Nicholas, Sandy (2026) Pengembangan API Sistem Aplikasi Restoran Warmerku di PT. Badan Emas Indonesia. Project Report (Praktek Kerja Lapang dan Magang). Sandy Nicholas, Pratama Wirya Atmaja. (Unpublished)
|
Text (Cover)
22081010237.-cover.pdf Download (770kB) |
|
|
Text (Bab 1)
22081010237.-bab1.pdf Download (161kB) |
|
|
Text (Bab 2)
22081010237.-bab2.pdf Restricted to Repository staff only until 6 April 2029. Download (810kB) | Request a copy |
|
|
Text (Bab 3)
22081010237.-bab3.pdf Restricted to Repository staff only until 6 April 2029. Download (671kB) | Request a copy |
|
|
Text (Bab 4)
22081010237.-bab4.pdf Restricted to Repository staff only until 6 April 2029. Download (914kB) | Request a copy |
|
|
Text (Bab 5)
22081010237.-bab5.pdf Download (133kB) |
|
|
Text (Daftar Pustaka)
22081010237.-daftarpustaka.pdf Download (132kB) |
|
|
Text (Lampiran)
22081010237.-lampiran.pdf Restricted to Repository staff only until 6 April 2029. Download (876kB) | Request a copy |
Abstract
Technological developments in software development demand efficient, secure, and scalable application systems. This Field Work Practice aims to understand and implement Firebase API and Firebase Realtime Database in the creation and development of company application systems, especially in the aspect of communication between user interfaces, application system servers, and company databases. In addition, to ensure the reliability of program code and the functionality of application system features that have API components, a test is applied to the company's application system using the White Box Testing and Black Box Testing methods. In addition, to ensure the security of the developed enterprise application system, a classification of the company's digital assets, classification of the risk of threats and system vulnerabilities, risk mitigation planning, provision of user role-based access rights control (RBAC) policies, and implementation of risk mitigation are applied to ensure that the enterprise application system being developed can meet the company's business and operational needs. The research method used in this internship activity involves a White Box Testing approach using the Branch Coverage technique with the help of the Draw.Io application which is useful for analyzing the structure and branching coverage of the execution path in the source code of the API component program developed. This method aims to ensure that each branch of the code has been thoroughly tested to reduce the risk of logic errors in the system. In addition, Black Box Testing is carried out using the HTTP Request technique with the help of the Postman application which is useful for testing the functionality of API components according to HTTP requests sent to the server without seeing the internal structure of the code. This method aims to assess whether the API components developed have provided feedback in accordance with user expectations in various usage scenarios. In addition, the method used for information security of the company's application system is to apply security mechanisms such as authentication, authorization, encryption, data hashing, soft deletes, password validation, session management, CSRF protection, and others to provide security to the entire company application system being developed. The results obtained have shown that the Firebase API and Firebase Realtime Database can be implemented maximally and optimally to handle various needs in the company's application system. The development and implementation of API components in the company's application system such as Schema Database, Models Class, Data Class, Request Class, Controller, Action Class, Event Class, Listener Class, Resource Class, API Routes, and API Response have proven to be able to bridge between the user interface, application system server, and also the company database. Each API component developed has proven capable of extracting, manipulating, and processing company data carried out through every activity that occurs in the company's application system. In terms of IT security management, the application of information security mechanisms such as authentication, authorization, data encryption, data hashing, soft deletes, password validation, session management, CSRF protection, and other mechanisms have proven capable of providing security to the entire enterprise application system being developed, preventing the enterprise application system from unauthorized and authorized access, preventing leakage and loss of sensitive and highly confidential corporate data, even being able to prevent the enterprise application system from various hacking activities carried out by hackers. Based on the results of the tests conducted, White Box Testing with the Branch Coverage technique proves that the branching coverage of the code in the API has been tested properly and no untested execution paths were found. This shows that the system has met the quality standards in terms of programming logic and has no gaps that can cause malfunctions. Meanwhile, the results of Black Box Testing with Postman show that each API endpoint provides a response that matches the specifications, with a fairly fast response time and high data accuracy. From the results of this evaluation, it can be concluded that the use of Firebase API and Firebase Realtime Database in the company's application system can improve the efficiency, security, and scalability of the system as a whole. However, to further improve the performance of the enterprise application system, it is recommended that authorization management be further tightened with a multi-factor validation system and database query optimization be carried out to avoid bottlenecks that can slow down data access under more complex and massive usage conditions. With this approach, it is expected that the developed application system can remain efficient, secure, and able to grow flexibly according to future business needs.
| Item Type: | Monograph (Project Report (Praktek Kerja Lapang dan Magang)) | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Contributors: |
|
||||||||
| Subjects: | Q Science > QA Mathematics > QA76 Computer software Q Science > QA Mathematics > QA76.6 Computer Programming |
||||||||
| Divisions: | Faculty of Computer Science > Departemen of Informatics | ||||||||
| Depositing User: | Sandy Nicholas | ||||||||
| Date Deposited: | 07 Apr 2026 01:30 | ||||||||
| Last Modified: | 07 Apr 2026 01:30 | ||||||||
| URI: | https://repository.upnjatim.ac.id/id/eprint/50452 |
Actions (login required)
![]() |
View Item |
