Sentosa Bank Customer Encrypted Data Information System Using Micro SD
Abstract
Bank is one of the important companies both domestically and abroad. With a focus on savings and loans for financial or financial problems, Banking is able to assist the government in securing public money and assisting the community also in terms of borrowing money for business capital or other purposes. Large amounts of money storage make Banking one of the companies that are continuously monitored by parties who do not responsible, whether thieves, robbers, hackers, crackers, carding, or other malicious plans whose purpose is to take funds or use customer money stored for their personal needs. One of the crimes currently rife in banking cases is breaking into customer accounts and stealing money at ATMs by knowing the customer's account number and ATM PIN. Therefore, our group creates a security system to maintain the security of customer data, both in terms of authentication, access rights, integrity and other security factors. One way to secure customer accounts, especially Bank Sentosa customers, is to create a customer data encryption system and application login authentication system with Micro SD.
Downloads
References
[2] M. S. Hasibuan, “Keylogger pada Aspek Keamanan Komputer,” Jurnal Teknovasi: Jurnal Teknik dan Inovasi Mesin Otomotif, Komputer, Industri dan Elektronika, vol. 3, no. 1, pp. 8–15, 2018.
[3] M. Anif, S. H. W. Sasono, and M. D. Huri, “Penerapan Intrusion Detection System (IDS) dengan metode Deteksi Port Scanning pada Jaringan Komputer di Politeknik Negeri Semarang,” TELE, vol. 13, no. 1, 2015.
[4] A. Riyandi, “RANCANG BANGUN SISTEM PENGUKURAN TINGKAT KEAMANAN KOMPUTER PADA JARINGAN LAN,” eJournal Mahasiswa Akademi Telkom Jakarta (eMIT), vol. 2, no. 2, pp. 56–65, 2020.
[5] A. Riyandi, “RANCANG BANGUN SISTEM PENGUKURAN TINGKAT KEAMANAN KOMPUTER PADA JARINGAN LAN,” eJournal Mahasiswa Akademi Telkom Jakarta (eMIT), vol. 2, no. 2, pp. 56–65, 2020.
[6] H. Februariyanti and E. Zuliarso, “Rancang bangun sistem perpustakaan untuk jurnal elektronik,” Dinamik, vol. 17, no. 2, 2012.
[7] N. Suryana, “Perancangan Penggunaan Firewall dan Proxy Server untuk Membatasi Hak Akses Internet,” SUTET, vol. 8, no. 1, pp. 44–53, 2018.
[8] H. Arifin, “Kitab Suci Jaringan Komputer dan Koneksi Internet,” Yogyakarta: Mediakom, 2011.
[9] M. Anif, S. H. W. Sasono, and M. D. Huri, “Penerapan Intrusion Detection System (IDS) dengan metode Deteksi Port Scanning pada Jaringan Komputer di Politeknik Negeri Semarang,” TELE, vol. 13, no. 1, 2015.
[10] A. Riyandi, “RANCANG BANGUN SISTEM PENGUKURAN TINGKAT KEAMANAN KOMPUTER PADA JARINGAN LAN,” eJournal Mahasiswa Akademi Telkom Jakarta (eMIT), vol. 2, no. 2, pp. 56–65, 2020.
[11] V. Yasin, “Rekayasa Perangkat Lunak Berorientasi Objek,” Jakarta: Mitra Wacana Media, vol. 1, no. 1, pp. 1–332, 2012, [Online]. Available: https://www.mitrawacanamedia.com/rekayasa-perangkat-lunak-berorientasi-objek?search=Rekaya&category_id=0
[12] Z. Azmi, M. Zarlis, and V. Yasin, “Perceptron Dengan Input Citra Untuk Pengenalan Huruf Rusia,” Pros. SeNTIK STI&K, vol. 2, pp. 111–116, 2018, [Online]. Available: https://ejournal.jak-stik.ac.id/files/journals/2/articles/sentik2018/3156/3156.pdf
[13] R. Buaton, M. Zarlis, and V. Yasin, “Konsep Data Mining Dalam Implementasi,” Jakarta: Mitra Wacana Media, vol. 1, 2021, [Online]. Available: https://www.mitrawacanamedia.com/Konsep-Data-Mining-dalam-Implementasi
[14] M. Awaludin et al., “Optimization of Naïve Bayes Algorithm Parameters for Student Graduation Prediction at Universitas Dirgantara Marsekal Suryadarma,” J. Inf. Syst. Informatics Comput., vol. 6, no. 1, pp. 91–106, 2022, doi: 10.52362/jisicom.v6i1.785.
[15] H. Heriyanto, V. Yasin, and A. B. Yulianto, “Vipos application development design,” J. Eng. Technol. Comput., vol. 1, no. 1, pp. 19–31, 2022, [Online]. Available: https://journal.binainternusa.org/index.php/jetcom/article/view/3
[16] V. Yasin, “Tools Rekayasa Perangkat Lunak dalam Membuat Pemodelan Desain Menggunakan Unified Modeling Language (UML),” TRIDHARMADIMAS J. Pengabdi. Kpd. Masy. Jayakarta, vol. 1, no. 2, pp. 139–150, 2021, doi: https://doi.org/10.52362/tridharmadimas.v1i2.666.
[17] H. Hamidah, V. Yasin, R. Hartawan, and A. Z. Sianipar, “Designing a warehouse management information system:(Cases Study: PT. Fatijja Digital Indonesia),” J. Math. Technol., vol. 1, no. 2, pp. 91–103, 2022, [Online]. Available: http://journal.binainternusa.org/index.php/matech/article/view/75
[18] V. Yasin, M. Zarlis, O. S. Sitompul, and P. Sihombing, “Hierarchical Of Grid Partition (HGP) For Measuring The Similarity Of Data In Optimizing Data Accuracy,” Webology, vol. 19, no. 2, pp. 1495–1514, 2022, [Online]. Available: https://www.webology.org/abstract.php?id=1369

This work is licensed under a Creative Commons Attribution 4.0 International License.