z-logo
open-access-imgOpen Access
PENGUJIAN KERENTANAN SISTEM DENGAN MENGGUNAKAN METODE PENETRATION TESTING DI UNIVERSITAS XYZ
Author(s) -
Jusia Amanda Ginting,
I Gusti Gusti Ngurah Suryantara
Publication year - 2021
Publication title -
infotech
Language(s) - English
Resource type - Journals
eISSN - 2620-5181
pISSN - 2460-2108
DOI - 10.37365/jti.v7i1.105
Subject(s) - exploit , computer security , computer science , security system , security testing , penetration (warfare) , security awareness , information security , security controls , risk analysis (engineering) , control (management) , security information and event management , business , cloud computing security , engineering , operations research , cloud computing , artificial intelligence , operating system
Awareness of information security will be a priority in the event of data loss or damage. This certainly harms the performance of a company or organization due to unpreparedness to resolve or minimize risks that can occur. The impact that occurs on the security system used is that the system cannot provide a sense of security because the system used and has security holes that can be used to exploit systems and networks at XYZ University. This study aims to examine the internal and external security controls of the system by identifying threats that can pose serious problems to assets at XYZ University by using the penetration testing method, the results can be used as a benchmark in measuring the weaknesses of the network and system from external attacks. The goal is to implement preventive controls against risks that can occur to improve system security at XYZ University.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here