Data Security Applications for School by Using Android

Lahmudin Sipahutar, Nursyah Handayani

Abstract


School is an agency that operates in the field of education. The school uses Microsoft Office applications to support the school system regarding the grades of students' lessons. The teacher will input student grades in the form of a report card or report on student grades in the form of numbers, while students will see the grades that have been input by the teacher in the report card or report on student grades. However, the value data in the student's report card or report has not undergone an encryption process, or in other words, it is still in plaintext form. This will certainly make it easier for unauthorized parties to read and manipulate student grade data if the grade data is still in plaintext. Therefore, some literature states that the way to solve this problem is by applying cryptography. To maintain data security and avoid data leaks, various methods can be used, one of which is by using cryptography. Cryptography is the process of hiding or coding information so that only the person a message was intended for can read it. The art of cryptography has been used to code messages for thousands of years and continues to be used in bank cards, computer passwords, and ecommerce.

Full Text:

PDF

References


[1] A. Amrulloh dan E. I. H. Ujianto, “Kriptografi Simetris Menggunakan Algoritma Vigenere Cipher,” Jurnal CoreIT, vol. 5, no. 2, hlm. 71–77, 2019.

[2] K. A. Seputra dan G. A. J. Saskara, “KRIPTOGRAFI SIMETRIS RC4 PADA TRANSAKSI ONLINE BOOKING ENGINE SYSTEM,” Jurnal Pendidikan Teknologi dan Kejuruan, vol. 17, no. 2, 2020.

[3] M. Awaludin, “Penerapan Algoritma Rc4 Pada Operasi Xor Untuk Keamanan Pesan Pada Smartphone Berbasis Web,” Jurnal Sistem Informasi Universitas Suryadarma, vol. 4, no. 1, hlm. 16–22, 2014, doi: 10.35968/jsi.v4i1.71.

[4] Y. Heriyanto, “PERANCANGAN SISTEM INFORMASI RENTAL MOBIL BERBASIS WEB PADA PT.APM RENT CAR,” vol. 2, no. 2, hlm. 64–77, 2018.

[5] T. A. Kurniawan, “Pemodelan Use Case (UML): Evaluasi Terhadap beberapa Kesalahan dalam Praktik,” JTIIK, vol. 5, no. 1, hlm. 77, Mar 2018, doi: 10.25126/jtiik.201851610.

[6] W. Ariandi, S. Widyastuti, dan L. Haris, “Implementasi Block Cipher Electronic Codebook (ECB) untuk Pengamanan Data Pegawai”.

[7] Efranda, N., Rusdiyanto, R., & Irvai, M. (2022). PERANCANGAN SISTEM INFORMASI PENGOLAHAN DATA NILAI SMPN PURWODADI BERBASIS WEB MOBILE DENGAN ENKRIPSI RC4. Jurnal Teknologi Informasi Mura, 14(1), 28-37.

[8] Hermiati, R., Asnawati, A., & Kanedi, I. (2021). Pembuatan E-Commerce Pada Raja Komputer Menggunakan Bahasa Pemrograman Php Dan Database Mysql. Jurnal Media Infotama, 17(1), 54–66. https://doi.org/10.37676/jmi.v17i1.1317

[9] Janis, J. W., Mamahit, D. J., Sugiarso, B. A., Rumagit, A. M., Elektro, T., Sam, U., & Manado, R. (2020). Rancang Bangun Aplikasi Online Sistem Pemesanan Jasa Tukang Bangunan Berbasis Lokasi. Jurnal Teknik Informatika, 15(1), 1–12. https://doi.org/10.35793/jti.15.1.2020.29023




DOI: https://doi.org/10.29040/ijcis.v6i2.232

Article Metrics

Abstract view : 15 times
PDF - 9 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License