide, 2020 Editi. 5STARCooks, 2020.
M. Sudarma, S. Ariyani, and P. A. Wicaksana, “Implementation of the Rational Unified Process (RUP) Model in Design Planning of Sales Order Management System,” INTENSIF J. Ilm. Penelit. dan Penerapan Teknol. Sist. Inf., vol. 5, no. 2, pp. 249–265, 2021, doi: 10.29407/intensif.v5i2.15543.
Kominfo, “50 Persen Situs Pemerintah Diserang Hacker!,” Kominfo.Go.Id, p. 1, 2012. [Online]. Available: https://kominfo.go.id/content/detail/1493/50-persen-situs-pemerintah-diserang-hacker/0/berita
Can/fjr, “Situs Pemerintah Mudah Diretas, Data Warga Dijual Bebas,” cnnindonesia.com, 2021. [Online]. Available: https://www.cnnindonesia.com/teknologi/20211122123922-185-724359/bssn-ungkap-sebab-situs-pemerintah-rentan-diretas
A. Al Faqir, “Situs Pemerintah Sering Diretas, Sri Mulyani: Tingkatkan Cyber Security,” merdeka.com, 2022. [Online]. Available: https://www.merdeka.com/uang/situs-pemerintah-sering-diretas-sri-mulyani-tingkatkan-cyber-security.html
A. Q. Chen and W. Goh, Two factor authentication made easy, vol. 9114. 2015. doi: 10.1007/978-3-319-19890-3_29.
M. Stanivlav, Two-Factor Authentication. O’Reilly, 2015.
J. M. Kizza, Guide to Computer Network Security, vol. 39, no. 1. 2015. [Online]. Available: http://dx.doi.org/10.1016/j.compeleceng.2012.04.015%0Ahttp://link.springer.com/10.1007/978-1-4471-6654-2%0Ahttp://link.springer.com/10.1007/978-1-4471-6654-2
F. Alkhudhayr, S. Alfarraj, B. Aljameeli, and S. Elkhdiri, “Information Security:A Review of Information Security Issues and Techniques,” 2nd Int. Conf. Comput. Appl. Inf. Secur. ICCAIS 2019, 2019, doi: 10.1109/CAIS.2019.8769504.
N. Aviram et al., “Drown: Breaking TLS using SSLv2,” in Proceedings of the 25th USENIX Security Symposium, 2016, pp. 689–706.
“Heartbleed Bug,” 2014. https://heartbleed.com/ (accessed Jun. 22, 2022).
D. Adrian et al., “Imperfect forward secrecy: How diffie-hellman fails in practice,” in Proceedings of the ACM Conference on Computer and Communications Security, 2015, vol. 2015-Octob, pp. 5–17. doi: 10.1145/2810103.2813707.
B. Möller, T. Duong, and K. Kotowicz, “This POODLE Bites: Exploiting The SSL 3.0 Fallback,” Security Advisory, 2014. https://www.openssl.org/~bodo/ssl-poodle.pdf
B. Beurdouche et al., “A messy state of the union: Taming the composite state machines of TLS,” in Proceedings - IEEE Symposium on Security and Privacy, 2015, vol. 2015-July, pp. 535–552. doi: 10.1109/SP.2015.39.
“Apakah Bjorka Hacker atau Cuma Pengepul Data?,” cnnindonesia.com, 2022. https://www.cnnindonesia.com/teknologi/20220914154148-192-847818/apakah-bjorka-hacker-atau-cuma-pengepul-data (accessed Jun. 22, 2022).
Z. Ait and G. Illyes, “HTTPS as a ranking signal,” Google Search Central, 2014. https://developers.google.com/search/blog/2014/08/https-as-ranking-signal (accessed Jun. 22, 2022).
“Advanced sign-in security for your Google account,” 2011. https://gmail.googleblog.com/2011/02/advanced-sign-in-security-for-your.html (accessed Jun. 22, 2022).
Facebook, “Introducing Login Approvals,” 2011. https://www.facebook.com/notes/facebook-engineering/introducing-login-approvals/10150172618258920/ (accessed Jun. 22, 2022).
J. O’Leary, “Getting Started With Login Verification,” 2014. https://blog.twitter.com/2013/getting-started-login-verification.
K. Reese, T. Smith, J. Dutson, J. Armknecht, J. Cameron, and K. Seamons, “A usability study of five two-factor authentication methods,” in Proceedings of the 15th Symposium on Usable Privacy and Security, SOUPS 2019, 2019, pp. 357–370.
J. Poushter, “Mobile Fact Sheet,” 2017. [Online]. Available: http://www.pewinternet.org/fact-sheet/mobile/
I. Wigmore, “Google Authenticator.” https://play.google.com/store/search?q=google authenticator apps&c=apps (accessed Jun. 22, 2022).
Microsoft Corporation, “Microsoft Authenticator,” 2013. https://play.google.com/store/search?q=microsoft+authenticator+apps&c=apps (accessed Jun. 22, 2022).
R. Kohlman, User Acceptance Test (UAT) Planning Guide. Majik Moments, 2020.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Two Factor Authentication Sistem Inventarisasi Barang dan Manajemen Dana Bantuan Operasional Sekolah Dinas Pendidikan Nasional
Pages: 1129−1136
Copyright (c) 2022 Neneng Nuryati, Carolina Magdalena Lasambouw, Djoni Djatnika, Linda Lina Meilinda, Farida Agoes, Muhammad Rizqi Sholahuddin, Maisevli Harika

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).





















