Design and Build an Assessment Platform by Inserting Moodle-Based Cryptographic Methods

Penulis

  • Deden Pradeka Department of Computer Engineering, Universitas Pendidikan Indonesia
  • Anugrah Adiwilaga Department of Computer Engineering, Universitas Pendidikan Indonesia
  • Devi Aprianti Rimadhani Agustini Department of Computer Engineering, Universitas Pendidikan Indonesia
  • Adi Suheryadi Department of Informatics Engineering, Politeknik Negeri Indramayu
  • Rizki Nuriman Universitas Pendidikan Indonesia

DOI:

https://doi.org/10.25077/TEKNOSI.v9i3.2023.264-270

Kata Kunci:

Cyber Security, Cryptography, Platform Assessment, Moodle

Abstrak

The use of digital platforms in the learning process is increasing, especially in the context of assessment activities. In this context, it is essential to realize that digital platforms can be subject to attack or fraud by irresponsible parties. It is due to the presence of sensitive data and/or restricted to a limited number of authorized persons. Therefore, the protection of data and its security in using digital platforms is very important. To enhance this layer of security in data protection, cryptographic methods play a crucial role in maintaining information security. By applying cryptographic methods to learning platforms for assessment purposes, we can increase the security and integrity of the data involved in the assessment process. This research aims to produce a plugin that can be used on a Moodle-based Learning Management System (LMS). This plugin will provide an additional activity in the form of an assessment activity with an essay exam type. When this plugin is used, all questions and answers will be encrypted into text that is difficult to understand by unauthorized parties when an attack attempt occurs. In this way, the learning platform for assessment purposes can safeguard and protect data from access by irresponsible parties.

Biografi Penulis

Deden Pradeka, Department of Computer Engineering, Universitas Pendidikan Indonesia

Program Studi Teknik KomputerUniversitas Pendidikan IndonesiaJabatan Dosen

Anugrah Adiwilaga, Department of Computer Engineering, Universitas Pendidikan Indonesia

Program Studi Teknik KomputerUniversitas Pendidikan IndonesiaJabatan Dosen

Devi Aprianti Rimadhani Agustini, Department of Computer Engineering, Universitas Pendidikan Indonesia

Program Studi Teknik KomputerUniversitas Pendidikan IndonesiaJabatan Dosen

Adi Suheryadi, Department of Informatics Engineering, Politeknik Negeri Indramayu

