Penetration Testing Server Sistem Informasi Manajemen dan Website Universitas Kristen Petra

Authors

  • Richard Pangalila Program Studi Teknik Informatika
  • Agustinus Noertjahyana Program Studi Teknik Informatika
  • Justinus Andjarwirawan Program Studi Teknik Informatika

Keywords:

Customer Experience, Kepercayaan, dan Kepuasan Konsumen.

Abstract

A developing organization need information technology in its
operational activity. However what is often considered is how to
ensure that data saved in server is safe from unauthorized parties.
Therefore, this thesis reviews how a person who is appointed as a
security analyst do penetration testing in a system with variety tools
given and how the report can be understood from by people from
managers to programmers. Besides giving the how-to knowledge,
this thesis also reviews how secure is the organization under review
in keeping their data safe from other parties who are not supposed
to get access to important operational activity data.

References

[1]! Red Hat, Inc. 42.1.1. What is Computer Security? 42.1.1.

What is Computer Security? [Online] 07 26, 2007. [Cited: 10

22, 2014.]

https://www.centos.org/docs/5/html/5.1/Deployment_Guide/s

1-sgs-ov-cs.html.

[2]! Ruef, Marc. httprecon project / faq. httprecon project.

[Online] 2015.

http://www.computec.ch/projekte/httprecon/?s=faq.

[3]! Hariwibowo, Dody. Keamanan Komputer | Pengantar

Teknologi Informasi. Pengantar Teknologi Informasi.

[Online] 02 06, 2011. [Cited: 10 21, 2014.]

http://dhoddycreater.wordpress.com/makalah-pti/keamanankomputer.

[4]! Gibson, Steve. GRC | ID Serve - Internet Server Identification

Utility. GRC | ID Serve - Internet Server Identification Utility.

[Online] Oct 06, 2003. https://www.grc.com/id/idserve.htm.

[5]! Barnatt, Christopher. ExplainingComputer.com: Computer

Security. ExplainingComputer.com. [Online] 09 13, 2012.

[Cited: 10 20, 2014.]

http://explainingcomputer.com/security.html.

[6]! Acunetix. Web Application Security with Acunetix Web

Vulnerability Scanner. Web application security with

Acunetix. [Online] 2015.

https://www.acunetix.com/vulnerability-scanner/.

[7]! OpenVAS. OpenVAS - About OpenVAS Software. OpenVAS

- OpenVAS - Open Vulnerability Assessment System. [Online]

2015. http://www.openvas.org/software.html.

[8]! EC-Council. Certified Ethical Hacker v8 : Module 20

Penetration Testing. Amerika : EC-Council, 2012.

[9]! —. Certified Ethical Hacker v8 : Module 12 Hacking

Webservers. Amerika : EC-Council, 2012.

[10]!PortSwigger Ltd. Burp Suite. Burp Suite. [Online]

http://portswigger.net/burp/.

[11]!Tenable Network Security ®. Nessus Vulnerability Scanner |

Tenable Network Security. Tenable Network Security.

[Online]

Downloads

Published

2015-08-14

Issue

Section

Articles