Analisis Keamanan Website SIASAT Menggunakan Teknik Footprinting dan Vulnerability Scanning
Main Article Content
Abstract
Universitas Kristen Satya Wacana (UKSW) is one of the private universities in Indonesia that actively utilizes internet technology and its Website to support academic and non-academic activities. SIASAT (Satya Wacana Academic Information System) provides important information confidentially to the community or makes this information only accessible to users who have an account. Regarding security, SIASAT has experienced problems, and threats such as SQL Injection, brute force, and so on which still happen frequently. Problems related to the security and confidentiality of data in computer networks are Privacy (confidentiality) data must be kept away from unauthorized parties. Integrity (integrity) ensures that the information sent remains intact or without changes. Authenticity (authenticity) is a procedure for knowing that a user is truly authorized to access a system. Authenticity could be password, PIN, fingerprints, or other identification. Non-repudiation (irrefutable proof) is proof to ensure that the user has full access to the services used in a system. A system can be categorized as unsafe if the above issues cannot be met. Therefore, by using Footprinting and vulnerability scanning techniques, analysis can be carried out on the SIASAT Website to overcome this problem. This research was carried out using an approach of ethical Hacking, with an emphasis on level Footprinting and vulnerability scanning. The results of this research have found information related to the SIASAT Website and several vulnerability warnings after scanning with high to low-risk levels.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The Authors submitting a manuscript do so on the understanding that if accepted for publication, copyright of the article shall be assigned to JTIK journal and Research Division, KITA Institute as the publisher of the journal. Copyright encompasses rights to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms, and any other similar reproductions, as well as translations.
JTIK journal and Research Division, KITA Institute and the Editors make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal. In any way, the contents of the articles and advertisements published in JTIK journal are the sole and exclusive responsibility of their respective authors and advertisers.
The Copyright Transfer Form can be downloaded here: [Copyright Transfer Form JTIK]. The copyright form should be signed originally and send to the Editorial Office in the form of original mail, scanned document or fax :
Muhammad Wali (Editor-in-Chief)
Editorial Office of Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi)
Research Division, KITA Institute
Teuku Nyak Arief Street Nomor : 7b, Lamnyong, Lamgugop, Kota Banda Aceh
Telp./Fax: 0651-8070141
Email: jtik@lembagakita.org - journal@lembagakita.org
References
Kristanto, A. (2003). Keamanan Data pada Jaringan Komputer. Gava Media, Yogyakarta.
Widodo, B. E., & Purnomo, A. S. (2020). Implementasi Advanced Encryption Standard Pada Enkripsi Dan Dekripsi Dokumen Rahasia Ditintelkam Polda Diy. Jurnal Teknik Informatika (Jutif), 1(2), 69-77.
Al Hilmi, M. A., & Khujaemah, E. (2022). Network Security Monitoring With Intrusion Detection System. Jurnal Teknik Informatika (JUTIF), 3(2), 249-253.
Cahyanto, I. (2023). Privacy Challenges in Using Wearable Technology in Education Literature Review. Formosa Journal of Applied Sciences, 2(6), 909-928. DOI: https://doi.org/10.55927/fjas.v2i6.4272.
Ariyus, D., & Kom, M. (2007). Intrusion detection system. Yogyakarta: Andi.
Fatkhurozzi, M. (2021, November). Analisa Keamanan Website Menggunakan Metode Footprinting dan Vulnerability Scanning pada Website Kampus. In Prosiding Seminar Nasional Informatika Bela Negara (Vol. 2, pp. 144-148).
Herdianti, H., & Umar, F. (2020). Analisis keamanan website menggunakan teknik footprinting dan vulnerability scanning. INFORMAL: Informatics Journal, 5(2), 43-48. DOI: https://doi.org/10.19184/isj.v5i2.18941.
Alwi, E. I., & Ilmawan, L. B. (2021). Analisis Keamanan Sistem Informasi Akademik (SIAKAD) Universitas XYZ Menggunakan Metode Vulnerability Assessment. INFORMAL: Informatics Journal, 6(3), 131-135. DOI: https://doi.org/10.19184/isj.v6i3.27053.
Zirwan, A. (2022). Pengujian dan Analisis Keamanan Website Menggunakan Acunetix Vulnerability Scanner. Jurnal Informasi dan Teknologi, 70-75.