ANALISIS KEAMANAN SISTEM INFORMASI UNTUK MENGETAHUI KERENTANAN KEAMANAN SERVER DENGAN METODE PENETRATION TESTING EXECUTION STANDARD (PTES) PADA UNIVERSITAS VWX
Server security is indispensable as well as prevention of information theft measures. This aspect is often ignored by some agencies, especially in universities because they already feel secure with the security conditions of the server network and consider the existing problems have not interfered w...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
2021-07-21.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | repoupnvj_11219 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Alvita Izana Kusumarini, . |e author |
245 | 0 | 0 | |a ANALISIS KEAMANAN SISTEM INFORMASI UNTUK MENGETAHUI KERENTANAN KEAMANAN SERVER DENGAN METODE PENETRATION TESTING EXECUTION STANDARD (PTES) PADA UNIVERSITAS VWX |
260 | |c 2021-07-21. | ||
500 | |a http://repository.upnvj.ac.id/11219/1/ABSTRAK.pdf | ||
500 | |a http://repository.upnvj.ac.id/11219/10/AWAL.pdf | ||
500 | |a http://repository.upnvj.ac.id/11219/11/BAB%201.pdf | ||
500 | |a http://repository.upnvj.ac.id/11219/12/BAB%202.pdf | ||
500 | |a http://repository.upnvj.ac.id/11219/13/BAB%203.pdf | ||
500 | |a http://repository.upnvj.ac.id/11219/14/BAB%204.pdf | ||
500 | |a http://repository.upnvj.ac.id/11219/15/BAB%205.pdf | ||
500 | |a http://repository.upnvj.ac.id/11219/16/DAFTAR%20PUSTAKA.pdf | ||
500 | |a http://repository.upnvj.ac.id/11219/17/RIWAYAT%20HIDUP.pdf | ||
500 | |a http://repository.upnvj.ac.id/11219/20/LAMPIRAN.pdf | ||
500 | |a http://repository.upnvj.ac.id/11219/19/ARTIKEL%20KI.pdf | ||
520 | |a Server security is indispensable as well as prevention of information theft measures. This aspect is often ignored by some agencies, especially in universities because they already feel secure with the security conditions of the server network and consider the existing problems have not interfered with work activities by installing antivirus or firewall on the server. There are still many universities that still have not tightened the security of information on servers. Therefore, penetration testing is necessary to determine vulnerabilities in the server by using PTES (Penetration Testing Execution Standard) method to become standard in analyzing information security systems in finding security gaps in an agency in this case, namely employee data server at VWX University where in this study found vulnerabilities in the form of Cross Site Tracing (XST), Sensitive Data Exposure, Password Guessing, DDoS Attack, and Sniffing activities that can be done on the server for exploitation. | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
690 | |a Q Science (General) | ||
690 | |a QA75 Electronic computers. Computer science | ||
655 | 7 | |a Thesis |2 local | |
655 | 7 | |a NonPeerReviewed |2 local | |
787 | 0 | |n http://repository.upnvj.ac.id/11219/ | |
787 | 0 | |n http://repository.upnvj.ac.id | |
856 | 4 | 1 | |u http://repository.upnvj.ac.id/11219/ |z Link Metadata |