Article thumbnail
Location of Repository

Vulnerability Mapping Pada Jaringan Komputer Di Universitas X

By Devi Christiani Angir, Agustinus Noertjahyana and Justinus Andjarwirawan


X University is now growing increasingly large and has a wide variety of information systems to run its operations. One of the most important servers in X University is That URL is one of the URLs that are frequented by the public outside to get to know closer about X University in general. Security of web server is usually a matter of an administrator. Sometimes, security issues or server application system and the importance of securing web server neglected only realized after the disaster. Without a good security application systems, the application of technology would be very dangerous as good as any institution or organization itself. Therefore, it takes a server security evaluation and conduct vulnerability mapping to be wary of the security server.Based on the background of the problem, it is necessary to evaluate by using penetration testing. In addition, this study also uses the guidelines of the module CEH (Certified Ethical Hacker) and the official web Acunetix. Testing of this thesis is aimed to find the weaknesses of existing servers. Some problems were found after testing, among others: the weaknesses found pretty much where any weaknesses have different handling, ports should not be open even open, and less important public IP should not be open.The solution provided to overcome these problems include: the use of Acunetix standards can be maintained and continued, testing will be done more than one time, to upgrade web server to a newer version periodically, to filter the existing port, increasing the level of web security server, periodic maintenance, and security testing regularly and periodically, either by consulting the relevant field or using a guide (like Acunetix, CEH, OWASP)

Topics: Vulnerability, Penetration testing, Vulnerability Scanning, Certified Etchical Hacker, Acunetix, Indonesia
Publisher: Petra Christian University
Year: 2015
OAI identifier:
Provided by: Neliti

Suggested articles

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.