Penetration Testing Server Sistem Informasi Manajemen dan Website Universitas Kristen Petra

Richard Pangalila(1*), Agustinus Noertjahyana(2), Justinus Andjarwirawan(3),


(1) Program Studi Teknik Informatika
(2) Program Studi Teknik Informatika
(3) Program Studi Teknik Informatika
(*) Corresponding Author

Abstract


A developing organization need information technology in its
operational activity. However what is often considered is how to
ensure that data saved in server is safe from unauthorized parties.
Therefore, this thesis reviews how a person who is appointed as a
security analyst do penetration testing in a system with variety tools
given and how the report can be understood from by people from
managers to programmers. Besides giving the how-to knowledge,
this thesis also reviews how secure is the organization under review
in keeping their data safe from other parties who are not supposed
to get access to important operational activity data.

Keywords


Safety, Data, Evaluation, Penetration Testing

Full Text:

PDF

References


! Red Hat, Inc. 42.1.1. What is Computer Security? 42.1.1.

What is Computer Security? [Online] 07 26, 2007. [Cited: 10

, 2014.]

https://www.centos.org/docs/5/html/5.1/Deployment_Guide/s

-sgs-ov-cs.html.

! Ruef, Marc. httprecon project / faq. httprecon project.

[Online] 2015.

http://www.computec.ch/projekte/httprecon/?s=faq.

! Hariwibowo, Dody. Keamanan Komputer | Pengantar

Teknologi Informasi. Pengantar Teknologi Informasi.

[Online] 02 06, 2011. [Cited: 10 21, 2014.]

http://dhoddycreater.wordpress.com/makalah-pti/keamanankomputer.

! Gibson, Steve. GRC | ID Serve - Internet Server Identification

Utility. GRC | ID Serve - Internet Server Identification Utility.

[Online] Oct 06, 2003. https://www.grc.com/id/idserve.htm.

! Barnatt, Christopher. ExplainingComputer.com: Computer

Security. ExplainingComputer.com. [Online] 09 13, 2012.

[Cited: 10 20, 2014.]

http://explainingcomputer.com/security.html.

! Acunetix. Web Application Security with Acunetix Web

Vulnerability Scanner. Web application security with

Acunetix. [Online] 2015.

https://www.acunetix.com/vulnerability-scanner/.

! OpenVAS. OpenVAS - About OpenVAS Software. OpenVAS

- OpenVAS - Open Vulnerability Assessment System. [Online]

http://www.openvas.org/software.html.

! EC-Council. Certified Ethical Hacker v8 : Module 20

Penetration Testing. Amerika : EC-Council, 2012.

! —. Certified Ethical Hacker v8 : Module 12 Hacking

Webservers. Amerika : EC-Council, 2012.

!PortSwigger Ltd. Burp Suite. Burp Suite. [Online]

http://portswigger.net/burp/.

!Tenable Network Security ®. Nessus Vulnerability Scanner |

Tenable Network Security. Tenable Network Security.

[Online]


Refbacks

  • There are currently no refbacks.


Jurnal telah terindeks oleh :