Mencegah Exploit URL Pada Model Business to Customer Pada Toko Citra Ponsel Ketapang

Doni Muliawan, Ria Risti Astanti

Abstract


 Website security is one important thing in designing a website. But there are still many website developers who are not careful in increasing the security of their websites. The vulnerability in the computer world is a weakness of the program / infrastructure that allows system exploitation. The research aims to build a prevention system for URL exploitation by applying the base64 algorithm. Base64 is a general term for a number of similar coding schemes that encode binary data and translate it into base 64 representations. The Base64 coding scheme is usually used when there is a need to encode binary data that needs to be stored and transferred through media designed to handle textual data. The design method uses Rapid Application Development (RAD), which is a system development strategy that emphasizes speed through user involvement. Data collection uses interview techniques that involve the use of recorders for recording and observing operational and business processes. Object-oriented modeling namely Unified Modeling Language (UML). In the development phase of the URL Exploit system the Business to Customer Model directly involves the store management to formulate the needs of business owners as product providers. The choice of a suitable software model for use in an organization is very important for the success of the project. The results of this study are a B2C system that applies the base64 algorithm to prevent URL exploits

Keywords


Base64 algorithm; B2C; exploit URL

Full Text:

PDF

References


Gultom, L. M., & Harahap, M. (2018). Analisis Celah Keamanan Website Instansi Pemerintahan di Sumatera Utara. Jurnal Teknovasi: Jurnal Teknik dan Inovasi, 2(2), 1-7.

Maharani, M. Z., Andrian, H. R., & Ismail, S. J. I. (2017). Analisis Keamanan Website Menggunakan Metode Scanning Dan Perhitungan Security Metriks. eProceedings of Applied Science, 3(3).

Suartana, I., Indriyani, T., & Mardiyanto, B. (2016). Analisis Dan Implementasi Honeypot Dalam Mendeteksi Serangan Distributed Denial-Of-Services (DDOS) Pada Jaringan Wireless. INTEGER: Journal of Information Technology, 1(2).

Purwanto, T. D., & Wijaya, A. (2017). EVALUASI APLIKASI EXPLOID WIFI DI TINGKAT AVAILABILITY DAN VULNERABILITY. Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer, 8(2), 801-806.

Gat. (2018). Mencegah Exploit URL Website Sensitek STMIK Pontianak Dengan Algoritma Blowfish. Voice of Informatics, 7(2), 55-66.

Gunadhi, E., & Nugraha, A. P. (2016). PENERAPAN KRIPTOGRAFI BASE64 UNTUK KEAMANAN URL (UNIFORM RESOURCE LOCATOR) WEBSITE DARI SERANGAN SQL INJECTION. Jurnal Algoritma, 13(1), pp. 491-498.

Gat. (2018). Adopsi Model Business to Consumer (B2C) Dalam Menghasilkan Sistem Mobile Marketplace. Cogito Smart Journal, 4(1), 200-212.

Muslihudin, M., & Listiarini, M. (2017). Perancangan Aplikasi Business Berbasis Business to Consumer (B2C) Pada Wisata Kuliner Khas Lampung. Jurnal Keuangan dan Bisnis, 15(1), 54-69.

J. L. Whitten, L. D. Bentley, & K. C. Dittman, Systems Analysis and Design Methods: Sixth Edition, New York: McGraw-Hill/Irwin, 2004.

A. I. Khan, R. J. Qurashi, & U. A. Khan, ”A comprehensive study of commonly practiced heavy and light weight software methodologies”, IJCSI International Journal of Computer Science Issues, vol. 8, no. 2, p. 144-450, July 2011.




DOI: http://dx.doi.org/10.30700/.v1i1.789

Article Metrics

Abstract view : 0 times
PDF - 0 times