The difference between learning using one sensory ability (e.g. reading text or hearing or looking at the pictures only) and two or more (e.g. reading text equipped by sound and visualized by animation; and even allows children to get involved directly in the process of learning) was that the low ability in memorizing. MESE (Multimedia in Education for Special Education) was a multimedia application developed for reading for children with intellectual disability. This research aimed to find out MESE effectiveness in learning related to reading skills and memorizing. MESE was very attractive and had interactive ability that provided opportunity to learners for independent study. The method used was SSR (Single Subject Research). The results showed that learning by using MESE application enhanced reading skill and memorizing. The analysis of the student’s worksheet of reading ability and memorizing showed positive result though several sessions showed a decline and or a stable.
The security of data and information on government’s information system required proper way of defending against threat. Security aspect can be achieved by using cryptography algorithm, applying information hiding concept, and implementing security protocol. In this research, two central facilities protocol was implemented on Research and Development Center of Mineral and Coal Technology’s Cooperation Contract Monitoring System by utilizing AES and whitespace manipulation algorithm. Adjustment on the protocol by creating several rule of validation ID’s generation and checking processes could fulfill two of four cryptography objectives, consist of authentication and non-repudiation. The solid collaboration between central legitimization agency (CLA), central tabulating facility (CTF), and client is the main idea in two central facilities protocol. The utilization of AES algorithm could defend the data on transmission from man in the middle attack scenario. On the other hand, whitespace manipulation algorithm provided data integrity aspect of the document that is uploaded to the system itself. Both of the algorithm fulfill confidentiality, data integrity, and authentication.
Serangan Siber merupakan ancaman yang serius bagi kemanan jaringan, terutama pada jaringan yang bersifat publik sehingga bisa diakses oleh siapapun dari seluruh dunia. Akibat dari serangan siber sangat berdampak besar jika sampai berhasil mengganggu suatu kinerja jaringan bahkan hingga bisa menguasainya, terutama pada jaringan yang menyediakan layanan bagi public. Seorang administrator jaringan harus siap tanggap dalam menangani setiap serangan pada server yang dikelolanya. Langkah pertama dalam mencegah serangan yang bisa mengancam suatu jaringan yaitu dengan merancang suatu sistem untuk mendeteksi dan memberikan peringatan dini akan adanya suatu serangan yang dinamakan Intruision Detection System (IDS). Aplikasi yang digunakan sebagai IDS yaitu Snort yang berfungsi untuk mendeteksi serangan berdasarkan rules yang akan dicocokan dengan signature dari serangan tersebut, dan akan disimpan ke database untuk diteruskan kepada administrator melalui aplikasi instant messaging Telegram. Telegram digunakan sebagai media untuk menyempaikan peringatan dini jika terjadi upaya serangan, sehingga administrator dapat melakukan upaya penanggulangan terhadap serangan tersebut. Untuk menanggulangi serangan yang terjadi, digunakan aplikasi Fail2Ban dan Port Scan Attack Detector (PSAD) untuk menutup akses dari IP penyerang. Hasil dari penggunaan IDS dengan notifikasi melalui bot Telegram menggunakan bahasa pemrograman PHP mampu mendeteksi serangan DoS, Port Scanning, dan SSH Bruteforce berdasar rules yang dikonfigurasi pada Snort. Berdasarkan hasil analisis respon waktu pengiriman notifikasi didapatkan hasil yaitu SSH Bruteforce 18 detik, Port Scanning 20 detik, dan DoS yaitu 30 detik.Keyword—kemanan jaringan, cloud computing, intrusion detection and prevention system (IDSP), snort, telegram, bot
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.