PENGUJIAN CELAH KEAMANAN MENGGUNAKAN METODE OWASP WEB SECURITY TESTING GUIDE (WSTG) PADA WEBSITE XYZ
XYZ as a research website, of course, has a lot of sensitive data, such as personal data of users, both researchers and respondents, and data from research results. This data is vulnerable to data leakage or being stolen and misused by irresponsible people and harming many parties. Penetration Testi...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
2022-07-18.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | repoupnvj_19831 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Albestty Islamyati Rafeli, . |e author |
245 | 0 | 0 | |a PENGUJIAN CELAH KEAMANAN MENGGUNAKAN METODE OWASP WEB SECURITY TESTING GUIDE (WSTG) PADA WEBSITE XYZ |
260 | |c 2022-07-18. | ||
500 | |a http://repository.upnvj.ac.id/19831/1/ABSTRAK.pdf | ||
500 | |a http://repository.upnvj.ac.id/19831/2/AWAL.pdf | ||
500 | |a http://repository.upnvj.ac.id/19831/3/BAB%201.pdf | ||
500 | |a http://repository.upnvj.ac.id/19831/4/BAB%202.pdf | ||
500 | |a http://repository.upnvj.ac.id/19831/5/BAB%203.pdf | ||
500 | |a http://repository.upnvj.ac.id/19831/6/BAB%204.pdf | ||
500 | |a http://repository.upnvj.ac.id/19831/7/BAB%205.pdf | ||
500 | |a http://repository.upnvj.ac.id/19831/8/DAFTAR%20PUSTAKA.pdf | ||
500 | |a http://repository.upnvj.ac.id/19831/9/RIWAYAT%20HIDUP.pdf | ||
500 | |a http://repository.upnvj.ac.id/19831/10/LAMPIRAN.pdf | ||
500 | |a http://repository.upnvj.ac.id/19831/11/HASIL%20PLAGIARISME.pdf | ||
500 | |a http://repository.upnvj.ac.id/19831/12/ARTIKEL%20KI.pdf | ||
520 | |a XYZ as a research website, of course, has a lot of sensitive data, such as personal data of users, both researchers and respondents, and data from research results. This data is vulnerable to data leakage or being stolen and misused by irresponsible people and harming many parties. Penetration Testing is a way to simulate a method that would be used by an attacker or irresponsible person to be able to illegally access data into the system. WSTG stands for Web Security Testing Guide, which is a Cyber security testing project guide, especially in the field of web application developers and professional security. In this study, seven techniques were carried out, namely Information gathering, Configuration and Deployment Management Testing, Identity Management Testing, Input Validation Testing, Testing For Error Handling, Business Logic Testing and Client Side Testing. The technique is applied to the XYZ website so that it gets a vulnerability from the XYZ website. In this study, eight vulnerabilities were found on the XYZ website. After a thorough risk assessment, the risk of the vulnerabilities on the XYZ website is included in the medium category. | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
690 | |a QA75 Electronic computers. Computer science | ||
690 | |a QA76 Computer software | ||
655 | 7 | |a Thesis |2 local | |
655 | 7 | |a NonPeerReviewed |2 local | |
787 | 0 | |n http://repository.upnvj.ac.id/19831/ | |
787 | 0 | |n http://repository.upnvj.ac.id | |
856 | 4 | 1 | |u http://repository.upnvj.ac.id/19831/ |z Link Metadata |