Penerapan Secure Coding Sebagai Cyber Security Based Pada PT. Industri Karet Deli

Penulis

  • Denny Ramahdana Universtas Pembangunan Panca Budi
  • Zuhri Ramadhan Universtas Pembangunan Panca Budi

Kata Kunci:

Secure Coding, Cyber Security, OWASP, Information Systems, PT. Deli Rubber Industry

Abstrak

Cyber security is a crucial aspect in maintaining the integrity, confidentiality, and availability of a company's information systems. PT. Industri Karet Deli, as one of the national manufacturing companies that has implemented digital systems in its operations, faces significant challenges in terms of potential cyber threats. This study aims to apply secure coding principles as the basis for strengthening cyber security systems. The methods used include identifying security vulnerabilities in the company's internal applications, evaluating the source code, and implementing secure coding practices in accordance with OWASP (Open Web Application Security Project) standards. The research results show that the systematic implementation of secure coding can reduce system vulnerabilities by up to 60% compared to before implementation. These findings emphasize the importance of integrating security from the early stages of software development to create systems that are resilient to cyber attacks. Recommendations from this study include regular training for development teams and the adoption of code review policies as part of the continuous system development process.

Unduhan

Data unduhan belum tersedia.

Referensi

J. Andress, The basics of information security: Understanding the fundamentals of InfoSec in theory and practice. Syngress, 2014.

M. Howard and S. Lipner, The security development lifecycle: A process for developing demonstrably more secure software. Microsoft Press, 2006.

F. Wadly, Z. Ramadhan, M. Muslim, and D. A. Sitompul, "Design of tidal height monitoring equipment based on the Internet of Things for the preservation of mangroves at Kurnia My Darling Beach," in Proceeding of International Conference on Artificial Intelligence, Navigation, Engineering, and Aviation Technology (ICANEAT), vol. 1, no. 1, pp. 472-476, Nov. 2024.

M. Yusuf, A. Sanny, and Z. Ramadhan, "Deposit strategy of easy wadiah savings fund at Bank Syariah Indonesia," Lead Journal of Economy and Administration, vol. 2, no. 3, pp. 125-138, 2024.

Z. Ramadhan and H. Kurniawan, "Use of a mobile-based online public complaint system in Kebun Kelapa Village," International Journal of Computer Sciences and Mathematics Engineering, vol. 2, no. 2, pp. 90-99, 2023.

F. Wadly, Z. Ramadhan, and D. A. Sitompul, "Internet of Things based tidal monitoring system at Kurnia My Darling Beach," Journal of Information Technology, Computer Science and Electrical Engineering, vol. 1, no. 3, pp. 436-443, 2024.

Z. Ramadhan, F. Wadly, and G. C. Ananda, "E-commerce application design with web-based CodeIgniter framework," Journal of Information Technology, Computer Science and Electrical Engineering, vol. 1, no. 3, pp. 96-105, 2024.

[8] Z. Ramadhan and G. C. Ananda, "Implementation of cloud computing database system in education sector for student learning in higher education," PROSIDING FAKULTAS TEKNIK DAN ILMU KOMPUTER UNIVERSITAS DHARMAWANGSA, vol. 1, no. 1, pp. 161-169, 2024.

G. McGraw, Software security: Building security in. Addison-Wesley, 2006.

OWASP Foundation, "OWASP top ten web application security risks," 2021. [Online]. Available: https://owasp.org/www-project-top-ten/. [Accessed: 16-Jun-2025].

ISO/IEC 27001:2013, Information technology – Security techniques – Information security management systems – Requirements. International Organization for Standardization, 2013.

D. Kurniawan, Keamanan jaringan dan sistem informasi. Deepublish, 2020.

A. Ramadhani and N. Fitriani, "Analisis penerapan secure coding pada aplikasi web berbasis framework Laravel," Jurnal Teknologi dan Keamanan Informasi, vol. 9, no. 2, pp. 115-123, 2022.

A. Widodo, Pengantar keamanan sistem informasi. Informatika, 2019.

Kaspersky Lab, "What is cybersecurity?" 2023. [Online]. Available: https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security. [Accessed: 16-Jun-2025].

R. A. Budi and D. Santoso, "Evaluasi keamanan aplikasi web menggunakan OWASP ZAP," Jurnal Teknik Informatika dan Sistem Informasi, vol. 7, no. 1, pp. 89-97, 2021.

OWASP Foundation, "OWASP top ten web application security risks," 2021.

M. Howard and S. Lipner, The security development lifecycle. Microsoft Press, 2006.

G. McGraw, Software security: Building security in. Addison-Wesley, 2006.

SANS Institute, "Secure coding practices checklist," 2020.

ISO/IEC 27001:2013, Information security management systems.

Unduhan

Diterbitkan

16-06-2025

Cara Mengutip

Denny Ramahdana, & Zuhri Ramadhan. (2025). Penerapan Secure Coding Sebagai Cyber Security Based Pada PT. Industri Karet Deli. Jurnal Nasional Teknologi Komputer, 5(3), 312–323. Diambil dari https://publikasi.hawari.id/index.php/jnastek/article/view/216

Terbitan

Bagian

Artikel