PENGUJIAN CELAH KEAMANAN UNTUK MENGETAHUIKERENTANAN KEAMANAN JARINGAN WIRELESSDENGAN METODE PENETRATION TESTING EXECUTIONSTANDARD (PTES) PADA PT. QWE

Wireless network security is necessary for the protection and prevention of criminal acts of information theft. This aspect is often ignored by every agency because it assumes that a wireless network is always considered safe because every agency will feel safe if the problem does not interfere with...

Full description

Saved in:
Bibliographic Details
Main Author: Rulli Azani Akbar, (Author)
Format: Book
Published: 2022-07-18.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repoupnvj_19768
042 |a dc 
100 1 0 |a Rulli Azani Akbar, .  |e author 
245 0 0 |a PENGUJIAN CELAH KEAMANAN UNTUK MENGETAHUIKERENTANAN KEAMANAN JARINGAN WIRELESSDENGAN METODE PENETRATION TESTING EXECUTIONSTANDARD (PTES) PADA PT. QWE 
260 |c 2022-07-18. 
500 |a http://repository.upnvj.ac.id/19768/13/ABSTRAK.pdf 
500 |a http://repository.upnvj.ac.id/19768/14/AWAL.pdf 
500 |a http://repository.upnvj.ac.id/19768/3/BAB%20I.pdf 
500 |a http://repository.upnvj.ac.id/19768/4/BAB%20II.pdf 
500 |a http://repository.upnvj.ac.id/19768/16/BAB%20III.pdf 
500 |a http://repository.upnvj.ac.id/19768/6/BAB%20IV.pdf 
500 |a http://repository.upnvj.ac.id/19768/7/BAB%20V.pdf 
500 |a http://repository.upnvj.ac.id/19768/8/DAFTAR%20PUSTAKA.pdf 
500 |a http://repository.upnvj.ac.id/19768/9/RIWAYAT%20HIDUP.pdf 
500 |a http://repository.upnvj.ac.id/19768/10/LAMPIRAN.pdf 
500 |a http://repository.upnvj.ac.id/19768/11/HASIL%20PLAGIARISME.pdf 
500 |a http://repository.upnvj.ac.id/19768/12/ARTIKEL%20KI.pdf 
500 |a http://repository.upnvj.ac.id/19768/15/BAB%20III.pdf 
520 |a Wireless network security is necessary for the protection and prevention of criminal acts of information theft. This aspect is often ignored by every agency because it assumes that a wireless network is always considered safe because every agency will feel safe if the problem does not interfere with work activities by installing an antivirus or firewall. There are still many institutions that underestimate this. Thus, it is necessary to carry out penetration testing to find out vulnerabilities in wireless networks with the method used by PTES (Penetration Testing Execution Standard) to be used as a standard in analyzing wireless network security systems in finding security holes in an agency in this case, namely the wireless local area network (Wireless Local Area Network). WLAN) at PT. Sehat Tentrem where in this study found vulnerabilities in the form of bypassing, arp spoofing, certificate can not be trusted, and sniffing activities that can be carried out on wireless networks to be exploited. 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
690 |a TA Engineering (General). Civil engineering (General) 
655 7 |a Thesis  |2 local 
655 7 |a NonPeerReviewed  |2 local 
787 0 |n http://repository.upnvj.ac.id/19768/ 
787 0 |n http://repository.upnvj.ac.id 
856 4 1 |u http://repository.upnvj.ac.id/19768/  |z Link Metadata