
Budi Wibowo- Master of Engineering
- Lecturer at Institut Teknologi Budi Utomo
Budi Wibowo
- Master of Engineering
- Lecturer at Institut Teknologi Budi Utomo
Security Analyst Researcher | Cyber security Enthusiast | Practitioner Lecturer
About
20
Publications
3,315
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
46
Citations
Introduction
As a practicing lecturer, I am active in scholarly research and book writing in the field of cybersecurity, bridging the worlds of practice and academia to encourage wider awareness and application of digital security.
Cybersecurity researchers who still want to learn and share.
Article : medium.com/@budi_wibowo
Current institution
Institut Teknologi Budi Utomo
Current position
- Lecturer
Additional affiliations
January 2017 - July 2019
Publications
Publications (20)
This study explores the rise of Ransomware-as-a-Service (RaaS) in Indonesia’s cybercrime ecosystem, highlighting its role as a significant digital security threat. RaaS lowers the technical barriers to executing ransomware attacks, enabling individuals with minimal expertise to launch sophisticated cyberattacks. Analyzing data from 2020 to 2024, th...
In today's digital era, server security is a top priority for many organizations. Intrusion Detection Systems (IDS) such as Fail2ban, have proven effective in protecting servers from threats by monitoring logs and blocking suspicious IP addresses. This paper discusses the implementation of Fail2ban integrated with Telegram notifications, how it wor...
Advanced Persistent Threats (APTs) pose a significant challenge in modern cybersecurity by leveraging persistent and sophisticated methods to compromise organizations. These threats employ advanced techniques such as encrypted communication, polymorphic malware, and log tampering, to evade detection, exfiltrate sensitive data, and disrupt critical...
Maraknya perjudian online telah menjadi ancaman yang signifikan terhadap keamanan digital, terutama untuk situs web pemerintah dan institusi pendidikan. Situs-situs ini, yang sering menjadi sasaran penjahat siber untuk menampung konten terkait perjudian, membuat pengguna terpapar pada berbagai risiko online. Penelitian ini menyajikan pengembangan b...
Social engineering is a psychological manipulation technique used by attackers to exploit human weaknesses in information security. This research aims to identify the challenges organizations face in protecting themselves from social engineering attacks and offer effective solutions. Through analysis of case studies and relevant literature, it was...
Feeding carp manually results in disruption of fish growth so that fish yields are not optimal. If the feed is given too much then the rest of the fish feed will become a source of bacteria. Therefore, it is necessary to design an Internetof Things (IoT)-based carp feeder monitoring sistem that can work automatically based on the time and amount of...
Broiler chickens are cattle whose growth is affected by ambient temperature. Inappropriate chicken cage temperatures can affect productivity and cause death in broiler chicken, so setting the cage temperature should be done. The design of this automatic temperature control system used the ESP32 microcontroller as the primary controller, the DHT22 a...
Cybercriminals exploit malicious URLs as a distribution channel to spread harmful software across the internet. They take advantage of vulnerabilities in browsers to install malicious software with the aim of gaining remote access to the victims' computers. Typically, this malicious software aims to gain access to networks, steal sensitive informat...
In fish farming, there is a lot of time in feeding irregularly or many farmers who have many fish aquariums but have difficulty in feeding because of the inefficiency of very little time and resulting in many fish causing stress and some fish that die. This research presents an innovation that changes the way to care for fish in an aquarium. Using...
Vannamei shrimp cultivation (Litopenaeus Vannamei) is one of the rapidly growing industries in fisheries. Optimal water quality, including the appropriate water temperature, is a crucial factor in maintaining the growth and health of vannamei shrimp. Therefore, this research aims to design and implement a monitoring and water temperature control sy...
Broiler chickens or also called broiler chickens are a type of chicken specifically designed for meat production in a relatively short time. They have fast growth and have high meat quality. Optimal temperature is very influential to achieve high productivity of broiler chickens. Broiler chicken coops require proper temperature regulation to create...
Management of bandwidth by using a proxy method of queue tree serves to implement more complex functions within the bandwidth limit on the proxy where the use of its mark packet has better functions. Used to limit one direction only connection either download or upload with proxy, administrators facilitated in setting bandwidth evenly, determine th...
Almost all residences, places of business, and restaurants use LPG gas cylinders for daily cooking. We can see nowadays the many problems caused by these gas cylinders, one of which is a fire caused by a leak in the gas cylinder. Therefore we need an appropriate technology to overcome this problem, namely a tool to detect gas leaks using sensors an...
The impact of fires causes quite large losses, often even causing fatalities. The method used in the system is monitoring the fire sensor which is used to detect a fire, the buzzer as a notification output in the form of sound, and the water pump as a fire extinguisher which will function after the fire sensor is on. detecting the presence of fire....
In the Covid-19 pandemic, wearing a mask has become the obligation of Indonesian citizen,for outdoor and indoor. Public awareness of wearing masks when leaving the house according to the government's appeal is still low. This can be seen from the many people who do not wear masks while on the public place or in other place. Technology that can help...
Storage via the cloud is very necessary which is carried out in this research can be used as a basis for research at PT. Indocode technology has a problem where the problem is that the process of storing and sharing data on storage media via the cloud can be used both on internal and external networks. Implementing cloud-based storage greatly simpl...
A very significant increase in the spread of malware has resulted in malware analysis. A recent approach to using the internet of things has been put forward by many researchers. Iot tool learning approaches as a more effective and efficient approach to dealing with malware compared to conventional approaches. At the same time, the researchers tran...
Isu strategis pengelolaan keamanan informasi pada layanan e-Government di Pemprov DKI Jakarta saat ini merupakan hal terpenting seiring dengan kejahatan siber/cyber crime yang semakin meningkat, oleh karena itu diperlukan Sistem Informasi Jaringan dan Keamanan Informasi (SIJAKI). Tujuan dari inovasi ini adalah membangun web layanan informasi melalu...
The Ball State University Libraries started using CONTENTdm for digital projects with version 3.6 in 2003. Budi Wibowo, Head of Digital Libraries and Web Services at Ball State, will discuss various projects and the associated challenges, and how they are addressed by customizing or creating new processes built around CONTENTdm. Topics will include...