Peningkatan Kesadaran Keamanan Informasi Siswa SMK Telkom Purwokerto Melalui Pelatihan Footprinting dan Reconnaissance

Main Article Content

Wahyu Adi Prabowo
Rifki Adhitama
Auliya Burhanuddin
Paradise Paradise
Khusnul Fauziah
Aufa Salsabila Nahrowi


The community service activity aims to delve into the concept of footprinting and reconnaissance in cybersecurity focusing on students at SMK Telkom Purwokerto. Guided by lecturers and students, the activity aims to enhance participants' understanding of vital early information analysis and gathering techniques in the realm of cybersecurity. Implementation methods include online learning and direct practical sessions in the classroom, enabling participants to implement these concepts. The training benefits encompass an improved understanding of system security threats, the development of technical analysis skills, and the ability to implement better protective measures. The results demonstrate active participation and an enhanced understanding of the importance of footprinting and reconnaissance in managing information security risks among the participants. There was a 90% increase in awareness after the participants underwent the training, indicating a positive impact of this activity on students' comprehension of information security. Therefore, this activity not only supports the tridharma of higher education but also strengthens the relationship between the Telkom Purwokerto Institute of Technology and the community in enhancing local cybersecurity.

Article Details



Alsmadi, I. (2023). The NICE Cyber Security Framework. In The NICE Cyber Security Framework.
Alwi, E. I., & Ilmawan, L. B. (2021). Analisis Keamanan Sistem Informasi Akademik (SIAKAD) Universitas XYZ Menggunakan Metode Vulnerability Assessment. INFORMAL: Informatics Journal, 6(3).
Dinis, B., & Serrão, C. (2014). Using PTES and open-source tools as a way to conduct external footprinting security assessments for intelligence gathering. Journal of Internet Technology and Secured Transaction, 3(3), 271–279.
Edgar, T. W., & Manz, D. O. (2017). Research Methods for Cyber Security. In Research Methods for Cyber Security.
Flores, F., Paredes, R., & Meza, F. (2016). Procedures for mitigating Cybersecurity risk in a Chilean Government Ministry. IEEE Latin America Transactions, 14(6), 2947–2950.
Ghonge, M. M., Pramanik, S., Mangrulkar, R., & Le, D. N. (2021). Cyber Security and Digital Forensics. In Cyber Security and Digital Forensics.
Lenjani, A., Dyke, S. J., Bilionis, I., Yeum, C. M., Kamiya, K., Choi, J., Liu, X., & Chowdhury, A. G. (2020). Towards fully automated post-event data collection and analysis: Pre-event and post-event information fusion. Engineering Structures, 208.
Muni, A., Sudeska, E., Crismondari, C., Jalil, M., & Bayu Rianto. (2023). OPTIMALISASI IT DALAM ERA LITERISASI DIGITAL. SWARNA: Jurnal Pengabdian Kepada Masyarakat, 2(1).
Soesanto, E., Romadhon, A., Dwi Mardika, B., & Fahmi Setiawan, M. (2023). Analisis dan Peningkatan Keamanan Cyber: Studi Kasus Ancaman dan Solusi dalam Lingkungan Digital Untuk Mengamankan Objek Vital dan File. SAMMAJIVA : Jurnal Penelitian Bisnisdan Manajemen, 1(2).
Styugin, M. (2019). Protection from reconnaissance for establishing information security systems. Information Security Journal, 28(1–2), 46–54.
Sutejo, S., Prasetijo, A. B., & Agushyban, F. (2021). The Role of Information System for Risk Management in Hospital: A Narrative Review. Jurnal Aisyah : Jurnal Ilmu Kesehatan, 6(3).
Thoyyibah, T. (2018). Evaluasi Manajemen Keamanan Informasi Menggunakan Indeks Keamanan Informasi (KAMI) berdasarkan ISO 27001:2013 Pada Pusat Informasi dan Pangkalan Data Perguruan Tinggi X. Jurnal CoreIT: Jurnal Hasil Penelitian Ilmu Komputer Dan Teknologi Informasi, 4(2), 72.