Analisis Kerentanan Keamanan Website Menggunakan Metode PTES (Penetration Testing Execution And Standart)

Authors

  • Muhammad Risky Ardiansyah Universitas Trunojoyo Madura
  • Muhlis Tahir Universitas Trunojoyo Madura
  • Andi Risqita Nuria Fawash Universitas Trunojoyo Madura
  • Dicky Wahyu Pratama Universitas Trunojoyo Madura
  • Ita Rani Universitas Trunojoyo Madura
  • Moh. Basori Alwi Universitas Trunojoyo Madura
  • Sahrul Romadhon Universitas Trunojoyo Madura
  • Tita Prihatiningrum Universitas Trunojoyo Madura

DOI:

https://doi.org/10.25134/ilkom.v18i2.119

Keywords:

Pengujian Penetrasi, Penilaian Kerentanan, Keamanan Jaringan, Nessus, Penetration Testing, Vulnerability Assessment, Network Security , Nessuus

Abstract

With rapid advances in Information Technology (IT), the need for an IT-based learning framework and mechanism has become an unavoidable necessity. This requires solid security in a system, using the Penetration Testing Execution and Standard (PTES) method. This research method is quantitative and descriptive, used to illuminate website security and provide input for improvement. The research involved Tenable Nessus Professional tools that emit vulnerabilities, such as Browseable Web Directory and Potentially Clickjacking Web. The PTES stages covered include Planning, Data Collection, Scanning, Access Rights, Security, and Web Application Firewall (WAF) configuration. The hope is that this method will provide an in-depth understanding of potential threats and vulnerabilities in government information systems, as well as present solutions. The research results are expected to provide education and insight into website security. This allows related parties to take preventive and corrective steps, improve security, and protect the integrity and confidentiality of data entities. As a result, information systems are expected to be more secure and resistant to potential cyber threats.

Downloads

Download data is not yet available.

References

Andhika, D. A., Slamet, & Ningsih, N. (2022). Pengujian Penetrasi pada Windows 10 menggunakan Model Penetration Testing Execution Standard (PTES). Journal of Technology and Informatics (JoTI), 3(2), 55–61. https://doi.org/10.37802/joti.v3i2.222

Aryanti, D., Nurholis, & Utamajaya, J. N. (2021). ANALISIS KERENTANAN KEAMANAN WEBSITE MENGGUNAKAN METODE OWASP (OPEN WEB APPLICATION SECURITY PROJECT) PADA DINAS TENAGA KERJA (Vol. 1, Issue 3).

Fauzan, F. Y., & Syukhri. (2021). Analisis Metode Web Security PTES (Penetration Testing Execution And Standart) Pada Aplikasi E-Learning Universitas Negeri Padang. Jurnal Vocational Teknik Elektronika Dan Informatika, 9(2), 105–111. http://ejournal.unp.ac.id/index.php/voteknika/

Fronita, M. (2023). Analisis Celah Keamanan Website Sitasi Menggunakan Vulnerability Assessment. Jurnal Ilmiah Rekayasa Dan Manajemen Sistem Informasi, 9(1), 1–7. https://doi.org/10.24014/rmsi.v9i1.21823

Syarifuddin Syahab, A. (2023). Analisis Audit Keamanan Informasi Website Dari Drown Attack Menggunakan Network Mapper Dan Qualys Ssl. Jurnal Manajemen Informatika & Sistem Informasi (MISI), 6(1), 39–47.

Downloads

Published

20-07-2024

How to Cite

Muhammad Risky Ardiansyah, Muhlis Tahir, Andi Risqita Nuria Fawash, Dicky Wahyu Pratama, Ita Rani, Moh. Basori Alwi, Sahrul Romadhon, & Tita Prihatiningrum. (2024). Analisis Kerentanan Keamanan Website Menggunakan Metode PTES (Penetration Testing Execution And Standart). NUANSA INFORMATIKA, 18(2), 145–153. https://doi.org/10.25134/ilkom.v18i2.119