ANALISIS UJI PENETRASI PADA SISTEM MANAJEMEN DATA SUMBER TERBUKA CKAN MENGGUNAKAN METODE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY SPECIAL PUBLICATION (NIST SP 800-115)

The development of information technology has now spread to remote parts of Indonesia, both villages, sub-districts, districts and cities have started to have divisions that implement information dissemination systems to the public using websites and one of the parties responsible for information di...

Full description

Saved in:
Bibliographic Details
Main Author: Dzaki Anmaris Harahap, (Author)
Format: Book
Published: 2023-07-07.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The development of information technology has now spread to remote parts of Indonesia, both villages, sub-districts, districts and cities have started to have divisions that implement information dissemination systems to the public using websites and one of the parties responsible for information dissemination services. It is important to ensure the confidentiality and security of information must be maintained from threats and danger. In this study there are system problems that may have security holes. Data leaks are caused by security holes that were not detected in the system and then not handled properly, allowing other people to directly enter the system. The reporting phase will describe the results of the vulnerabilities found, the level of severity, and provide instructions on how to mitigate the vulnerabilities that have been found. To maintain system security, the IT team should reconfigure the system, so that the vulnerability to incoming attacks can be overcome. Identification of vulnerabilities in the open source data management system Ckan the Bandung City Diskominfo website using the methodNational Institute of Standards and Technology Special Publicaiton 800-115.
Item Description:http://repository.upnvj.ac.id/25827/1/ABSTRAK.pdf
http://repository.upnvj.ac.id/25827/2/AWAL.pdf
http://repository.upnvj.ac.id/25827/3/BAB%201.pdf
http://repository.upnvj.ac.id/25827/6/BAB%202.pdf
http://repository.upnvj.ac.id/25827/4/BAB%203.pdf
http://repository.upnvj.ac.id/25827/8/BAB%204.pdf
http://repository.upnvj.ac.id/25827/5/BAB%205.pdf
http://repository.upnvj.ac.id/25827/9/DAFTAR%20PUSTAKA.pdf
http://repository.upnvj.ac.id/25827/11/RIWAYAT%20HIDUP.pdf
http://repository.upnvj.ac.id/25827/10/LAMPIRAN.pdf
http://repository.upnvj.ac.id/25827/12/HASIL%20PLAGIARISME.pdf
http://repository.upnvj.ac.id/25827/13/ARTIKEL%20KI.pdf