PENGUJIAN CELAH KEAMANAN MENGGUNAKAN METODE OWASP WEB SECURITY TESTING GUIDE (WSTG) PADA WEBSITE XYZ

XYZ as a research website, of course, has a lot of sensitive data, such as personal data of users, both researchers and respondents, and data from research results. This data is vulnerable to data leakage or being stolen and misused by irresponsible people and harming many parties. Penetration Testi...

Full description

Saved in:
Bibliographic Details
Main Author: Albestty Islamyati Rafeli, (Author)
Format: Book
Published: 2022-07-18.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repoupnvj_19831
042 |a dc 
100 1 0 |a Albestty Islamyati Rafeli, .  |e author 
245 0 0 |a PENGUJIAN CELAH KEAMANAN MENGGUNAKAN METODE OWASP WEB SECURITY TESTING GUIDE (WSTG) PADA WEBSITE XYZ 
260 |c 2022-07-18. 
500 |a http://repository.upnvj.ac.id/19831/1/ABSTRAK.pdf 
500 |a http://repository.upnvj.ac.id/19831/2/AWAL.pdf 
500 |a http://repository.upnvj.ac.id/19831/3/BAB%201.pdf 
500 |a http://repository.upnvj.ac.id/19831/4/BAB%202.pdf 
500 |a http://repository.upnvj.ac.id/19831/5/BAB%203.pdf 
500 |a http://repository.upnvj.ac.id/19831/6/BAB%204.pdf 
500 |a http://repository.upnvj.ac.id/19831/7/BAB%205.pdf 
500 |a http://repository.upnvj.ac.id/19831/8/DAFTAR%20PUSTAKA.pdf 
500 |a http://repository.upnvj.ac.id/19831/9/RIWAYAT%20HIDUP.pdf 
500 |a http://repository.upnvj.ac.id/19831/10/LAMPIRAN.pdf 
500 |a http://repository.upnvj.ac.id/19831/11/HASIL%20PLAGIARISME.pdf 
500 |a http://repository.upnvj.ac.id/19831/12/ARTIKEL%20KI.pdf 
520 |a XYZ as a research website, of course, has a lot of sensitive data, such as personal data of users, both researchers and respondents, and data from research results. This data is vulnerable to data leakage or being stolen and misused by irresponsible people and harming many parties. Penetration Testing is a way to simulate a method that would be used by an attacker or irresponsible person to be able to illegally access data into the system. WSTG stands for Web Security Testing Guide, which is a Cyber security testing project guide, especially in the field of web application developers and professional security. In this study, seven techniques were carried out, namely Information gathering, Configuration and Deployment Management Testing, Identity Management Testing, Input Validation Testing, Testing For Error Handling, Business Logic Testing and Client Side Testing. The technique is applied to the XYZ website so that it gets a vulnerability from the XYZ website. In this study, eight vulnerabilities were found on the XYZ website. After a thorough risk assessment, the risk of the vulnerabilities on the XYZ website is included in the medium category. 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
690 |a QA75 Electronic computers. Computer science 
690 |a QA76 Computer software 
655 7 |a Thesis  |2 local 
655 7 |a NonPeerReviewed  |2 local 
787 0 |n http://repository.upnvj.ac.id/19831/ 
787 0 |n http://repository.upnvj.ac.id 
856 4 1 |u http://repository.upnvj.ac.id/19831/  |z Link Metadata