Program Studi InformatikaPoliteknik Negeri IndramayuJabatan Dosen

Rizki Nuriman, Universitas Pendidikan Indonesia

Program Studi Teknik KomputerUniversitas Pendidikan IndonesiaMahasiswa

Referensi

[1]A. Widyasari, M. R. Widiastono, D. Sandika dan Y. Tanjung, “Fenomena Learning Loss sebagai Dampak Pendidikan di Masa Pandemi Covid-19,†BEST JOURNAL (Biology Education, Science & TEchnology), vol. 5,no. 1, pp. 297-302, 2022. [2]J. Kristiyono, “Budaya Internet: Perkembangan Teknologi Informasi Dan Komunikasi Dalam Mendukung Penggunaan Media Di Masyarakat,†Jurnal SCRIPTURA, vol. 5, no. 1, pp. 23-30, 2015. [3]G. Subroto, “Peran Dan Tantangan Tik (Internet) Dalam Pembangunan Pendidikan Indonesia,†Jurnal Teknodik, vol. 19, no. 2, pp. 119-134, 2015. [4]R. Raja dan P. C. Nagasubramani, “Impact of modern technology in education,†Journal of Applied and Advanced Research, vol. 3, no. 1, pp. S33-S35, 2018. [5]M. Siahaan, “Dampak Pandemi Covid-19 Terhadap Dunia Pendidikan,†Jurnal Kajian Ilmiah (JKI), vol. 1, no. 1, pp. 73-80, 2020. [6]R. A. Joseph dan V. Sundaram, “Cryptography and steganography–a survey,†International Journal of Computer Technology and Applications, vol. 2, no. 3, pp. 626-637, 2011. [7]W. Prayitno, “Implementasi Blended Learning Dalam Pembelajaran Pada Pendidikan Dasar Dan Menengah,†Jurnal Pendidikan, vol. 6, no. 1, 2015. [8]L. dan K. L. Dangwal, “Blended Learning: An Innovative Approach,†Universal Journal of Educational Research, vol. 5, no. 1, pp. 129-136, 2017. [9]R. Shivam dan S. Singh, “Implementation of Blended Learning in Classroom: A review paper,†International Journal of Scientific and Research Publications, vol. 5, no. 11, pp. 369-372, 2015. [10]D. Yana dan A. , “Efektivitas Penggunaan Platform Lms Sebagai Media Pembelajaran Berbasis Blended Learning Terhadap Hasil Belajar Mahasiswa,†DIMENSI, vol. 8, no. 1, pp. 1-12, 2019. [11]D. G. H. Divayana, “The Implementation of Blended Learning with Kelase Platform in the Learning of Assessment and Evaluation Course,†iJET (International Journal of Emerging Technologies in Learning), vol. 14, no. 17, pp. 114-132, 2019. [12]W. T. Atmojo, M. E. Siregar dan K. K. Audrey, “Pengenalan Cyber Security Dalam Revousi Industri 4.0 Dan Menyongsong Era Society 5.0,†dalam Prosiding PKM-CSR, Kabupaten Tangerang, 2021. [13]H. F. Aldheleai, M. U. Bokhari dan H. S. Hamatta, “User Security in E-Learning System,†dalam 2015 Fifth International Conference on Communication Systems and Network Technologies, Gwalior, 2015. [14]S. E. Prasetyo, N. Hasanah dan G. Wijaya, “Pengujian Keamanan Learning Management System TutorLMS terhadap Kerentanan Insecure Design dan Broken Access Control,†TELCOMATICS, vol. 7, no. 2, pp. 53-60, 2022. [15]G. E. Violettas, T. L. Theodorou dan G. C. Stephanides, “E-Learning Software Security ested for Security Vulnerabilities & Issues,†dalam 2013 Fourth International Conference on e-Learning" Best Practices in Management, Design and Development of e-Courses: Standards of Excellence and Creativity", 2013. [16]R. Pramudita, S. Fuada dan N. W. A. Majid, “Studi Pustaka Tentang Kerentanan Keamanan E-Learning dan Penanganannya,†JURNAL MEDIA INFORMATIKA BUDIDARMA, vol. 4, no. 2, pp. 309-317, 2020. [17]A. F. Musadat dan J. Nur, “Aplikasi Kriptografi Keamanan Data Menggunakan Algoritma Base64,†Jurnal Informatika, vol. 7, no. 2, pp. 1-5, 2018. [18]T. Lovian dan I. Fitri, “Implementasi Algoritma Base64 Sebagai Tingkat Keamanan Data Pada Website Sistem Informasi Pencatat Barang,†JURNAL MEDIA INFORMATIKA BUDIDARMA, vol. 6, no. 1, pp. 692-700, 2022. [19]R. Aulia, A. Zakir dan D. A. Purwanto, “Penerapan Kombinasi Algoritma Base64 Dan ROT47 Untuk Enkripsi Database Pasien Rumah Sakit Jiwa Prof. Dr. Muhammad Ildrem,†InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan), vol. 2, no. 2, pp. 146-151, 2018. [20]H. S. Fuada dan D. Pradeka, “Kenal Hardware: Media Pembelajaran Pengenalan Perangkat Keras Komputer Menggunakan Teknologi Augmented Reality,†Building of Informatics, Technology and Science (BITS), vol. 4, no. 1, pp. 247-255, 2022. [21]L. Andre, “20 Best LMS Software solutions of 2019,†All B2B, 21 08 2023. [Online]. Available: https://reviews.financesonline.com/p/moodle/. [Diakses 10 10 2023]. [22]M. S. Kurniawan, I. G. A. S. Putra, I. M. A. Maheswara, R. Y. M. N. Labamaking, I. M. E. Listartha dan G. A. J. Saskara, “Analisis Efektivitas Dan Efisiensi Metode Encoding Dan Decoding Algoritma Base64,†Jurnal Jitek (Jurnal Informatika Dan Teknologi Komputer), vol. 3, no. 1, pp. 24-34, 2023. [23]R. Minarni, “Implementasi Algoritma Base64 untuk Mengamankan SMS pada Smartphone,†Building of Informatics, Technology and Science (BITS), vol. 1, no. 1, pp. 28-33, 2019.

Telah diserahkan

09-11-2023

Diterima

03-01-2024

Diterbitkan

06-01-2024

Cara Mengutip

[1]
D. Pradeka, A. Adiwilaga, D. A. R. Agustini, A. Suheryadi, dan R. Nuriman, “Design and Build an Assessment Platform by Inserting Moodle-Based Cryptographic Methods”, TEKNOSI, vol. 9, no. 3, hlm. 264–270, Jan 2024.

Terbitan

Bagian

Articles

Artikel Serupa

<< < 

Anda juga bisa Mulai pencarian similarity tingkat lanjut untuk artikel ini.