Analisis Kerentanan Keamanan Website Menggunakan Metode PTES (Penetration Testing Execution And Standart)
DOI:
https://doi.org/10.25134/ilkom.v18i2.119Keywords:
Pengujian Penetrasi, Penilaian Kerentanan, Keamanan Jaringan, Nessus, Penetration Testing, Vulnerability Assessment, Network Security , NessuusAbstract
With rapid advances in Information Technology (IT), the need for an IT-based learning framework and mechanism has become an unavoidable necessity. This requires solid security in a system, using the Penetration Testing Execution and Standard (PTES) method. This research method is quantitative and descriptive, used to illuminate website security and provide input for improvement. The research involved Tenable Nessus Professional tools that emit vulnerabilities, such as Browseable Web Directory and Potentially Clickjacking Web. The PTES stages covered include Planning, Data Collection, Scanning, Access Rights, Security, and Web Application Firewall (WAF) configuration. The hope is that this method will provide an in-depth understanding of potential threats and vulnerabilities in government information systems, as well as present solutions. The research results are expected to provide education and insight into website security. This allows related parties to take preventive and corrective steps, improve security, and protect the integrity and confidentiality of data entities. As a result, information systems are expected to be more secure and resistant to potential cyber threats.
Downloads
References
Andhika, D. A., Slamet, & Ningsih, N. (2022). Pengujian Penetrasi pada Windows 10 menggunakan Model Penetration Testing Execution Standard (PTES). Journal of Technology and Informatics (JoTI), 3(2), 55–61. https://doi.org/10.37802/joti.v3i2.222
Aryanti, D., Nurholis, & Utamajaya, J. N. (2021). ANALISIS KERENTANAN KEAMANAN WEBSITE MENGGUNAKAN METODE OWASP (OPEN WEB APPLICATION SECURITY PROJECT) PADA DINAS TENAGA KERJA (Vol. 1, Issue 3).
Fauzan, F. Y., & Syukhri. (2021). Analisis Metode Web Security PTES (Penetration Testing Execution And Standart) Pada Aplikasi E-Learning Universitas Negeri Padang. Jurnal Vocational Teknik Elektronika Dan Informatika, 9(2), 105–111. http://ejournal.unp.ac.id/index.php/voteknika/
Fronita, M. (2023). Analisis Celah Keamanan Website Sitasi Menggunakan Vulnerability Assessment. Jurnal Ilmiah Rekayasa Dan Manajemen Sistem Informasi, 9(1), 1–7. https://doi.org/10.24014/rmsi.v9i1.21823
Syarifuddin Syahab, A. (2023). Analisis Audit Keamanan Informasi Website Dari Drown Attack Menggunakan Network Mapper Dan Qualys Ssl. Jurnal Manajemen Informatika & Sistem Informasi (MISI), 6(1), 39–47.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Nuansa Informatika
This work is licensed under a Creative Commons Attribution 4.0 International License.